|
Thanks, Sully! It will save me some restless nights. ;-) I'm going to look into the pppoe more closely, but probably will not implement it for a few months. Talking about WEP keys, I have all 4 WEP keys listed in the appo and on the airBridges. I've just tried flipping the default key on the appo from key 1 to key 2, but lost all the airBridges. I guess the airBridges don't have a cycling method to check for the next WEP key, huh? That would be a nice feature, I think. Kind regards, Sevak On Thu, 2003-09-18 at 12:10, The Wirefree Network wrote: The amount of traffic that MUST be sniffed to crack WEP is HUGE. I sniffed traffic for 72 hours at the head-end (which hears ALL traffic on my network), and I did not receive a single “interesting packet”. You need thousands or even millions of “interesting packets” to crack WEP. After successfully cracking WEP, the hacker would need to sniff the MAC and IP pairing (not difficult), spoof them, and overpower the legitimate client so that he drops off the network, and then you can assume his identity. |
- [smartBridges] Do it yourself T1 configurati... Rudolph Worrell
- RE: [smartBridges] Do it yourself T1 con... Kevin Summers
- RE: [smartBridges] Do it yourself T1... Rudolph Worrell
- Re: [smartBridges] Do it yourself T1 con... George
- Re: [smartBridges] Do it yourself T1... John Hokenson
- RE: [smartBridges] Do it yourse... Rudolph Worrell
- RE: [smartBridges] Do it yourself T1... Rudolph Worrell
- RE: [smartBridges] Stealing service The Wirefree Network
- RE: [smartBridges] Stealing service Sevak Avakians
- RE: [smartBridges] Stealing service The Wirefree Network
- RE: [smartBridges] Stealing service Sevak Avakians
- RE: [smartBridges] Stealing service The Wirefree Network
- RE: [smartBridges] Stealing ser... Sevak Avakians
