Security Basics mailing list archives
RE: RE: Wireless Security (Part 2)
From: "Lloydm" <cocohill () telus net>
Date: Tue, 23 May 2006 09:17:59 -0700
All of these issues are FINALLY no longer issues with the soon to be "officially" release system from www.kmdo.com. 100% security, guaranteed! Sincerely, Lloyd Merrifield President COCOHILL CONSULTANTS LTD. Phone: (604) 808 8503 Fax: (604) 926 8804 Ph/Fax: (866) 467 3550 email(regular): cocohill () telus net email(secure): lloyd () kmdo net -----Original Message----- From: Ebeling, Jr., Herman Frederick [mailto:hfebelingjr () lycos com] Sent: May 20, 2006 4:51 PM To: mikem () mentges org; security-basics () securityfocus com Subject: RE: RE: Wireless Security (Part 2) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ----Original Message---- From: mikem () mentges org [mailto:mikem () mentges org] Sent: Wednesday, 17 May, 2006 15:08 To: security-basics () securityfocus com Subject: Re: RE: Wireless Security (Part 2) : Murad Talukdar - : : It is reasons like yours that democracy exists. : It is your right in the USA (if so you live here) and several other : countries to evaluate anything you want on any system attaching to : something you own. (I am not very knowledgeable about other : countries IT policies.) : I feel as the owner of any network system that one must take it : upon themselves to monitor/maintain/evaluate your network : constantly for possible threats or rogue devices. If the proper : steps are taken to ensure proper client : registration/authentication/verification then all unknown devices : should be identified in any way possible to prevent : unauthorized/malicious content. If your wireless is seeing too many : users try reducing your signal strength, and if it is for a : neighbors benefit I suggest cutting them off. : As security moves forward it is a matter of time before "IP : tapping" begins (It already is beginning for some of you I know). : With that said every time you call tech support and give them your : name, address or even in some cases your SS# they place that : information in to a database that accesses all information they : need to identify you and the hardware they installed or you : registered at your house. Somewhere in your agreement you signed : (digitally or physical) it states you are responsible for anything : connected to the device. So I ask you, is it still an issue to find : out who is using your internet access at all times? What would : happen if your guest grabbed some child pornography, yes you would : have some definite issues that is for certain. Or with the laws on : "National Security" you have someone jump on your network, download : plans for a nuclear attack all the while spoofing your machine just : because they need to hide. It is not very hard and could happen : more than you o r I would want to know. Now I know this might sound : paranoid or obsessive compulsive but what happens when you get : raided and they take everything and scare the hell out of your : family/friends. No they don’t give you your stuff back and you : might get off without any issues. That is if you can prove you : don’t know who is on your system. : Please do what you can to secure your information; convenience is : not always a good thing! Mike, You raise some very good concerns/questions. And I would in response to your statement that it could sound to be "paranoid or obsessive compulsive," but I would answer with the "old joke" of "Just because your paranoid, doesn't mean that there isn't someone is after you." And I agree that everything that is going on in today's world that that "innocent" Wi-Fi leach could very well be the next 9/11 terrorist/bomber, or a pedophile that hasn't be caught yet. As you've said there are a LOT of legitimate reasons for someone who has deployed any kind of network to identify each and EVERY device that is connected to it. - ----- Herman Live Long and Prosper ___________________ _-_ \==============_=_/ ____.---'---`---.____ \_ \ \----._________.----/ \ \ / / `-_-' __,--`.`-'..'-_ /____ ||- `--.____,-' -----BEGIN PGP SIGNATURE----- Version: PGP 8.0.3 Comment: Space the Final Frontier iQA/AwUBRG+rTh/i52nbE9vTEQJDKQCgl/nuVtVWPtFCWnxXsGQDt0Ceik4AoMDr U45nW+XzKj/Blzf5bsO9p0Ur =/LEf -----END PGP SIGNATURE----- -- No virus found in this incoming message. Checked by AVG Free Edition. Version: 7.1.392 / Virus Database: 268.7.0/345 - Release Date: 22/05/2006 -- No virus found in this outgoing message. Checked by AVG Free Edition. Version: 7.1.392 / Virus Database: 268.7.0/345 - Release Date: 22/05/2006
Current thread:
- RE: Wireless Security (Part 2), (continued)
- RE: Wireless Security (Part 2) Bob Radvanovsky (May 16)
- RE: Wireless Security (Part 2) Craig Wright (May 17)
- RE: Wireless Security (Part 2) Craig Wright (May 17)
- RE: Wireless Security (Part 2) Murad Talukdar (May 17)
- RE: Wireless Security (Part 2) Ebeling, Jr., Herman Frederick (May 20)
- RE: Wireless Security (Part 2) Craig Wright (May 20)
- Re: Wireless Security (Part 2) Ian Scott (May 23)
- RE: Wireless Security (Part 2) Ebeling, Jr., Herman Frederick (May 23)
- Re: Wireless Security (Part 2) Ian Scott (May 23)
- Re: RE: Wireless Security (Part 2) mikem (May 20)
- RE: RE: Wireless Security (Part 2) Ebeling, Jr., Herman Frederick (May 23)
- RE: RE: Wireless Security (Part 2) Lloydm (May 23)
- Re: RE: Wireless Security (Part 2) Ansgar -59cobalt- Wiechers (May 24)
- RE: RE: Wireless Security (Part 2) Ebeling, Jr., Herman Frederick (May 23)
- RE: RE: Wireless Security (Part 2) Murad Talukdar (May 23)
- RE: Wireless Security (Part 2) Craig Wright (May 23)
- Re: Wireless Security (Part 2) Ian Scott (May 24)
- RE: Wireless Security (Part 2) Craig Wright (May 24)
- RE: Wireless Security (Part 2) Craig Wright (May 24)
- Re: Wireless Security (Part 2) Ian Scott (May 24)
- RE: Wireless Security (Part 2) Craig Wright (May 24)
- Re: Wireless Security (Part 2) Ian Scott (May 24)