Proof of Intent (was RE: [Long Rant] Re: Encryption Question)

Jason Thomas jason at topic.com.au
Wed Sep 19 08:25:24 EST 2001


when you actually get a wireless network setup??

On Tue, Sep 18, 2001 at 11:45:04PM +1000, Alex Satrapa wrote:
> So I would use WEP, and I would use MAC restrictions - for polite 
> privacy, to prevent network level interference, and because it's 
> possible I could use attempts to bypass them as proof of intent.

-- 
Jason Thomas                           Phone:  +61 2 6257 7111
System Administrator  -  UID 0         Fax:    +61 2 6257 7311
tSA Consulting Group Pty. Ltd.         Mobile: 0418 29 66 81
1 Hall Street Lyneham ACT 2602         http://www.topic.com.au/
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
Url : http://lists.samba.org/archive/wireless/attachments/20010919/4da12f2f/attachment.bin


More information about the wireless mailing list