Contributed by jose on from the mobile-networking dept.
(Comments are closed)
OpenBSD Journal
Contributed by jose on from the mobile-networking dept.
(Comments are closed)
Copyright © - Daniel Hartmeier. All rights reserved. Articles and comments are copyright their respective authors, submission implies license to publish on this web site. Contents of the archive prior to as well as images and HTML templates were copied from the fabulous original deadly.org with Jose's and Jim's kind permission. This journal runs as CGI with httpd(8) on OpenBSD, the source code is BSD licensed. undeadly \Un*dead"ly\, a. Not subject to death; immortal. [Obs.]
By Anonymous Coward () on
Comments
By vincent () on
that doesn't mean the wire communications have to be insecure because the wifi itself is secured...
Comments
By Anonymous Coward () on
By Anonymous Coward () on
Why assume all problems are identical to your own?
Comments
By Anonymous Coward () on
By Anonymous Coward () on http://openvpn.sourceforge.net/
http://openvpn.sourceforge.net/
Easy to be set up, multiplatform, very good support if something is not in the documentation. My selfmade access point is running this one for authentication and transport security.
Comments
By Erik () on
It works nice though.
Comments
By earx () on
Comments
By Erik () on
ipsec performs much better (max 50% load same configuration)
Comments
By earx () on
www.wavesec.org
Oportunistic encryption.
Comments
By AnonymousCanuck () on
By earx () on
Better use authpf and ipsec even if it is not 100% secure too.
By sickness () s i c k n e s s -at- s i c k n e s s -dot- i t on http://www.sickness.it
In this way you will have 3 levels of crypto between
the hosts :P
(a bit tricky and even a bit slower... but very geek and paranoid ;)
Comments
By Michael Anuzis () on
Comments
By earx () on
Your data could be safe not the quality of the connection ;)
Comments
By sickness () s i c k n e s s -at- s i c k n e s s -dot- i t on http://www.sickness.it
(i'm italian too :)
By espo () on
This is another reason stegonography isn't very useful. If a person was hatching some plot, and then all the sudden starts transmitting pictures or audio files - anyone evesdropping is going to see through the smoke & mirrors. Not to say that it doesn't have uses, but you gotta be aware that just because an attacker can't read the actual data from your link doesn't mean they can't figure out what's really going on.
Comments
By Anonymous Coward () on
By Mr. Reynolds () Al@elements.com on mailto:Al@elements.com