OT: ADSL safe practices and setting up a home network
Mike McCarty
Mike.McCarty at sbcglobal.net
Mon Apr 17 22:23:43 UTC 2006
Guy Fraser wrote:
> On Fri, 2006-14-04 at 13:01 -0500, Mike McCarty wrote:
>
>>Anne Wilson wrote:
>>
>>>On Friday 14 April 2006 15:47, Mike McCarty wrote:
>>>
>>>Your choice entirely. Encryption does work, and I also have checked that
>>>nothing is detectable outside my boundaries. Then of course it can be tied
>>>to mac addresses. It's perfectly possible to have the facility without risk.
>>>If you don't need it, fine.
>>
>>Any machine to which there is physical access has only
>>relative security. The fewer physical access points there
>>are the higher the relative security can be. Removing the
>>antenna almost removes one of the access points.
>>
>>I say almost because, should the firmware or hardware not
>>properly disable the wireless I/F, someone who knew I was
>>here and had a high-power transmitter and a focussed high
>>gain antenna with a sensitive receiver could still get
>>access.
>>
>
>
> Very true. Removing the antenna may not actually do what
> you want, it will certainly reduce the antenna gain, but
> does not prevent transmission or reception. What you
> should do is install a 50 Ohm shielded terminator. You
> will need a BNC adaptor for you antenna connector, which
TNC. And even a 50 ohm termination (presuming that the
receiver uses 50 ohm impedance, which is almost certain,
given the frequencies involved) will not completely
isolate. And then there are IF amp. attacks, etc.
> with you to make sure you get the right one. You can
> likely get the adaptor and terminator at an electronics
> supply store, or from a radio system installer.
I could build my own using parts in my junk box, actually.
> We used to do a lot of wireless connections and determined
> that even heavily shielded radios could communicate
> effectively over a couple feet with no antennae installed
> on either one. We also determined that using 100mW TX
Of course, this is a violation of FCC regs... :-)
[snip]
> arrays it could be possible to receive a signal covertly
> from hundreds of feet away, but then you don't necessarily
> need a wireless router to do that anyway.;^) If you are
Yah, I've got a 6 foot cable running between the router and
my machine, and a 6 foot cable (coiled up, it's true) between
the router and the DSL modem, both unshieled twisted pair
(CAT5 stuff).
> interested, there are a few good articles about Tempest
> surveillance that are enlightening. I used to work on
> anti-tempest compliant devices for law enforcement and
> military applications, back in the late 80's. I can only
> imagine how much better the new tempest stuff is. :^O
http://www.fas.org/irp/program/security/tempest.htm
Mike
--
p="p=%c%s%c;main(){printf(p,34,p,34);}";main(){printf(p,34,p,34);}
This message made from 100% recycled bits.
You have found the bank of Larn.
I can explain it for you, but I can't understand it for you.
I speak only for myself, and I am unanimous in that!
More information about the fedora-list
mailing list