Home
Articles
Search
Status
Best of 2600
Keywords
Links
Mirrors
  Open Source
Overview
SQL
PHP
Data

Articles

    prev next

Winter2004 cover image
Volume 21
Number 4
60 pages
Winter2004 back cover image
Quote: "We cannot simply suspend or restrict civil liberties until the War of Terror is over, because the War on Terror is unlikely ever to be truly over." - Judge Gerald Tjoflat of the 11th U.S. Circuit Court of Appeals, October 15, 2004.

Author
Nom de plume uberpenguin
Name
Email uberpenguin@hotpop.com
Notes

Aritcle
Synopsis Discusses a possible man in the middle attack (MITM) that could be applied to an 802.11 WiFi network.
Notes
Code None
Page 10
Pages 1 and three quarters
In Best of 2600 book? Yes, page 744, Section 3 (2000 and Beyond: A Changing Landscape), Chapter 18 (Toys of the 21st Century)

Links

Addendum

Keywords
Wireless Networks Refers to any type of computer network that is wireless, typically using radio waves.    (more..)
Man-in-the-middle A form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection when in fact the entire conversation is controlled by the attacker.    (more..)