baza wrote:
What you have to remember is not to trust any security on your network.
But, you can over do it. All of the 'hackers' I know won't sit outside
your house trying to crack your WEP to get your eBay password etc.
One of the simplest things you can do to keep people off your
Hi Folks
Some clarity on these times to break please!
Is this done by snooping the traffic that is going between the computer and
router or by bombarding the router with various keys until it responds?
Anyone know for sure? I know a couple of guys who work on computer
crypotography and they
On Wed, 2007-06-13 at 19:50 +0100, Ian Pascoe wrote:
Hi Folks
Some clarity on these times to break please!
Is this done by snooping the traffic that is going between the computer and
router or by bombarding the router with various keys until it responds?
Anyone know for sure? I know a
On Wed, 13 Jun 2007 19:50:49 +0100, Ian Pascoe [EMAIL PROTECTED] wrote:
Hi Folks
Some clarity on these times to break please!
Is this done by snooping the traffic that is going between the computer
and
router or by bombarding the router with various keys until it responds?
Anyone know
On Wed, 2007-06-13 at 20:09 +0100, Dave Walker wrote:
On Wed, 2007-06-13 at 19:50 +0100, Ian Pascoe wrote:
Hi Folks
Some clarity on these times to break please!
Is this done by snooping the traffic that is going between the computer and
router or by bombarding the router with
There was a recent Security Now podcast that explains this topic quite
well. It think it has been linked to before on this list, but here you
go anyway. http://media.grc.com/sn/SN-089.mp3
Happy listening,
Steve
What you have to remember is not to trust any security on your