|
The UKHA-ARCHIVE IS CEASING OPERATIONS 31 DEC 2024
|
|
[Date Prev][Date
Next][Thread Prev][Thread Next][Date
Index][Thread Index]
RE: Wireless security
- To: <ukha_d@xxxxxxx>
- Subject: RE: Wireless security
- From: "Mark McCall" <mark@xxxxxxx>
- Date: Wed, 29 Aug 2001 16:27:27 +0100
- Delivered-to: rich@xxxxxxx
- Delivered-to: mailing list ukha_d@xxxxxxx
- Mailing-list: list ukha_d@xxxxxxx; contact
ukha_d-owner@xxxxxxx
- Reply-to: ukha_d@xxxxxxx
So far
I have just been experimenting Craig and haven't enabled WEP yet. I
did
notice a shortcut on the Epods to the Compaq driver utility but it failed
to
run. On the iPAQ/Laptop its simple to congigure using this
util.
M.
Mark/John/Other wireless epoders
I
recall you are running linksys 802.11b. Are you running 128bit
encryption with the epod??
The reason I ask is my SMC AP is
configured with no encryption as default. After reading documentation, I
read to use 128bit encryption you must configure 2000/NT/9x/Me drivers
and
AP. I can see no option with my CE drivers to change encryption
level.
Cheers
Craig
-----Original
Message----- From:
Dr John Tankard [mailto:john@xxxxxxx] Sent: Wednesday, August 29, 2001
3:31 PM To: UKHA Subject: [ukha_d] Wireless security
Just
red
this from Silicon
Hackers are storming wireless networks with
AirSnort,
a new program designed to attack one of the most established wireless
standards on the market.
AirSnort allows hackers to capture data
transmitted over any wireless network supposedly protected by the Wired
Equivalent Privacy (WEP) system, otherwise known as the 802.11b
standard,
which encrypts information as it is transmitted.
The 802.11b
standard transmits in direct sequence connections over public airwaves
that
are also shared by television, radio and mobile
phone transmissions.
When sufficient data is collected, AirSnort
pieces together the system's password.
US security company,
Argus,
is in agreement with AirSnort developers who believe 802.11b is an
insecure
and easily hackable encryption mechanism.
AirSnort developers said
as
well as allowing users to infiltrate networks, the program is a slap in
the
face to those that denied previous rumours that the standard was
insecure
and inappropriate for corporate use.
An earlier released tool called
WEPcrack is also able to hack into the wireless standard, but not as
quickly as AirSnort.
For more information: http://www.automatedhome.co.uk
Post message: ukha_d@xxxxxxx Subscribe:
ukha_d-subscribe@xxxxxxx Unsubscribe:
ukha_d-unsubscribe@xxxxxxx List owner:
ukha_d-owner@xxxxxxx
Your use of Yahoo! Groups is subject to
http://docs.yahoo.com/info/terms/
For
more information: http://www.automatedhome.co.uk
Post message: ukha_d@xxxxxxx Subscribe:
ukha_d-subscribe@xxxxxxx Unsubscribe:
ukha_d-unsubscribe@xxxxxxx List owner:
ukha_d-owner@xxxxxxx
Your use of Yahoo! Groups is
subject to the Yahoo! Terms of
Service.
Yahoo! Groups
Sponsor |
ADVERTISEMENT
|
|
|
For more information: http://www.automatedhome.co.uk
Post message: ukha_d@xxxxxxx
Subscribe: ukha_d-subscribe@xxxxxxx
Unsubscribe: ukha_d-unsubscribe@xxxxxxx
List owner: ukha_d-owner@xxxxxxx
Your use of Yahoo! Groups is subject to the Yahoo! Terms of Service.
Home |
Main Index |
Thread Index
|
|