"Spread Spectrum: Hedy Lamarr and the mobile phone", by Rob Walters looks like an interesting book, but there are many links on the Web.
Currently, 802.11g is still strong, but some vendors are producing "pre-11n" equipment in the hope that they will corner the next wave of wireless systems. WPA is appearing on new access points, with some support in operating systems on the hosts. The push to replace WEP by 802.11i is taking its time to get going.
The answer to this can be quite depressing: despite the issues of protection being widely known there are still a large number of unprotected networks around. Take care to distinguish unencrypted networks from unprotected networks.
Links. Another cost/benefit analysis. This one should change as technology develops.
SMS, MMS, Web, video messaging, ringtones, wallpapers, and so on. And don't forget voice!
You can use the arp command to see the current cache of ARP addresses. To find more, you can ping a host to get it into the cache.
ARP is open to spoofing. Host A could send an gratuitous ARP reply for host B containing its own hardware address. The other machines on the local network would then start sending data destined for B towards A, thus allowing A to (a) read B's data (on a switched network A would not normally be able to see B's data), and (b) deny B any data. Fortunately, this can only redirect data within the local network.
Previous Index Next
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 License.