Router/Firewall Recommendation
Jason Staudenmayer
jasons at NJAQUARIUM.ORG
Fri Jun 25 14:33:31 UTC 2004
Anyone can make a $5.00 directional antenna out of household items that can
effectively boost range and target a certain point. It's not that hard and
it's def not rocket science.
> -----Original Message-----
> From: Otto Haliburton [mailto:ottohaliburton at comcast.net]
> Sent: Friday, June 25, 2004 10:31 AM
> To: 'General Red Hat Linux discussion list'
> Subject: RE: Router/Firewall Recommendation
>
>
>
>
> > -----Original Message-----
> > From: redhat-list-bounces at redhat.com [mailto:redhat-list-
> > bounces at redhat.com] On Behalf Of Jason Dixon
> > Sent: Friday, June 25, 2004 9:19 AM
> > To: General Red Hat Linux discussion list
> > Subject: Re: Router/Firewall Recommendation
> >
> > On Jun 25, 2004, at 10:13 AM, Otto Haliburton wrote:
> >
> > > Well, somebody took the bait. I'm sure with pinpoint
> accuracy he used
> > > satellite communications to send a uplink that lands in
> your wireless
> > > network ignoring all other wireless networks to exactly
> with great care
> > > access only yours with consistency, I mean how did he select yours
> > > over all
> > > others cause these wireless adapters have infinite power
> to roam and
> > > access
> > > the world. And if you believe this I have a bridge to sell you in
> > > Brooklyn.
> > > I suppose with a wireless network a local person within
> range of your
> > > network might be able to penetrate it.('m not sure, but I
> do know it
> > > is not
> > > trivial). If you need that much security, why would you
> go wireless to
> > > start out with. Look at the intelligent community, they have been
> > > able to
> > > penetrate wireless for years. And if you know anything about cell
> > > phones I
> > > would suggest that you not talk about secrets if you are in that
> > > environ,
> > > but of course, you have to know a lot to take advantage of these
> > > things and
> > > you need the proper equipment(you do need this).
> >
> > You're a moron. The more you open your mouth, the more you expose
> > yourself as the poser you really are.
> >
> > It takes no skill for an uneducated employee to plug in a WAP into a
> > (otherwise secure) network segment. Immediately, your
> entire corporate
> > network is exploitable. I routinely walk around with my
> Zaurus, amazed
> > at the number of wide-open wireless segments in these corporate
> > business parks.
> >
> > If you don't believe/understand that, you're living in denial.
> >
> > --
> > Jason Dixon, RHCE
> > DixonGroup Consulting
> > http://www.dixongroup.net
> again you have some moron calling someone else a moron. Did
> you read the
> posting. Example. There are five houses with wireless
> routers and you are
> standing in the middle. Which one will you be able to access
> consistently.
> Okay, you roam close to one and his network comes in, then
> you roam close
> the other and his network comes in. So which is which and
> what do you do
> with the info. Then you have transmissions that come out of
> the blue, you
> know like when your cell location says you somewhere you are
> not. That's the
> problem. You need to be able to penetrate the wireless
> network you chose
> consistently and after you do you need to know what to do in
> that particular
> environ. Before you go calling people morons you need to do
> analysis of the
> problem. Lot's of people have done this and you need to read
> the theory on
> limitation of transmission ranges for wireless equipment.
> There is a whole
> world of security out here that you are not aware of but most
> of all reading
> closely what was said is important try reading it again maybe
> you will get
> the point
>
>
>
> --
> redhat-list mailing list
> unsubscribe mailto:redhat-list-request at redhat.com?subject=unsubscribe
> https://www.redhat.com/mailman/listinfo/redhat-list
>
More information about the redhat-list
mailing list