Router/Firewall Recommendation

Jason Staudenmayer jasons at NJAQUARIUM.ORG
Fri Jun 25 14:33:31 UTC 2004


Anyone can make a $5.00 directional antenna out of household items that can
effectively boost range and target a certain point. It's not that hard and
it's def not rocket science.

> -----Original Message-----
> From: Otto Haliburton [mailto:ottohaliburton at comcast.net] 
> Sent: Friday, June 25, 2004 10:31 AM
> To: 'General Red Hat Linux discussion list'
> Subject: RE: Router/Firewall Recommendation
> 
> 
> 
> 
> > -----Original Message-----
> > From: redhat-list-bounces at redhat.com [mailto:redhat-list-
> > bounces at redhat.com] On Behalf Of Jason Dixon
> > Sent: Friday, June 25, 2004 9:19 AM
> > To: General Red Hat Linux discussion list
> > Subject: Re: Router/Firewall Recommendation
> > 
> > On Jun 25, 2004, at 10:13 AM, Otto Haliburton wrote:
> > 
> > > Well, somebody took the bait.  I'm sure with pinpoint 
> accuracy he used
> > > satellite communications to send a uplink that lands in 
> your wireless
> > > network ignoring all other wireless networks to exactly 
> with great care
> > > access only yours with consistency, I mean how did he select yours
> > > over all
> > > others cause these wireless adapters have infinite power 
> to roam and
> > > access
> > > the world.  And if you believe this I have a bridge to sell you in
> > > Brooklyn.
> > > I suppose with a wireless network a local person within 
> range of your
> > > network might be able to penetrate it.('m not sure, but I 
> do know it
> > > is not
> > > trivial).  If you need that much security, why would you 
> go wireless to
> > > start out with.  Look at the intelligent community, they have been
> > > able to
> > > penetrate wireless for years.  And if you know anything about cell
> > > phones I
> > > would suggest that you not talk about secrets if you are in that
> > > environ,
> > > but of course, you have to know a lot to take advantage of these
> > > things and
> > > you need the proper equipment(you do need this).
> > 
> > You're a moron.  The more you open your mouth, the more you expose
> > yourself as the poser you really are.
> > 
> > It takes no skill for an uneducated employee to plug in a WAP into a
> > (otherwise secure) network segment.  Immediately, your 
> entire corporate
> > network is exploitable.  I routinely walk around with my 
> Zaurus, amazed
> > at the number of wide-open wireless segments in these corporate
> > business parks.
> > 
> > If you don't believe/understand that, you're living in denial.
> > 
> > --
> > Jason Dixon, RHCE
> > DixonGroup Consulting
> > http://www.dixongroup.net
> again you have some moron calling someone else a moron.  Did 
> you read the
> posting.  Example.  There are five houses with wireless 
> routers and you are
> standing in the middle.  Which one will you be able to access 
> consistently.
> Okay, you roam close to one and his network comes in, then 
> you roam close
> the other and his network comes in.  So which is which and 
> what do you do
> with the info.  Then you have transmissions that come out of 
> the blue, you
> know like when your cell location says you somewhere you are 
> not. That's the
> problem.  You need to be able to penetrate the wireless 
> network you chose
> consistently and after you do you need to know what to do in 
> that particular
> environ.  Before you go calling people morons you need to do 
> analysis of the
> problem.  Lot's of people have done this and you need to read 
> the theory on
> limitation of transmission ranges for wireless equipment.  
> There is a whole
> world of security out here that you are not aware of but most 
> of all reading
> closely what was said is important try reading it again maybe 
> you will get
> the point
> 
> 
> 
> -- 
> redhat-list mailing list
> unsubscribe mailto:redhat-list-request at redhat.com?subject=unsubscribe
> https://www.redhat.com/mailman/listinfo/redhat-list
> 





More information about the redhat-list mailing list