Vulnerability Development mailing list archives

Wireless device vulnerability?


From: "Meritt James" <meritt_james () bah com>
Date: Fri, 22 Mar 2002 09:17:49 -0500

Please excuse the search for a low-tech vulnerability to a high-tech
implementation.

How susceptible are various wireless networking implementations to
jamming (as a means to a DoS)?

Thank you.
-- 
James W. Meritt CISSP, CISA
Booz | Allen | Hamilton
phone: (410) 684-6566


Current thread: