RE: the other side of wireless security

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



 

	-----Original Message----- 
	From: fedora-list-bounces@xxxxxxxxxx on behalf of Tim 
	Sent: Fri 10/05/2007 06:37 AM 
	To: For users of Fedora 
	Cc: 
	Subject: the other side of wireless security
	
	


	I've just been looking at possibly getting a laptop (a maddening
	exercise, if there ever was one), and have been playing with a friend's
	for a while, now.  One thing I haven't noticed are comments on the
	security of the other side of the wireless connection, your side.  Does
	the laptop treat connections made to its wireless interface in the same
	manner as it would a wired connection?  Do the encryption schemes you
	might use to connect to an access point work in the same way in the
	reverse direction?
	-----------------------------------------------

	My apologies if this isn't related... I was working with a friend last week, and trying to debug communication issues between her laptop and her hosting company's FTP server.  Her wireless network is unencrypted, and both her laptop (WinXP)  and mine (F7) were "connected".  I could run wireshark on my wireless interface and see the traffic from the server to her laptop... but not the traffic from the laptop to the server.  (Physically tapping the network, upstream from the AP would be my next option)

	Thanks

<<winmail.dat>>


[Index of Archives]     [Current Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux