Thursday, March 21, 2019
War Driving :: essays research papers
War driving to Disney World summertime of 2004War driving involves roaming round a neighborhood looking for the increasingly numerous hot spots where high-speed Internets ingress is free. What I found interesting was that the hacks were pretty basic and that most of the teaching on how to break into default systems, how to look for Wired Equivalent privateness (WEP) being enabled and other radio steps could be found in a Google search.My brother Carlos a full time computer geek and I had decided at the beginning of the summer that we were taking the family to Disney provided I wasnt going to take any downtime or a vacation per se. Instead, I would validate through state of war driving around an area with a laptop computer and an 802.11 network card to come upon the presence of radio networks. Let me preface, my brothers experience with wireless networks. He embraces new technologies and tries to understand how to make the workplace safe with protection controls. My little brother has actually taught me every thing I populate about IT.Packing my car with the necessary gear and my brothers Dell Inspiron laptop, a newly purchased Orinoco wireless network card, lots of CDs and my wireless 2-GHz antenna we started the hardened off to Disney. We got on the turnpike and I was hoping for some peace and quiet from our kids nevertheless I should have known better, kids will be kids. While on this mission, it was critical for us to identify if the following could be picked up from the war drive. Think about it. Youre surfing the Net at bag or in the office, and someone just hops onto your network connection. With nurture about whether or not WEP is disabled and SSID default settings, an unauthorized exploiter could access your documents, financials or other sensitive information.The WEP encryption method was designed to provide wireless networks with the same security available in pumped(p) networks however, there are some challenges with this standard .The presence of the service set identifier (SSID), the name assigned to a wireless network. Usually, the SSID comes by default victimisation the vendors name and should be changed to something nondescript .With these two pieces of information, an unauthorized user could be able to acquire access to a wireless network. Upon our first rest stop we exited near little town that was virtually unpopulated .We knew that most likely nothing was going to pop- up on the screen not even a those annoying advertising pop- ups .
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment