Security Basics mailing list archives
RE: RE: Wireless Security (Part 2)
From: "Ebeling, Jr., Herman Frederick" <hfebelingjr () lycos com>
Date: Sat, 20 May 2006 19:50:40 -0400
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ----Original Message---- From: mikem () mentges org [mailto:mikem () mentges org] Sent: Wednesday, 17 May, 2006 15:08 To: security-basics () securityfocus com Subject: Re: RE: Wireless Security (Part 2) : Murad Talukdar - : : It is reasons like yours that democracy exists. : It is your right in the USA (if so you live here) and several other : countries to evaluate anything you want on any system attaching to : something you own. (I am not very knowledgeable about other : countries IT policies.) : I feel as the owner of any network system that one must take it : upon themselves to monitor/maintain/evaluate your network : constantly for possible threats or rogue devices. If the proper : steps are taken to ensure proper client : registration/authentication/verification then all unknown devices : should be identified in any way possible to prevent : unauthorized/malicious content. If your wireless is seeing too many : users try reducing your signal strength, and if it is for a : neighbors benefit I suggest cutting them off. : As security moves forward it is a matter of time before "IP : tapping" begins (It already is beginning for some of you I know). : With that said every time you call tech support and give them your : name, address or even in some cases your SS# they place that : information in to a database that accesses all information they : need to identify you and the hardware they installed or you : registered at your house. Somewhere in your agreement you signed : (digitally or physical) it states you are responsible for anything : connected to the device. So I ask you, is it still an issue to find : out who is using your internet access at all times? What would : happen if your guest grabbed some child pornography, yes you would : have some definite issues that is for certain. Or with the laws on : "National Security" you have someone jump on your network, download : plans for a nuclear attack all the while spoofing your machine just : because they need to hide. It is not very hard and could happen : more than you o r I would want to know. Now I know this might sound : paranoid or obsessive compulsive but what happens when you get : raided and they take everything and scare the hell out of your : family/friends. No they dont give you your stuff back and you : might get off without any issues. That is if you can prove you : dont know who is on your system. : Please do what you can to secure your information; convenience is : not always a good thing! Mike, You raise some very good concerns/questions. And I would in response to your statement that it could sound to be "paranoid or obsessive compulsive," but I would answer with the "old joke" of "Just because your paranoid, doesn't mean that there isn't someone is after you." And I agree that everything that is going on in today's world that that "innocent" Wi-Fi leach could very well be the next 9/11 terrorist/bomber, or a pedophile that hasn't be caught yet. As you've said there are a LOT of legitimate reasons for someone who has deployed any kind of network to identify each and EVERY device that is connected to it. - ----- Herman Live Long and Prosper ___________________ _-_ \==============_=_/ ____.---'---`---.____ \_ \ \----._________.----/ \ \ / / `-_-' __,--`.`-'..'-_ /____ ||- `--.____,-' -----BEGIN PGP SIGNATURE----- Version: PGP 8.0.3 Comment: Space the Final Frontier iQA/AwUBRG+rTh/i52nbE9vTEQJDKQCgl/nuVtVWPtFCWnxXsGQDt0Ceik4AoMDr U45nW+XzKj/Blzf5bsO9p0Ur =/LEf -----END PGP SIGNATURE-----
Current thread:
- Re: Wireless Security (Part 2), (continued)
- Re: Wireless Security (Part 2) Robb Wait (May 20)
- RE: Wireless Security (Part 2) Bob Radvanovsky (May 16)
- RE: Wireless Security (Part 2) Craig Wright (May 17)
- RE: Wireless Security (Part 2) Craig Wright (May 17)
- RE: Wireless Security (Part 2) Murad Talukdar (May 17)
- RE: Wireless Security (Part 2) Ebeling, Jr., Herman Frederick (May 20)
- RE: Wireless Security (Part 2) Craig Wright (May 20)
- Re: Wireless Security (Part 2) Ian Scott (May 23)
- RE: Wireless Security (Part 2) Ebeling, Jr., Herman Frederick (May 23)
- Re: Wireless Security (Part 2) Ian Scott (May 23)
- Re: RE: Wireless Security (Part 2) mikem (May 20)
- RE: RE: Wireless Security (Part 2) Ebeling, Jr., Herman Frederick (May 23)
- RE: RE: Wireless Security (Part 2) Lloydm (May 23)
- Re: RE: Wireless Security (Part 2) Ansgar -59cobalt- Wiechers (May 24)
- RE: RE: Wireless Security (Part 2) Ebeling, Jr., Herman Frederick (May 23)
- RE: RE: Wireless Security (Part 2) Murad Talukdar (May 23)
- RE: Wireless Security (Part 2) Craig Wright (May 23)
- Re: Wireless Security (Part 2) Ian Scott (May 24)
- RE: Wireless Security (Part 2) Craig Wright (May 24)
- RE: Wireless Security (Part 2) Craig Wright (May 24)
- Re: Wireless Security (Part 2) Ian Scott (May 24)
- RE: Wireless Security (Part 2) Craig Wright (May 24)
- Re: Wireless Security (Part 2) Ian Scott (May 24)