Talk:Wireless security
From Wikipedia, the free encyclopedia
This entry into the Wikipedia was originally taken from a report that I (John Sturm), Lahela Corriagn, and Kevin Carley did for a junior level college networking class during the summer of 2005. I pasted it in here because I really thought it had a ton of good information that some people would certainly like to see. Be easy on me since this is my first posting. However, feel free to edit away! --Exsturmin8r 03:50, 15 September 2005 (UTC)
The article here made the common misuse of the term Hack, as the Hacker definition controversy show this isn't something nerdy people like to let slide, so I figured I would skim through and change hack references to their appropriate cracks. Janizary 03:52, 24 December 2005 (UTC)
So you call them "crackers" instead? That term has its own set of derogatory misconceptions. I would think that the more common term "hacker" would apply itself better to this article as it is correctly calling to the proficency of a user (albiet, abuser) of computer networks. I would reccomend perhaps keeping the use of "crack" in reference to cracking a security algorithm, but not defining the perpitrator as a "cracker". --67.115.118.49 21:24, 12 July 2006 (UTC)
its worth mentioning that where it says that some parts of MITM is automated by Airjack, i'd point out that Airjack automated the entire thing, it came with monkeyjack which put you in the middle with an API for manipulating and monitoring the traffic, and krackerjack which actually broke some weakly authenticated VPNs crypto using the MITM...of course none of that is relevant really today as Airjack hasnt been maintained for years and requiers what is now very outdated hardware to run... (btw, i'm the author of Airjack, thats how I know this) --Michael Lynn 23:54, 20 March 2007 (UTC)
[edit] Cleanup
This article needs to be copy-edited such that it no longer has a prescriptive tone. It ought to be informational, but not normative (i.e. 'these are the various security measures that exist to counteract these various threats,' NOT 'you should do this and that and the other thing'). The basic information is solid as far as I can tell--it just needs to be converted from an essay into an encyclopedia article.—thames 19:24, 6 March 2006 (UTC)
I also feel that some of the diction is too casual, and that some of the paragraphs are so vague from the technical point of view as to be almost incomprehensible. To the extent that I can find the time, I will start working on both the stylistic and technical problems. This will be my first significant edit in Wikipedia, so I'd appreciate a lot of hand-holding. Tireisias 18:27, 7 May 2006 (UTC)
What is Wikipedia policy on the he/she business, referring to an individual of unknown and irrelevant sex? Tireisias 18:49, 7 May 2006 (UTC)
The sentence length and complexity is significantly lacking which (I believe) leads to the casual tone. There is also little variation with sentence structure and very few compound or complex sentences.216.196.249.142 15:31, 3 October 2006 (UTC)
I did some editing and took down the "marked for editing" sign which has been up for the past 10 months. I think this article looks like it is 90% there and I don't think it will get that much better from a structural standpoint. However, by all means keep working on it if you wish... Exsturmin8r 01:34, 3 January 2007 (UTC)
[edit] MAC-filtering
Could someone please explaine how creating a MAC-access list makes your WPA(2)-PSK WLAN safer? On the contrary it would make it a lot unsafer since you wouldn't notice anything if your WLAN got cracked and an attacker connected to it - it would still be the same MAC address as your own computer...
It's a lot of uneassesary work putting in a MAC address list?
Working on a wireless security project.
MAC address filtering is a very bad way of securing a network along with ESSID hiding. Both of these can be exploited easily.