Router/Firewall Recommendation

Otto Haliburton ottohaliburton at comcast.net
Fri Jun 25 14:40:22 UTC 2004


There is a whole science of directional antennae, but there ranges are
limited by length, transmission medium etc.  So now the simple thrust of
location become paramount, where is the wireless network.  Can you intercept
a cell phone conversation with your directional antenna?  Geez, again posing
these things as trivial is a deep problem with your thinking. Why would your
directional antenna select one wireless network over the other if the two
are side by side.

> -----Original Message-----
> From: redhat-list-bounces at redhat.com [mailto:redhat-list-
> bounces at redhat.com] On Behalf Of Jason Staudenmayer
> Sent: Friday, June 25, 2004 9:34 AM
> To: 'General Red Hat Linux discussion list'
> Subject: RE: Router/Firewall Recommendation
> 
> Anyone can make a $5.00 directional antenna out of household items that
> can
> effectively boost range and target a certain point. It's not that hard and
> it's def not rocket science.
> 
> > -----Original Message-----
> > From: Otto Haliburton [mailto:ottohaliburton at comcast.net]
> > Sent: Friday, June 25, 2004 10:31 AM
> > To: 'General Red Hat Linux discussion list'
> > Subject: RE: Router/Firewall Recommendation
> >
> >
> >
> >
> > > -----Original Message-----
> > > From: redhat-list-bounces at redhat.com [mailto:redhat-list-
> > > bounces at redhat.com] On Behalf Of Jason Dixon
> > > Sent: Friday, June 25, 2004 9:19 AM
> > > To: General Red Hat Linux discussion list
> > > Subject: Re: Router/Firewall Recommendation
> > >
> > > On Jun 25, 2004, at 10:13 AM, Otto Haliburton wrote:
> > >
> > > > Well, somebody took the bait.  I'm sure with pinpoint
> > accuracy he used
> > > > satellite communications to send a uplink that lands in
> > your wireless
> > > > network ignoring all other wireless networks to exactly
> > with great care
> > > > access only yours with consistency, I mean how did he select yours
> > > > over all
> > > > others cause these wireless adapters have infinite power
> > to roam and
> > > > access
> > > > the world.  And if you believe this I have a bridge to sell you in
> > > > Brooklyn.
> > > > I suppose with a wireless network a local person within
> > range of your
> > > > network might be able to penetrate it.('m not sure, but I
> > do know it
> > > > is not
> > > > trivial).  If you need that much security, why would you
> > go wireless to
> > > > start out with.  Look at the intelligent community, they have been
> > > > able to
> > > > penetrate wireless for years.  And if you know anything about cell
> > > > phones I
> > > > would suggest that you not talk about secrets if you are in that
> > > > environ,
> > > > but of course, you have to know a lot to take advantage of these
> > > > things and
> > > > you need the proper equipment(you do need this).
> > >
> > > You're a moron.  The more you open your mouth, the more you expose
> > > yourself as the poser you really are.
> > >
> > > It takes no skill for an uneducated employee to plug in a WAP into a
> > > (otherwise secure) network segment.  Immediately, your
> > entire corporate
> > > network is exploitable.  I routinely walk around with my
> > Zaurus, amazed
> > > at the number of wide-open wireless segments in these corporate
> > > business parks.
> > >
> > > If you don't believe/understand that, you're living in denial.
> > >
> > > --
> > > Jason Dixon, RHCE
> > > DixonGroup Consulting
> > > http://www.dixongroup.net
> > again you have some moron calling someone else a moron.  Did
> > you read the
> > posting.  Example.  There are five houses with wireless
> > routers and you are
> > standing in the middle.  Which one will you be able to access
> > consistently.
> > Okay, you roam close to one and his network comes in, then
> > you roam close
> > the other and his network comes in.  So which is which and
> > what do you do
> > with the info.  Then you have transmissions that come out of
> > the blue, you
> > know like when your cell location says you somewhere you are
> > not. That's the
> > problem.  You need to be able to penetrate the wireless
> > network you chose
> > consistently and after you do you need to know what to do in
> > that particular
> > environ.  Before you go calling people morons you need to do
> > analysis of the
> > problem.  Lot's of people have done this and you need to read
> > the theory on
> > limitation of transmission ranges for wireless equipment.
> > There is a whole
> > world of security out here that you are not aware of but most
> > of all reading
> > closely what was said is important try reading it again maybe
> > you will get
> > the point
> >
> >
> >
> > --
> > redhat-list mailing list
> > unsubscribe mailto:redhat-list-request at redhat.com?subject=unsubscribe
> > https://www.redhat.com/mailman/listinfo/redhat-list
> >
> 
> 
> --
> redhat-list mailing list
> unsubscribe mailto:redhat-list-request at redhat.com?subject=unsubscribe
> https://www.redhat.com/mailman/listinfo/redhat-list






More information about the redhat-list mailing list