The UK Home Automation Archive

Archive Home
Group Home
Search Archive


Advanced Search

The UKHA-ARCHIVE IS CEASING OPERATIONS 31 DEC 2024


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: Wireless security


  • To: ukha_d@xxxxxxx
  • Subject: RE: Wireless security
  • From: Craig Callander <craig@xxxxxxx>
  • Date: Wed, 29 Aug 2001 10:09:59 -0500
  • Delivered-to: rich@xxxxxxx
  • Delivered-to: mailing list ukha_d@xxxxxxx
  • Mailing-list: list ukha_d@xxxxxxx; contact ukha_d-owner@xxxxxxx
  • Reply-to: ukha_d@xxxxxxx

Mark/John/Other wireless epoders

I recall you are running linksys 802.11b. Are you running 128bit encryption
with the epod??

The reason I ask is my SMC AP is configured with no encryption as default.
After reading documentation, I read to use 128bit encryption you must
configure 2000/NT/9x/Me drivers and AP. I can see no option with my CE
drivers to change encryption level.

Cheers

Craig

-----Original Message-----
From: Dr John Tankard [mailto:john@xxxxxxx]
Sent: Wednesday, August 29, 2001 3:31 PM
To: UKHA
Subject: [ukha_d] Wireless security


Just red this from Silicon

Hackers are storming wireless networks with AirSnort, a new program
designed
to attack one of the most established wireless standards on the market.

AirSnort allows hackers to capture data transmitted over any wireless
network supposedly protected by the Wired Equivalent Privacy (WEP) system,
otherwise known as the 802.11b standard, which encrypts information as it
is
transmitted.

The 802.11b standard transmits in direct sequence connections over public
airwaves that are also shared by television, radio and mobile phone
transmissions.

When sufficient data is collected, AirSnort pieces together the system's
password.

US security company, Argus, is in agreement with AirSnort developers who
believe 802.11b is an insecure and easily hackable encryption mechanism.

AirSnort developers said as well as allowing users to infiltrate networks,
the program is a slap in the face to those that denied previous rumours
that
the standard was insecure and inappropriate for corporate use.

An earlier released tool called WEPcrack is also able to hack into the
wireless standard, but not as quickly as AirSnort.




For more information: http://www.automatedhome.co.uk
Post message: ukha_d@xxxxxxx
Subscribe:  ukha_d-subscribe@xxxxxxx
Unsubscribe:  ukha_d-unsubscribe@xxxxxxx
List owner:  ukha_d-owner@xxxxxxx

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/



Home | Main Index | Thread Index

Comments to the Webmaster are always welcomed, please use this contact form . Note that as this site is a mailing list archive, the Webmaster has no control over the contents of the messages. Comments about message content should be directed to the relevant mailing list.