Proof of Intent (was RE: [Long Rant] Re: Encryption Question)
Jason Thomas
jason at topic.com.au
Wed Sep 19 08:25:24 EST 2001
when you actually get a wireless network setup??
On Tue, Sep 18, 2001 at 11:45:04PM +1000, Alex Satrapa wrote:
> So I would use WEP, and I would use MAC restrictions - for polite
> privacy, to prevent network level interference, and because it's
> possible I could use attempts to bypass them as proof of intent.
--
Jason Thomas Phone: +61 2 6257 7111
System Administrator - UID 0 Fax: +61 2 6257 7311
tSA Consulting Group Pty. Ltd. Mobile: 0418 29 66 81
1 Hall Street Lyneham ACT 2602 http://www.topic.com.au/
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
Url : http://lists.samba.org/archive/wireless/attachments/20010919/4da12f2f/attachment.bin
More information about the wireless
mailing list