Results 1 to 5 of 5

Thread: 802.11 goes bye-bye...

  1. #1
    Join Date
    Oct 2001

    Exclamation 802.11 goes bye-bye...

    Lawrence Livermore National Laboratory said it has banned the use of wireless computer networks at its facilities over concerns that security flaws in such systems could leave classified information vulnerable to hackers.
    Im pretty sure that there not doing this against hackers..... But instead, terrorists... You see, LLNL is a nuclear research lab... All the wireless network use a frequency of 802.11 and 2.4 Ghz.. So time to time... You get booted off of the network.. Or garbled phone calls in the area.... Corrupted data transfer,... etc.
    The lab, which produces research on nuclear weapons and other national defense technologies, disabled the two wireless local area networks that were in use at its Livermore, Calif., campus as a result of the ban, instituted in mid-January, said David Schwoegler, a spokesman for the lab. One of the wireless networks at the lab was used at its waste disposal division.
    Whats your opinion on all this ?
    The whole story is here.
    Wireless networks open to hacks

  2. #2
    The wireless standard of 802.11 and 2.4 Ghz are considered EXTREMELY vulnerable to break in's from the side of hackers, it is totally unprotected! There had been a test when 2 computer experts working in airport broke in that kind of network, to demonstrate it's security breaches.

  3. #3
    Senior Member
    Join Date
    Nov 2001
    Wireless going secure?

    --4 February 2002 Improving 802.11b Security
    Wireless networking standards 802.11a and 802.11b are both popular and
    vulnerable. A new security algorithm, called Temporal Key Integrity
    Protocol is being tested. It generates a new encryption key for every
    ten kilobytes of data transmitted.,aid,82563,00.asp

  4. #4
    Priapistic Monk KorpDeath's Avatar
    Join Date
    Dec 2001
    To secure wireless networks you need to run a decent VPN and personal firewalls. Some sort of requirment enforcement would be useful like the VPN Enforcer from Sygate. You can set conditions that remote users need to meet before allowing access to the VPN. For example a user must have (in this case) Sygate personal firewall running and an up to date policy puls be running an accepted virus scanning software and it will also check to see if the registry have been compromised and it'll also check for specific files (i.e. goner.scr, etc. )

    It's a pretty big task but wireless can be somewhat secure.
    Mankind have a great aversion to intellectual labor; but even supposing knowledge to be easily attainable, more people would be content to be ignorant than would take even a little trouble to acquire it.
    - Samuel Johnson

  5. #5
    Join Date
    Oct 2001
    Its almost impossible to secure wireless networks.... Because sooner or later someone (whether it be a script kiddie or a hacker) Is gonna trip over it And when they do.... Well.... You know what happens...

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts