Jump to content

Thomas

Members
  • Content Count

    2,103
  • Joined

  • Last visited

Everything posted by Thomas

  1. Thomas

    Unsecured Wireless Networks

    So you can sniff packets (Etheral or a number of other programs will do that. Snort does it for wireless.) and see them. I can see this causing confusion. On a LAN I can sniff packets because many Network cards and routers aren't set up correctly to not broadcast to everyone. But on the internet, your connection to the ISP is point to point. Me to the ISP to thier provider (say Cogent) to ATT to L3 to tier 2 to webhost. I'm not going to be shot gun spaying this around. My packet is going only where I want it to. So I have to get between the ISP and my end site.
  2. Thomas

    Unsecured Wireless Networks

    If I have your IP I can attack you offensively. I can DOS you. I can view your shares. I can do all kinds of nasty things. I can't see your packet unless I can be inbetween you and your ISP or I have to be on the hops between you and what you're trying to reach. . Hence the term "Man in the middle." This isn't that easy since most people only take ISP and backbone hops. It's not impossible but very, very hard. So trying to steal your credit card as you send it to Amazon is unlikely. It would be much, much easier to try to steal Amazon's DB with all of that info.
  3. Thomas

    Unsecured Wireless Networks

    It's a matter of how hard is it for the bad guy to get access to the packet. On a wireless network I can get easy access to the network. That makes packet sniffing trival. On a wired network I can still sniff packets but I have to have physical access to the network. Over the internet...I could do a Man in the Middle attack but it's much much harder to get the timing right. It's not impossible but it is very, very hard. Encryption on a wireless network is like a cheap lock. It just keeps honest people out.
  4. Thomas

    Unsecured Wireless Networks

    Kim Komando has a room tempature IQ and simply shills for who ever pays her. Most of her advice and techincal statements are either wrong or just "duh". Turn on WPA2 if you can, WPA if you can't. But always assume that the network is insecure. I want to iterate this point. All wireless networks should be assumed to be not only insecure but already compromised. WEP is a joke to break and WPA has some serious flaws. Neither one takes much time to break.
  5. Yep. Expensive but a nice image.
  6. Thomas

    license plate camera

    No matter the industry, specialized gear costs more.
  7. Linksys is like a better COPS. They don't make a thing, they just buy OEM and tweak the housing and slap a label on it. They will write the firmware but generally it's a vanilla Linux install with a firewall and a web front end.
  8. It could be a few things: 1. The wiring A. Some Cat5 will support Gigabit, some won't. Cat5E is called for by the specs. 2. The Wiring B. Checking your pairs. 3. Mismatched networking hardware. Gigabit is flaky on the low end. If I have Cisco Kit then I'm golden. If I'm looking at lower end stuff...then I want to match vendors as much as possible.
  9. If it's using SMTP then it will be sending on 25 by default. I don't know if you can adjust the port settings for the software.
  10. Thomas

    IQeye 501

    l2speakleetnoob
  11. Thomas

    IQeye 501

    Not to kick sand but while the price is the same...the image quality on the IQIeyes is insane.
  12. Thomas

    Kentucky Fried Criplin

    In the chicken, not on the chicken.
  13. Thomas

    Video Ipod

    As far as I can tell, iTunes doesn't report back to Apple what I have on my iPod, it just checks when I play music downloaded from iTunes (not mp3s I already have) in iTunes. I can play anything I want on my iPod without Apple knowing or caring. I don't care for DRM but Apple at least isn't a total prick about that. The limit is I can't share my music with other people and I can't burn the same playlist five times in a row. (I can tweak it and continue burning.)
  14. Thomas

    Kentucky Fried Criplin

    Stuffing or Dressing depending on where you are in the states. It's the bread stuff you stuff into a chicken or turkey.
  15. Thomas

    Wireless DVR

    You just need an Ethernet to Wireless Bridge. They are pretty cheap and don't require any kind of driver.
  16. Thomas

    Upgraded and pleased

    Naw, the NSA perfers Cray's beasts.
  17. Any time you go from one connector to another, there is signal loss. But it should pretty low.
  18. So there is a growing influx of distrbuters and reps from larger companies. And this is leading to a certain degree of conflict. Right now the forum has a delicate balance between end users, dealers, and manufactuers. So I feel a code of conduct is needed and I want the forums input on it. Before all comments begin, I want to point out a central fact: Advertising is done on the forum via banner ads. I want people to mull that over before posting in this thread. Also note that I will kill thread hijacking in this thread quickly, so keep this one on topic.
  19. Thomas

    STATIC IP ADDRESS-HOW DO I GET ONE

    Most likely AOL is going to block port 80 traffic anyway. They always used to.
  20. Your theory is good. But here comes the fun part. With the exception of the cable, you want to keep everything to one vendor. On the high end, gigabit works perfectly. On the consumer end....well it's like wireless and cameras. So try to keep to one vendor because it increases your odds of everything working as it should.
  21. Um...kinda. Switches and Routers (in theory, the terms are a little bastardized now) operate on differant levels. Switches work closer to the MAC address level and Routers work at the IP level. So what they look for in packets is a little bit differant. You can mix the two and it works (and works well), the router will do DCHP and your network works as you expect. But your network is only as fast as the fastest point it crosses....and if that PC is connected via the wireless then you cap at 54 mb/s So two computers on the switch: Gigabit Two computers connecting via the router: 100 mbit Two computers talking via wireless: 54 mbit Two machines, one with gigabit nic, one with 10/100 nic: 100 mbit or less. So now we get into network topology....how does the computer connected to the TV currently talk to the network?
  22. The router will sit between the internet and the switch. In this case it will act primarly as a gateway. Computers connect to the switch. But how big are the files that you need gigabit? And remember that switches and routers work at differant levels of the network. Switches don't care as much about IP address and most routers don't care about MAC addresses. (Wireless routers are almost always the bastard love child of switches and routers since they look at both IP address and MAC address.) Odds are that anything labeled as a switch isn't bright enough to act as a gateway.
  23. http://www.cctvforum.com/viewtopic.php?t=3829&highlight=law+enfor This thread has some answers to your questions.
  24. It's an apples and oranges comparison. Unless we want to get some EE's in, comparing a MIPS processor to a RISC processor is going to be a waste of time. You can try to compare based on MIPS scores but there is a reason people use the expression "Meaningless Indicator of Processor Speeds". Or FLOPs, or VUPs or bogoMIPS.......
  25. Thomas

    TechSec IP Conference

    MSCE's are like any other certifactions. Some are good, some are bad....hell I am Stam certificted for CCTV but do you want me hanging cameras for you?
×