blitz wrote:
And you think the terresterial sources are hard to shut down
Drive-by spam hits wireless LANs
By Graeme Wearden
Special to CNET News.com
September 6, 2002, 10:14 AM PT
http://news.com.com/2100-1033-956911.html
LONDON--The proliferation of insecure
Neil J. McRae wrote:
I must be honest, I havn't heard of any reports here in Sweden (or
anywhere else) that this is a real problem, are there any true incidents
that this has happend?
Yes. If you sit with your laptop in the park across from our office
you can see 3 unprotected wireless
Just cause there are unprotected WLANs dosn't imply that spammers use
them (perhaps its to hard for the spammers ;)).
Corporations should protect ther WLANs but saying that spamming is a
great threat is to overdo it.
I agree, but people said that the spammers wouldn't be able to
deal with
Neil J. McRae wrote:
Just cause there are unprotected WLANs dosn't imply that spammers use
them (perhaps its to hard for the spammers ;)).
Corporations should protect ther WLANs but saying that spamming is a
great threat is to overdo it.
I agree, but people said that the spammers wouldn't
On Wed, Sep 11, 2002 at 12:45:23PM +0200, John Angelmo wrote:
Just cause there are unprotected WLANs dosn't imply that spammers use
them (perhaps its to hard for the spammers ;)).
Corporations should protect ther WLANs but saying that spamming is a
great threat is to overdo it.
To
I agree, but people said that the spammers wouldn't be able to
deal with BGP route advertisement but there was cases of spammers
injecting routes sending out spam then removing those routes. Wlan is
easy.
Spammers come from every walk of life including the various technical
professions.
,
_
Alan Rowland
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf Of
Neil J. McRae
Sent: Wednesday, September 11, 2002 3:37 AM
To: John Angelmo
Cc: blitz; [EMAIL PROTECTED]
Subject: Re: Drive-by spam hits wireless LANs
I must be honest, I
Jared Mauch wrote:
Imagine a few of the following scenarios:
1) You wok for an ISP and have access through them. One large
enough that they apply their AUP to their own people. You have ISDN/DSL
or some other connection w/ reverse-dns for your personal domain home.
Someone
,
_
Alan Rowland
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf Of
Jared Mauch
Sent: Wednesday, September 11, 2002 5:01 AM
To: John Angelmo
Cc: Neil J. McRae; blitz; [EMAIL PROTECTED]
Subject: Re: Drive-by spam hits wireless LANs
On Wed, Sep 11
On Wed, Sep 11, 2002 at 07:08:53PM +0200, John Angelmo wrote:
Jared Mauch wrote:
In some way you are right, but still I think it's even worse to use WEP
cause then the admins might think it's safe, it takes about 15 minutes
to crack a wepkey, so instead of drive-by spamming you could call
This is what console ports / direct cable connects to a mgmt
port (usb or whatnot) are useful for. As well as an overall 'clear config'
button on the unit.
Now if someone can help me figure out the unlock code
for the microwave in the house i bought so i can stop
unplugging
In some way you are right, but still I think it's even worse to use WEP
cause then the admins might think it's safe, it takes about 15 minutes
to crack a wepkey, so instead of drive-by spamming you could call it
drive-by, have a bagle, start spamming.
WEP != security, true.
The most
:[EMAIL PROTECTED]]
Sent: Wednesday, September 11, 2002 10:16 AM
To: Al Rowland
Cc: [EMAIL PROTECTED]
Subject: Re: Drive-by spam hits wireless LANs
This is what console ports / direct cable connects to a mgmt
port (usb or whatnot) are useful for. As well as an overall 'clear
config' button
* [EMAIL PROTECTED] (Al Rowland) [Wed 11 Sep 2002, 19:13 CEST]:
The cost of enabling/labeling may be only a 'few cents more' but the
cost of support when Joe Sixpack forgets his key/loses the label is
another story altoghether. There's a reason most equipment, not just
wireless, is deliverd
On Wed, 11 Sep 2002, Jared Mauch wrote:
There are a lot of things one can do:
1) enable wep
2) rotate wep keys
3) authenticate by mac-address
4) restrict dhcp to known mac-addresses
5) force utilization of vpn/ipsec client
Suddenly laying down UTP
{WEP != encryption... thread}
As it happens, I'm looking at a consumer 802.11 product that will
have real encryption.
It should be released Real Soon Now I'll be happy to say more
when that happens..
--
A host is a host from coast to [EMAIL PROTECTED]
no one will talk to a host that's
* [EMAIL PROTECTED] (David Lesher) [Wed 11 Sep 2002, 20:38 CEST]:
As it happens, I'm looking at a consumer 802.11 product that will
have real encryption.
It should be released Real Soon Now I'll be happy to say more
when that happens..
No Wires Needed is among the companies working on
Getting your entire corporate LAN dumped into the RBL mess could be
devastating, how much productivity lost? How much time wasted getting OFF
the RBL? How many contacts missed, correspondences missed?
You could be getting into a very rough ride for some days to some weeks, as
the block
And you think the terresterial sources are hard to shut down
Drive-by spam hits wireless LANs
By Graeme Wearden
Special to CNET News.com
September 6, 2002, 10:14 AM PT
http://news.com.com/2100-1033-956911.html
LONDON--The proliferation of insecure corporate wireless networks
It always figures, that when you create a commons, virtual or actual that
someone will come along and mess it up.
joelja
On Tue, 10 Sep 2002, blitz wrote:
And you think the terresterial sources are hard to shut down
Drive-by spam hits wireless LANs
By Graeme Wearden
20 matches
Mail list logo