RE: Router/Firewall Recommendation

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




> -----Original Message-----
> From: redhat-list-bounces@xxxxxxxxxx [mailto:redhat-list-
> bounces@xxxxxxxxxx] On Behalf Of Jason Dixon
> Sent: Friday, June 25, 2004 9:19 AM
> To: General Red Hat Linux discussion list
> Subject: Re: Router/Firewall Recommendation
> 
> On Jun 25, 2004, at 10:13 AM, Otto Haliburton wrote:
> 
> > Well, somebody took the bait.  I'm sure with pinpoint accuracy he used
> > satellite communications to send a uplink that lands in your wireless
> > network ignoring all other wireless networks to exactly with great care
> > access only yours with consistency, I mean how did he select yours
> > over all
> > others cause these wireless adapters have infinite power to roam and
> > access
> > the world.  And if you believe this I have a bridge to sell you in
> > Brooklyn.
> > I suppose with a wireless network a local person within range of your
> > network might be able to penetrate it.('m not sure, but I do know it
> > is not
> > trivial).  If you need that much security, why would you go wireless to
> > start out with.  Look at the intelligent community, they have been
> > able to
> > penetrate wireless for years.  And if you know anything about cell
> > phones I
> > would suggest that you not talk about secrets if you are in that
> > environ,
> > but of course, you have to know a lot to take advantage of these
> > things and
> > you need the proper equipment(you do need this).
> 
> You're a moron.  The more you open your mouth, the more you expose
> yourself as the poser you really are.
> 
> It takes no skill for an uneducated employee to plug in a WAP into a
> (otherwise secure) network segment.  Immediately, your entire corporate
> network is exploitable.  I routinely walk around with my Zaurus, amazed
> at the number of wide-open wireless segments in these corporate
> business parks.
> 
> If you don't believe/understand that, you're living in denial.
> 
> --
> Jason Dixon, RHCE
> DixonGroup Consulting
> http://www.dixongroup.net
again you have some moron calling someone else a moron.  Did you read the
posting.  Example.  There are five houses with wireless routers and you are
standing in the middle.  Which one will you be able to access consistently.
Okay, you roam close to one and his network comes in, then you roam close
the other and his network comes in.  So which is which and what do you do
with the info.  Then you have transmissions that come out of the blue, you
know like when your cell location says you somewhere you are not. That's the
problem.  You need to be able to penetrate the wireless network you chose
consistently and after you do you need to know what to do in that particular
environ.  Before you go calling people morons you need to do analysis of the
problem.  Lot's of people have done this and you need to read the theory on
limitation of transmission ranges for wireless equipment.  There is a whole
world of security out here that you are not aware of but most of all reading
closely what was said is important try reading it again maybe you will get
the point



-- 
redhat-list mailing list
unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe
https://www.redhat.com/mailman/listinfo/redhat-list

[Index of Archives]     [CentOS]     [Kernel Development]     [PAM]     [Fedora Users]     [Red Hat Development]     [Big List of Linux Books]     [Linux Admin]     [Gimp]     [Asterisk PBX]     [Yosemite News]     [Red Hat Crash Utility]


  Powered by Linux