-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On Wed, 26 Jul 2006, Anssi Hannula wrote:
Sietse van Zanen wrote:
The important issue you have is not WHAT somebody can hack. It's what somebody can DO and ACCESS, WHEN you've been hacked.
If somebody does manage to take over one of your systems, he most certainly gains access to ALL to systems on the same physical (sub)network. As ALL your systems are on the same net, draw the conclusion.
Combine that conclusion with the innate vulnerability of WiFi networks and do the math. It's unwise to use your set up. period. It's not for nothing that reccomendations always talk about shielding your WiFi with a firewall. Now for personal use, it might be acceptable to do otherwise, but that's up to you, as always the choice is between security and convenience.
Thanks for your reply. Unfortunately, you do not seem to offer any
alternative to my current setup.
Actually he did offer an alternative, though you had to read carefully his
answer; go with a wired set of networks, both distinct from one another.
Firewall those networks, adding further isolation from eachother and from
the publc internet at large.
Thanks,
Ron DuFresne
- --
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
admin & senior security consultant: sysinfo.com
http://sysinfo.com
Key fingerprint = 9401 4B13 B918 164C 647A E838 B2DF AFCC 94B0 6629
...We waste time looking for the perfect lover
instead of creating the perfect love.
-Tom Robbins <Still Life With Woodpecker>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFEyQ9/st+vzJSwZikRAgFiAJ0VfuNg1mknLLCIEBwNixGOYiqehwCguxIU
L30Qlwza8HKr9oYDgwp+viE=
=G+zy
-----END PGP SIGNATURE-----