[Date Prev][Date Next][Subject Prev][Subject Next][ Date Index][ Subject Index]

Re: Wireless access (off topic)



One other possibility that no one thinks about --
probably because it is less common -- is that if
someone wants to conduct some seriously illegal
activity online, maybe one of the better ways to do it
is to "borrow" someone else's wireless signal and
account for doing it. The more obvious electronic
fingerprints left behind will point to someone else.
Have fun explaining that when the FBI or Homeland
Security turn up at your door ! Perhaps that's one
reason the Dutch had things locked down pretty tight.

--- Robert Holmgren  wrote:

> FYI, WEP is full of holes too.

Please elaborate. And the other wireless security
standards ?


Jordan