Anti-Spyware Forums

Thread Tools Display Modes

!!Email snooping question

Alun Jones
Posts: n/a

      06-02-2006, 12:42 AM
In article <(E-Mail Removed)>, "Robert Moir"
<(E-Mail Removed)> wrote:
>Yes, all the ones I've used are hubs.
>If you think about it, to a certain extent they can do what they want with
>the electronics on the access point all day but they can't stop people
>sniffing the connections at the transport layer because anyone with a
>receiver in the right frequency range can just sit there and let the signals
>come to them with no bother.

One of the signs of a well-thought-out solution is that things that are
impossible to effectively hide are not ineffectively hidden. As you say, in
wireless, everyone can sniff the traffic - radio broadcasts are clearly
publicly receivable. So, if you want any kind of security...

>All you can do is encrypt the signals and hope the cost/effort of decrypting
>them is higher than the listener is willing to pay.

You can increase that cost by improving the quality of the encryption, of

Consider, too, the different kinds of encryption likely to be in place:

Weak access-point-level encryption segregates those who have access to the
network from those who do not have access to the network.

Strong access-point-level encryption segregates each client from each other
client, so that they use different session keys.


[Please don't email posters, if a Usenet response is appropriate.]
Texas Imperial Software | Find us at or email
23921 57th Ave SE | (E-Mail Removed).
Washington WA 98072-8661 | WFTPD, WFTPD Pro are Windows FTP servers.
Fax/Voice +1(425)807-1787 | Try our NEW client software, WFTPD Explorer.
Reply With Quote
Mister Murtz
Posts: n/a

      06-02-2006, 08:03 PM

"Phillip Windell" <@.> wrote in message
news:(E-Mail Removed)...
> I guess in December when I sit on Santa's lap ...

That's an awfully progressive admission from an avowed right-winger like
your self, Phillip.



Reply With Quote
Phillip Windell
Posts: n/a

      06-02-2006, 08:54 PM
"Mister Murtz" <(E-Mail Removed)> wrote in message
news:%239B$(E-Mail Removed)...
> "Phillip Windell" <@.> wrote in message
> news:(E-Mail Removed)...
> >
> > I guess in December when I sit on Santa's lap ...

> That's an awfully progressive admission from an avowed right-winger like
> your self, Phillip

Hows that?

Phillip Windell [MCP, MVP, CCNA]

Reply With Quote
Patrick Dickey
Posts: n/a

      10-02-2006, 05:21 PM
Phillip Windell wrote:
> "Patrick Dickey" <(E-Mail Removed)> wrote in message
> news:(E-Mail Removed)...
>> Here's a scenario for you (and this is my opinion only). You are
>> sitting at an airport, and access and
>> log in. Then, you start playing around with other user accounts.
>> Meanwhile, someone else is sitting in the airport with their laptop, and
>> they're recording what other people are doing on THEIR laptops.

> The "recording" part of it is the real trick to perform though. That's
> another one of those "Hollywood" things.
> Sniffing only works on "hubbed" systems, not "switched" systems and "hubbed"
> setups are pretty much a thing of the past. Sniffing only works on
> "swtiched" network if the Switch doing the switching in the same Layer2 path
> has a "monitoring port" configured (on purpose, ahead of time, by the
> administrator of the system) for the specific switch port the "target" is
> comming into the switch on. Wireless Devices also have their own way of
> dealing with that,...otherwise I could sit ouside in my front yard with a
> laptop and gather passwords all day long from people living near my house
> (there is more to it than simply connecting to their unsecured wireless
> LAN).
> I'm not saying that their isn't a risk,..there are risks. But things just
> aren't as simple as they appear in movies or in the literature trying to
> sell you some kind of "security device". There is a ton of work that has to
> go into it all so that the "perp" and make the risk "happen" in their favor,
> and the people who have such skills are not really lurking around every
> corner.

While this scenario started a debate, I have a feeling the most
important point of my original post was lost. So, I'll just reemphasize
it, instead of contributing more to the debate, as I don't have
wireless, and haven't used the access in airports, schools, or even rest
stops along the Interstate.

The important point from my original post is this. If it's not yours,
don't mess with it. Or, as I put it in the original post,
> Don't go playing where you don't belong. In the long run, that's going to keep your job, while someone else loses theirs.

If you don't mess around with other people's accounts, then you don't
have to worry about whether or not someone will 'sniff' your
transmission at a public airport (or anywhere) and use your account to
mess with the accounts that you played with. And, you won't have to
worry about whether or not someone can (or will) detect your activities.
In other words, STAY OUT.

Patrick Dickey <(E-Mail Removed)>
Smile.. someone out there cares deeply for you.
Reply With Quote

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump

Similar Threads
Thread Thread Starter Forum Replies Last Post
firewall question and windows installer/spyware question unstablemicrosoft Security Software 3 25-09-2006 05:29 PM
Question and Question Ze Muffinman Spyware 1 05-08-2006 05:22 PM
email snooping taxdon Security Software 5 08-02-2006 01:14 AM
Windows MediaPlayer 10 snooping? Keith (Southend) Spyware 7 30-10-2005 10:18 AM
Thanks (and apologies) for your comments on "The Most Obvious Question You Are Ever Likely To See" (e.g. No-Brainer security question) Curious George Security Software 1 14-03-2005 10:01 PM

All times are GMT. The time now is 05:11 AM.