Merit Network
Can't find what you're looking for? Search the Mail Archives.
  About Merit   Services   Network   Resources & Support   Network Research   News   Events   Home

Discussion Communities: Merit Network Email List Archives

North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

RE: Drive-by spam hits wireless LANs

  • From: Al Rowland
  • Date: Wed Sep 11 13:07:48 2002

I believe the question was use of the access to spam, not just that the
majority of users leave their equipment (all, not just the wireless
part) in the original, out-of-the-box configuration. Remember those
comments on the flahsing 12:00 on most VCRs? 

BTW, everyone out there with a random number/character upper/lower case
password at least 12 characters long on every piece of equipment they
own, different username/password on each piece please, raise your hand.
Thought so. ;) Note my hand is not raised. I'd go nuts. Although the
approriate pieces do conform to this.

Best regards,
_________________________
Alan Rowland


-----Original Message-----
From: owner-nanog@merit.edu [mailto:owner-nanog@merit.edu] On Behalf Of
Neil J. McRae
Sent: Wednesday, September 11, 2002 3:37 AM
To: John Angelmo
Cc: blitz; nanog@merit.edu
Subject: Re: Drive-by spam hits wireless LANs



> I must be honest, I havn't heard of any reports here in Sweden (or
> anywhere else) that this is a real problem, are there any true
incidents 
> that this has happend?

Yes. If you sit with your laptop in the park across from our office you
can see 3 unprotected wireless domains. There was an article [although I
can't remember what publication] featuring a few people driving through
the City of London [London's financial community area] they found 
serveral unprotected LANs.

Regards,
Neil.
--
Neil J. McRae - Alive and Kicking
neil@DOMINO.ORG





Discussion Communities


About Merit | Services | Network | Resources & Support | Network Research
News | Events | Contact | Site Map | Merit Network Home


Merit Network, Inc.