On 24 Oct 2005 at 11:39, Carl Houseman wrote:

> An even more determined hacker can spoof any MAC address and use your
> network when your device with that MAC address is powered off.  (unless
> thwarted by encryption)

Or better yet, knock your wireless computer off the wlan, causing you to 
reassociate a bunch of times, giving them enough traffic to crack your 
key....
-- 
Harondel J. Sibble 
Sibble Computer Consulting
Creating solutions for the small business and home computer user.
[EMAIL PROTECTED] (use pgp keyid 0x3AD5C11D) http://www.pdscc.com
(604) 739-3709 (voice/fax)      (604) 686-2253 (pager)

--
                ----------------------------------------
WIN-HOME Archives:  http://PEACH.EASE.LSOFT.COM/archives/WIN-HOME.html
Contact the List Owner about anything:  [EMAIL PROTECTED]
Official Win-Home List Members Profiles Page
 http://www.besteffort.com/winhome/Profiles.html

Reply via email to