Does anyone out there know what realistic problems exist with wirless
networks?

We use several point-to-point devices, and point-to-multipoint.  Is it
possible for someone to evasdrop on the point-to-points?  Is that type of
equipment avaliable to the common/avid user to allow them to perform such
activites?

Also, it's all good protecting your network from outside attacks, but what
about internal attacks?  I would assume one must be more cunning when
attempting to prevent internal compromises!

I'd like to hear what you all think about these issues.

(Thank you in advance)
Dickon...

Reply via email to