lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <C5100B8D.6D812%scheidell@secnap.net>
Date: Mon, 06 Oct 2008 18:38:05 -0400
From: Michael Scheidell <scheidell@...nap.net>
To: Larry Seltzer <larry@...ryseltzer.com>,
	Paul <paul14075@...il.com>, <wifisec@...urityfocus.com>,
	<bugtraq@...urityfocus.com>
Subject: Re: Verizon FIOS (and DSL?) wireless access point insecure default
 WEP key

> It's WEP. What would it matter if the key were not predictable?
> 
> Larry Seltzer
> eWEEK.com Security Center Editor
> http://security.eweek.com/
> http://blogs.pcmag.com/securitywatch/
> Contributing Editor, PC Magazine
> larry.seltzer@...fdavisenterprise.com
Makes it easier than just using 'default' :-)

I would much prefer how verizon did it then the bizillion 'lynksys' WEP keys
in the neighborhood.


-- 
Michael Scheidell, CTO
>|SECNAP Network Security
Winner 2008 Network Products Guide Hot Companies
FreeBSD SpamAssassin Ports maintainer


_________________________________________________________________________
This email has been scanned and certified safe by SpammerTrap(r). 
For Information please see http://www.spammertrap.com
_________________________________________________________________________

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ