Road Warrior At Risk: The Dangers Of Ad-Hoc Wireless Networking

Written by Darren Miller

Airport Menace: The Wireless Peeping Tom


As a network security consultant, I travel quite frequently. At times, it seems likerepparttar airport is my second home. I actually like to fly, it's a moment in time where no one can reach me by e-mail, or mobile phone.

It never fails that something interesting happens to me at repparttar 136861 airport. I've even met some famous people during my travels. A few months ago, I ran into Frank Bielec, fromrepparttar 136862 TLC show, Trading Spaces. But one of my favorite things to do atrepparttar 136863 airport is browserepparttar 136864 wireless Ethernet waves. I'm never really surprised at what I find. I'm just glad I know more about wireless Ethernet thanrepparttar 136865 average road warrior.

The Dangers Of Ad-Hoc Wireless Networking


Most people who have wireless Ethernet at home, orrepparttar 136866 office, connect torepparttar 136867 wireless network by attaching to a wireless Access Point, or AP. This method of wireless networking is called "Infrastructure Mode". If you have a secure wireless network configured in "Infrastructure Mode" you are using MAC address filtering, some level of encryption, and have made some additional changes to your AP in order to prevent just anyone from using it or capturing data. For more information on configuring your "Infrastructure Mode" wireless network take a look atrepparttar 136868 "Wireless Network Security" page at Defending The Net.

However, for those who are not using "Infrastructure Mode", and are configured to communicate from machine to machine, or "Ad-Hoc", there are a few things you should be aware of.

A wireless Ad-Hoc network allows you to communicate with other wireless Ethernet systems without using a wireless access point. It's kind of a peer to peer configuration and it works rather well. The problem is, most people just set it up, and forget about it. At home, it's not a huge problem, but when your onrepparttar 136869 road, it could cause you a great deal of grief. The airport is probablyrepparttar 136870 best place to find Ad-Hoc networks. Business men and women, delayed once again, power up their laptops and get to work completingrepparttar 136871 days tasks, or planning tomorrows agendas.

I can't tell you how many systems I find inrepparttar 136872 airport configured this way. Not just inrepparttar 136873 terminal, but onrepparttar 136874 plane. About three months ago, just after we reached cruising altitude and were allowed to use our "approved electronic devices", I found thatrepparttar 136875 gentleman two seats up from me had a laptop configured as Ad-Hoc. He walked by me about ten minutes later and commented on how much he liked my laptop. I thanked him, and asked if his laptop was on, and configured to use wireless Ethernet, he said yes.

To make a long story short, I showed him that I could see his laptops wireless Ethernet and informed him ofrepparttar 136876 danger. He asked me if I could access his hard drive, and I told him that it might be possible. He asked me to see if I could, so I obliged. After configuring my laptop to userepparttar 136877 same IP address class as his, and typing "net use * hiscomputersIPAddressc$ "" /USER:administrator", I received a notice thatrepparttar 136878 connection was successful and drive Z: was now mapped to his computer. I performed a directory listing of his hard drive andrepparttar 136879 guy almost had a heart attack!

Bricks Of Egypt - Ancient Mystery Finally Solved

Written by David D. Deprice

Bricks Of Egypt

At its core, Bricks of Egypt is an Arkanoid clone, but it goes beyond replicatingrepparttar frequently imitated art of busting bricks to place a refreshing emphasis on creative level design.

Sure, there's a ball and paddle, but Arcade Labs layers these familiar basics with Egyptian-themed power-ups, bonuses and special challenges (such as hittingrepparttar 136835 water drops to extinguish fire bricks or striking keys to unlock new areas onrepparttar 136836 screen).

Cont'd on page 2 ==> © 2005
Terms of Use