Guerrillas in Our Midst

By on

A little over a year has passed since the publication of the University of Maryland's paper "Your 802.11 Wireless Network Has No Clothes" (www.cs.umd.edu/~waa/wireless.pdf) which detailed a number of holes in wired equivalent privacy (WEP), the encryption protocol used to secure 802.11b wireless LANs.

The impact the paper had on 802.11b was highly damaging. Within months, there were further damning analyses, countless scare stories in the press, and, predictably, a new wave of hacking tools capable of cracking WEP keys within minutes. Frustratingly, this all took place at the moment that ...

Hi! You've reached one of our premium articles. This is available exclusively to subscribers.

It's free to register, and only takes a few minutes.

Once you sign up you'll have unlimited access to the full catalogue of Australia's best business IT content, as well as a daily news bulletin delivered straight to your inbox.

Register now
Copyright © SC Magazine, US edition
Tags:

Most Read Articles

Most popular tech stories

Log In

Username:
Password:
|  Forgot your password?