> -----Original Message----- > From: redhat-list-bounces@xxxxxxxxxx [mailto:redhat-list- > bounces@xxxxxxxxxx] On Behalf Of Jason Dixon > Sent: Friday, June 25, 2004 9:19 AM > To: General Red Hat Linux discussion list > Subject: Re: Router/Firewall Recommendation > > On Jun 25, 2004, at 10:13 AM, Otto Haliburton wrote: > > > Well, somebody took the bait. I'm sure with pinpoint accuracy he used > > satellite communications to send a uplink that lands in your wireless > > network ignoring all other wireless networks to exactly with great care > > access only yours with consistency, I mean how did he select yours > > over all > > others cause these wireless adapters have infinite power to roam and > > access > > the world. And if you believe this I have a bridge to sell you in > > Brooklyn. > > I suppose with a wireless network a local person within range of your > > network might be able to penetrate it.('m not sure, but I do know it > > is not > > trivial). If you need that much security, why would you go wireless to > > start out with. Look at the intelligent community, they have been > > able to > > penetrate wireless for years. And if you know anything about cell > > phones I > > would suggest that you not talk about secrets if you are in that > > environ, > > but of course, you have to know a lot to take advantage of these > > things and > > you need the proper equipment(you do need this). > > You're a moron. The more you open your mouth, the more you expose > yourself as the poser you really are. > > It takes no skill for an uneducated employee to plug in a WAP into a > (otherwise secure) network segment. Immediately, your entire corporate > network is exploitable. I routinely walk around with my Zaurus, amazed > at the number of wide-open wireless segments in these corporate > business parks. > > If you don't believe/understand that, you're living in denial. > > -- > Jason Dixon, RHCE > DixonGroup Consulting > http://www.dixongroup.net again you have some moron calling someone else a moron. Did you read the posting. Example. There are five houses with wireless routers and you are standing in the middle. Which one will you be able to access consistently. Okay, you roam close to one and his network comes in, then you roam close the other and his network comes in. So which is which and what do you do with the info. Then you have transmissions that come out of the blue, you know like when your cell location says you somewhere you are not. That's the problem. You need to be able to penetrate the wireless network you chose consistently and after you do you need to know what to do in that particular environ. Before you go calling people morons you need to do analysis of the problem. Lot's of people have done this and you need to read the theory on limitation of transmission ranges for wireless equipment. There is a whole world of security out here that you are not aware of but most of all reading closely what was said is important try reading it again maybe you will get the point -- redhat-list mailing list unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe https://www.redhat.com/mailman/listinfo/redhat-list