Legal wi-fi jamming

Thursday, June 15th, 2006

I’ve heard rumors of how the 802.11 pre-n wireless networking hardware really KILLS nearby 802.11 wireless b/g networks. Today George Ou has some details. I really think this is a serious problem with the equipment coming out as it will force people to move to another wireless standard. (Somehow, this is all starting to make […]

What a week….

Wednesday, February 8th, 2006

I think it’s time to pass along a long story of what’s gone on over the last week or so here and some of the reasons there hasn’t been anything posted. Generally, I would say that work has been busy, but something happened last week that went a bit beyond the day to day and […]

Network Security – Arp spoofing series

Monday, January 30th, 2006

I think I’ve wrapped up the series on arp spoofing and it’s implications for network security. I know there’s nothing earth shattering here, most network security types are well aware of the problems (and perhaps aware of more sophisticated solutions?). For some though, this series is likely an eye opener as there are myths that […]

Network Security – how should an open wireless access point be run beside a safe network?

Monday, January 30th, 2006

So, let’s say we want to have an open wireless access point for some reason. (Maybe offering it to guests if you’re a business?) There are certainly a lot of BAD ways to give open wireless access. As we’ve seen in this series so far, it could be quite easy to hijack all connections in […]

Network security – what does arp spoofing mean for wireless?

Monday, January 30th, 2006

So, if you haven’t already had enough cause to tighten your wireless security…. we’ve been talking about arp poisoning (spoofing) and the basic conclusion is that IF an attacking machine is on the same subnet as your machine (same IP address range), they can “own” all traffic from you machine to the gateway. It doesn’t […]

Network security – how safe is your network? Looking at ARP

Monday, January 30th, 2006

A while back I did a network security series and one of the points that I mentioned was that it’s important to know what is normal for your network. In other words, what machines are NORMALLY connected, what services are normally running, etc. Well, I’m about to start a serious look at something that makes […]

Your own wikipedia….

Sunday, January 22nd, 2006

I’ve made quite a bit of use out of the wikipedia in recent years. I know it has it’s flaws (I’ve run across some first hand), but I’ve found typos in textbooks as well. However that doesn’t mean that it can’t be a very useful reference. In fact, in some of my browsing I’ve gone […]

Using ssh to protect web browsing over wireless or other hostile networks

Saturday, January 21st, 2006

This really could be used to encyrpt web traffic over any “hostile” network. Here’s what I’m talking about. Laptop using wireless. Within our internal network we would LIKE all our web traffic to be encrypted at least from the laptop to a wired host. (From there to the outside world it will be open.) At […]

Upgrade your mouse

Tuesday, January 17th, 2006

This is going in the basics category. Quite often I visit a computer that has a mouse which is just a trial of patience to use. I mean, you have to pick it up and move it, shake it a bit, turn it over and clean out the lint from the “ball” area…. The good […]

OpenVPN

Monday, January 16th, 2006

The last time I used openvpn, it was version 1.x and only supported a single connection per running process. So, if you had a server that you wanted to support multiple clients connecting, you had to… have multiple ports open to the outside world (unless you did something VERY fancy), and had to have as […]

Google
 
Web www.averyjparker.com