Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: FyreMouse; Keyword(s):

Search: Search took 0.01 seconds.

  1. Replies
    15
    Views
    1,265

    th13 has it right. They are your customers not...

    th13 has it right. They are your customers not the other way around.

    The contractors need to have certain realities explained to them.

    1. They are already allowed to place thier own laptops on...
  2. Replies
    17
    Views
    1,102

    You may want to verify if the certificate is...

    You may want to verify if the certificate is valid. if it's not there is a good chance you're being hijacked probably on either side of your router. Applications such as Cain and Abel (www.oxid.it)...
  3. Replies
    17
    Views
    1,102

    when you accepted the certificate....read it...

    when you accepted the certificate....read it carefully....was it expired?
  4. Replies
    29
    Views
    2,987

    Aquiring network address means just that, it is...

    Aquiring network address means just that, it is attempting to renew or recieve an IP lease. It is not likely to be a problem with WEP/WPA if it was it would not get to the point of aquiring an IP, it...
  5. Replies
    10
    Views
    1,190

    Traditionally the big service providers use...

    Traditionally the big service providers use products like CA's Unicenter, Spectrum, or Micromuse to monitor and provision MAC addresses via several different methods of auto-discovery and ACL's. The...
  6. Cisco Aironet Access Point vulnerability to RF attack?

    I remember reading awhile back that the Cisco Aironet series of Access point (wireless 802.11 router/access point) was vulnerable to an RF based attack that caused a hard reset of the device....
  7. Replies
    29
    Views
    2,906

    Am I correct in assuming the assignment of the...

    Am I correct in assuming the assignment of the multiple IP's to a single nic is a very manual process. Since this appears to be heavy on the admin side is there a way to do this dynamically? Or...
  8. Replies
    29
    Views
    2,906

    The VPN solution has become my recomendation when...

    The VPN solution has become my recomendation when I talk to clients if they ask about a WLAN.

    It's just simple logic, there is an overhead for cost when employing the solution, but it's a an easy...
  9. Replies
    22
    Views
    2,745

    Changing your MAC address can be used for the...

    Changing your MAC address can be used for the powers of good.
    For instance:
    Hot swappable/backup NICs, your network is using MAC address filtering on it's Switches, the NIC on one of your...
  10. Replies
    29
    Views
    2,906

    I'm a bit unclear on the actual environment we're...

    I'm a bit unclear on the actual environment we're discussing here, but here it goes….

    The College provides a network drop to anyone with a laptop.

    What are the needs or concerns of the...
  11. Replies
    5
    Views
    694

    Also check out CA.com, there are a number of...

    Also check out CA.com, there are a number of whitepapers on wireless security there as well. just search for wireless.

    Also check out:

    www.wifinetnews.com
    www.wifiplanet.com


    Cheers,...
  12. Thread: Wireless

    by FyreMouse
    Replies
    10
    Views
    741

    802.11 a vs b/g and USB

    1. 802.11a has an ideal range of 75-150 feet for the unit past that and you can expect around 56k for an average connection and a great deal of interference can be expected such as lost signal ect....
Results 1 to 12 of 12

 Security News

     Patches

       Security Trends

         How-To

           Buying Guides