OZONE Asylum
Forums
OZONE
Let's talk about computer security for a moment
This page's ID:
27664
Search
QuickChanges
Forums
FAQ
Archives
Register
Edit Post
Who can edit a post?
The poster and administrators may edit a post. The poster can only edit it for a short while after the initial post.
Your User Name:
Your Password:
Login Options:
Remember Me On This Computer
Your Text:
Insert Slimies »
Insert UBB Code »
Close
Last Tag
|
All Tags
UBB Help
In general, instead of decrypting or cracking or brute forcing, refined security wiz tend to do something else that is a lot "easier" and will lead to obtaining the info without the need for decryption. This includes ip spoofing, mac adress spoofind, buffer overflows/underflows which put a system in an unpredictable state, etc. I understand you want to trust WPA, but then just tell me why WPA2 was proposed in first place? [quote] Maybe, but then they are not publicly known (which is what I obviously meant when I talked about known flaws). [/quote] It's the first time you say this explicitely, and it quite differs from the "no known flaws" :) So now I can agree. (ok, I am a bitch at times, but you know that, don't you?) I can't agree with the passphrase bit though: a knwolegeable pro would not give a damn about the complexity of your passphrase if he has a way to "bypass authentication" by abusing yours for instance, spoofing you means "being you", spoofing you in the course of a transaction like WPA authentication means "yummy, passphrase for free". Anyway, thanks for claryfying, all in all, WPA or similar encryption is part of the tools we can use to make a system more secure, so I recommend them for sure, but my point was: they are not 100% safe, and we all agree I think? All this to say that best practices are always the best way to limit security risks: in addition to decent encryption, changing passphrase on a regular basis, passwords, etc. ---- One more point: the best security wiz "skill" is social engineering. Guess the way the software engineers made theyre software, and you can see the flaws. Guess the way the user secured his network, and you have one foot in the place. Guess how the mind which put a given security together works, and you're in. So comp users should really rely on "being unpredictable", in addition to the known security/encrpytion/protection technologies.
Loading...
Options:
Enable Slimies
Enable Linkwords
« Backwards
—
Onwards »