{SPAM?} Re: [SLUG] Linux and 802.11g cards

From: Steve (steve@szmidt.org)
Date: Sat Mar 27 2004 - 02:38:36 EST


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Friday 26 March 2004 07:41 pm, Doug Koobs wrote:
> I just purchased a Netgear WGR614 wireless router (for $50 after $20
> rebate from Staples, on sale till tomorrow if you're looking). I haven't
> figured out which PCMCIA wireless NIC to get yet. I haven't found any
> cards that have vendor support. I've found a few websites that provide
> drivers for certain chipsets. It looks like it's going to be a pain to
> set up. Does anyone have any experience with this? What cards are
> easiest to set up, most stable, etc? I'll be using Gentoo on these
> laptops.
>
> Thanks,
>
> Doug

Not making any personal comments about you but;
Why are people so eager and willing to compromise their systems with
wireless technology?

To date the only people with worthwhile security is the armed forces, who
have developed their own. The rest of us are really sitting ducks should we
decide to take the leap. Which by all indicators many do.

Simply sitting down and following the security lists you see the ongoing
problems there are. Sure, one can always pretend it's not a situation.

OK, maybe it's ignorence and the ever popular Oh, it wont happen to me or, I
don't have anything worthwhile stealing. Except you do. Everyone with a
dedicated connection have two immediate things valuable to a criminal
hacker.

A) Someone elses identity and B) Someone elses harddrive.
ALL hacks are made through other peoples computers. (Not counting some inept
script kiddie.) They also store tools and stuff on others computers, so to
limit their vulnerability in a raid. (Which FBI mostly prefers to do on a
live connection as it's harder to refute, but that does not always work
out.)

Of course all who gets chosen as the next hapless attacker in a Distributed
Denial Of Service Attack (DDoS) should not be frowned upon either.

Earlier this week we saw a new enemy, the first worm with a deadly payload
(the Whitty worm.) Worms are the only ones to have been found live on
Linux so far. Well this one only attacked firewalls and such security
devices. It was out within a couple of days of having been found. Well
found by a whitehat.

The true blackhats are high level specialists who can easily collect top
dollars doing the reverse in ANY organization. They are many and almost
always way ahead of the whitehat community because that's what they
concentrate their time on doing. They very much "think outside the box."

If this trend goes much further we are all going to be more targeted than
the past has offered. Things like f.ex. chat have an awfully insecure
protocol. This is true for every single chat tool out there.

So I've gone a bit past the inital why WiFi question but I cannot always sit
quietly by the wayside and see people drive off the cliff without at least
putting up a warning sign.

To quote Bruce Schneier, security is a tradeoff. What are you willing to
trade off?

- --
Steve

"They that would give up essential liberty for temporary safety deserve
neither liberty nor safety."
                                Benjamin Franklin

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.3 (GNU/Linux)

iD8DBQFAZS+BljK16xgETzkRAt/YAKDT0kCf0bqx65f6FDsMIxQQOUR4RQCdFRuU
hLzmI/s9Aq1Fmg0/0sFlWYI=
=v6Dj
-----END PGP SIGNATURE-----

-----------------------------------------------------------------------
This list is provided as an unmoderated internet service by Networked
Knowledge Systems (NKS). Views and opinions expressed in messages
posted are those of the author and do not necessarily reflect the
official policy or position of NKS or any of its employees.



This archive was generated by hypermail 2.1.3 : Fri Aug 01 2014 - 19:43:54 EDT