lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <40A163B8.8040101@arhont.com>
From: mlists at arhont.com (Konstantin Gavrilenko)
Subject: Wireless ISPs

there is a russian saying:
"If the party gets that mad, cranch the last gurkin"


For a less paranoid of you, who still believe that wep is secure enough 
solution. We maintain a complimentary site for our book on wireless 
hacking, that has a categorised collection of tools for wireless 
penetration testing, http://www.wi-foo.com/index-3.html



cheers,
kos



-- 
Respectfully,
Konstantin V. Gavrilenko

Arhont Ltd - Information Security

web:    http://www.arhont.com
	http://www.wi-foo.com
e-mail: k.gavrilenko@...ont.com

tel: +44 (0) 870 44 31337
fax: +44 (0) 117 969 0141

PGP: Key ID - 0x4F3608F7
PGP: Server - keyserver.pgp.com




D B wrote:
> I'm not real sure how to post this, nor am I sure of
> the scope. I am still learning about computers.
> 
> 
> All transactions done via secure websites are secure,
> however the auto mailing feature to confirm orders
> sometimes contains sensitive data. When the customer
> is on a wireless connection, be it ISP or home LAN
> that data is broadcasted in the clear for anyone
> within range to eavesdrop. A wired internet connection
> limits the number of people who have access to this
> data simply by the nature of the internet putting it
> within acceptable risk.
> 
> It is legal according to US law to eavesdrop on
> wireless connections. 
> 
> http://www.usdoj.gov/criminal/cybercrime/wiretap2510_2522.htm
> 
> The only solutions I can offer are one of two things. 
> 
> 1. Quit sending auto confirmations with sensitive data
> 
> 2. Encrypt all wireless transmissions at least making
> someone who gains access to this data prosecutable. 
> 
> Please direct all flames to /dev/null
> 
> Dan Becker
> 
> 
> 	
> 		
> __________________________________
> Do you Yahoo!?
> Win a $20,000 Career Makeover at Yahoo! HotJobs  
> http://hotjobs.sweepstakes.yahoo.com/careermakeover 
> 
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html




Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ