Security Basics mailing list archives
RE: Wireless access
From: "Dante Mercurio" <Dante () webcti com>
Date: Thu, 25 Mar 2004 15:44:47 -0500
First off, have him tip off the neighbor that his wireless is completely insecure. Then, go into the Advanced config of the wireless connection, you will see a box that shows the known wireless hosts and the order they will be attached to. Make sure his wireless router SSID is listed above his neighbor's. Then make sure HIS wireless is as secure as possible. For most home systems, that means the following: 1) Do not broadcast SSID 2) Restrict access by MAC addresses 3) Use WEP Good Luck, M. Dante Mercurio dante () webcti com Consulting Group Manager Continental Technologies, Inc www.webcti.com -----Original Message----- From: Bruyere, Michel [mailto:mbruyere () ezemcanada com] Sent: Thursday, March 25, 2004 8:36 AM To: security-basics () securityfocus com Subject: Wireless access Hi, I have a user who uses a wireless network at home. He just asked me (it's a director) to find a way to avoid his laptop (Toshiba tecra running XP Pro) connecting on the neighbor's router instead of his. He has a D-Link 614+, I don't know this model at all so I'm asking you guys if you know 614+a way to restrict his laptop to only HIS router. As you can see, I'm not very familiar with Wireless :/ Thanks for any inputs M.Bruyere Network/systems administrator CompTIA A+, Network+ ------------------------------------------------------------------------ --- Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off any course! All of our class sizes are guaranteed to be 10 students or less to facilitate one-on-one interaction with one of our expert instructors. Attend a course taught by an expert instructor with years of in-the-field pen testing experience in our state of the art hacking lab. Master the skills of an Ethical Hacker to better assess the security of your organization. Visit us at: http://www.infosecinstitute.com/courses/ethical_hacking_training.html ------------------------------------------------------------------------ ---- --------------------------------------------------------------------------- Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off any course! All of our class sizes are guaranteed to be 10 students or less to facilitate one-on-one interaction with one of our expert instructors. Attend a course taught by an expert instructor with years of in-the-field pen testing experience in our state of the art hacking lab. Master the skills of an Ethical Hacker to better assess the security of your organization. Visit us at: http://www.infosecinstitute.com/courses/ethical_hacking_training.html ----------------------------------------------------------------------------
Current thread:
- Wireless access Bruyere, Michel (Mar 25)
- Re: Wireless access Kenton Smith (Mar 25)
- <Possible follow-ups>
- RE: Wireless access CHRIS GRABENSTEIN (Mar 25)
- RE: Wireless access Wesley Ward (Mar 25)
- RE: Wireless access Paul John Summers (Mar 25)
- Re: Wireless access Kenton Smith (Mar 26)
- RE: Wireless access Kelly Jones (Mar 26)
- RE: Wireless access David Gillett (Mar 26)
- Re: Wireless access Ellis, Wong Chung Yee (Mar 26)
- RE: Wireless access Kirk.Brookover (Mar 26)
- RE: Wireless access Dante Mercurio (Mar 26)
- RE: Wireless access Peter Martin (Mar 26)
- RE: Wireless access Thomas F. Szabo (Mar 26)
- RE: Wireless access Jordan, Jason D. "Dallas" (Mar 26)
- RE: Wireless access Robert Mezzone (Mar 26)
- Re: Wireless access John S . Whitford (Mar 26)
- Re: Wireless access John S . Whitford (Mar 29)
- RE: Wireless access David (Mar 29)
- RE: Wireless access Kenton Smith (Mar 29)
- RE: Wireless access Joe Thompson (Mar 30)
- RE: Wireless access Rosado, Rafael (Rafael) (Mar 26)
(Thread continues...)