1 -0800
>From: Gene <[EMAIL PROTECTED]>
>User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.0.1)
Gecko/20021003
>X-Accept-Language: en-us, en
>MIME-Version: 1.0
>To: "Boschmann, Armin" <[EMAIL PROTECTED]>
>Cc: "'[EMAIL PROTECTED]'
t; <[EMAIL PROTECTED]>;
<[EMAIL PROTECTED]>
Sent: Monday, December 09, 2002 9:08 PM
Subject: RE: Wireless LAN detection
> There is a free 1 hour Web Seminar coming up on December 12, 2002.
> Securing wireless networks: A best practices approach
>
> If you are interested in atte
, Enhancing, and Maintaining your Voice and Data
Interactions.
Toll free: 1-866-NEXSEL4 (639-7354) ext 1103
-Original Message-
From: Boschmann, Armin [mailto:[EMAIL PROTECTED]]
Sent: Friday, December 06, 2002 11:45 AM
To: '[EMAIL PROTECTED]'
Subject: Wireless LAN detection
Sent: Friday, December 06, 2002 10:45 AM
To: '[EMAIL PROTECTED]'
Subject: Wireless LAN detection
We have a policy of no-wireless at our sites. I want to audit this
policy,
similar to war-dialing, or more correctly war-driving.
My thinking is to find illegal wireless equipment in realtime.
listening for association frames. I would consider this a good place to get
started...
-Mike
-Original Message-
From: Boschmann, Armin [mailto:[EMAIL PROTECTED]]
Sent: Friday, December 06, 2002 12:45 PM
To: '[EMAIL PROTECTED]'
Subject: Wireless LAN detection
We have a po
you could look at software like netreg to identify unknow hosts that
connects to your network and start your audit policy from that point...
gene
Boschmann, Armin wrote:
We have a policy of no-wireless at our sites. I want to audit this policy,
similar to war-dialing, or more correctly war-driv
[EMAIL PROTECTED]]
> Sent: Friday, December 06, 2002 1:45 PM
> To: '[EMAIL PROTECTED]'
> Subject: Wireless LAN detection
>
>
> We have a policy of no-wireless at our sites. I want to
> audit this policy, similar to war-dialing, or more correctly
> war-driving.
PROTECTED]'
Subject: Wireless LAN detection
We have a policy of no-wireless at our sites. I want to audit this policy,
similar to war-dialing, or more correctly war-driving.
My thinking is to find illegal wireless equipment in realtime. My concern
is insiders (temporary employees, contractors,
: '[EMAIL PROTECTED]'
Subject: Wireless LAN detection
We have a policy of no-wireless at our sites. I want to audit this
policy,
similar to war-dialing, or more correctly war-driving.
My thinking is to find illegal wireless equipment in realtime. My
concern
is insiders (temporary
ng a pager or sending an e-mail via a dial-on-demand TCP/IP connection.
-Original Message-
From: Boschmann, Armin [mailto:[EMAIL PROTECTED]]
Sent: Friday, December 06, 2002 11:45 AM
To: '[EMAIL PROTECTED]'
Subject: Wireless LAN detection
We have a policy of no-wireless at o
We have a policy of no-wireless at our sites. I want to audit this policy,
similar to war-dialing, or more correctly war-driving.
My thinking is to find illegal wireless equipment in realtime. My concern
is insiders (temporary employees, contractors, 'bad' employees) plugging in
a wireless acc
11 matches
Mail list logo