On Fri, Aug 06, 2004 at 11:01:54AM -0700, Michael Scully wrote: > Of course it's POSSIBLE. Cracking the WEP is pretty easy with some > hacker tools available. Even spoofing MAC addresses isn't all that hard. > But KNOWING which MAC addresses are valid, out of the 2^24 possible > addresses for the 2^24 possible vendor codes, is another thing. If you've broken the encryption, you then just watch the packets to see which MAC addresses are valid. The bad guy will get one in a day. .../Ed -- Ed Wilts, RHCE Mounds View, MN, USA mailto:ewilts@xxxxxxxxxx Member #1, Red Hat Community Ambassador Program -- redhat-list mailing list unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe https://www.redhat.com/mailman/listinfo/redhat-list