Fixing Wireless Security By Pulling The Plug 133
An anonymous reader writes "It seems as though the Japanese government is paying attention to some security concerns of wireless networks, and rather than addressing the problem, taking a more aggressive but perhaps not as thorough approach to the issue at hand. Not very technical, but at least its good to see governments actually doing something about it."
Maybe not the most thorough approach... (Score:2, Insightful)
Re:Maybe not the most thorough approach... (Score:2, Insightful)
I scares me shitless to think that there have been successful wardriving sessions in the Washington, D.C. area.
Re:Maybe not the most thorough approach... (Score:1)
The weird thing about wireless is that someone can archive all your traffic and chew on it for years. So, the concept of "wired equivalent privacy" would really require an encryption scheme which was invulnerable for an infinite amount of time into the future to be as good as wired security... which to me sounds doubtful.
WEP should be renamed.
Re:Maybe not the most thorough approach... (Score:2)
Re:Maybe not the most thorough approach... (Score:2, Informative)
But... (Score:4, Funny)
Re:But... (Score:1)
O'Reilly book? (Score:3, Insightful)
Re:O'Reilly book? (Score:2)
Since you don't seem inclined to investigate these matters yourself, the answer is "yes".
Re:O'Reilly book? (Score:2)
Re:O'Reilly book? (Score:1)
IPSEC (Score:3, Insightful)
The truth is that its only slighty harder for a attacker to get a physical connection to your network than for that same hacker to sit in your parking lot and wirelessly surf.
But, wait, we have id badges, and a security gurd at the door, no one can get to our cables: I once worked with a guy who was paid to do penetration testing, he spent a week wandering around inside the corporate headquarters, until the company IT director declared his attacks unsuccessful (they had no firewall logs of his intrusions, so he must have not got in.) The IT director was displeased with the final report, showing all the data he had accessed (some from the consoles of the "secure" machines) and with the CEO who had agreed that the testing included physical site security.
It becomes even easier when you accept that the vast majority of intrusions come from inside the company, from people who already likely have access to the network.
Sending confidential data in the clear on a wired or wireless network is not a good idea, period.
In case of Slashdoting© (Score:2, Informative)
The Asahi Shimbun
Since anyone with the software could pry, cable is back in style.
The Meteorological Agency and the Tokyo metropolitan government stopped using wireless local area networks (LAN) last week after learning data was wide open to anyone with the will and the right software.
Wireless LANs are increasingly popular because they can be introduced or expanded quite simply without cumbersome cables.
But when Kazuo Tanabe, a computer consultant in Sabae, Fukui Prefecture, studied LAN emission risks around government office LANs in his own prefecture, then in Tokyo, he found that data transferred on wireless LANs could be intercepted and read by anyone using software freely available on the Web.
Tanabe said he first assessed the risk of LAN signals radiating from the municipal buildings of Sabae and Fukui, then came to Tokyo last week to measure the risk around some central government office buildings, especially in the Kasumigaseki district.
There he found that data stored in the Meteorological Agency's personal computers-even personnel records and minutes of meetings-was especially vulnerable.
The risk was highest at the agency's department dealing with volcanic activity, which lacked proper firewalls such as data encryption and password-protected access.
When The Asahi Shimbun inquired about data vulnerability, the agency found two of seven wireless LANs could be monitored from outside. A LAN management official there said the network was shut down immediately, departments were informed and all computers on wireless LANs were switched to cable.
At the Tokyo metropolitan government offices, several bureaus, including construction and environmental protection, did not encrypt the data moving over their LANs.
At the office that administers public hospitals, most of the 80 PCs used by supervisors could be read from outside. Data exposed to prying eyes included payment to doctors and patient records.
An official said network personnel were not well informed about security, but said all the wireless LANs were swapped for cable over the weekend.
During his experimental foray at the Ministry of Economy, Trade and Industry, Tanabe said he found pirate versions of movies, including ``Harry Potter,'' TV dramas and video clips of entertainment personalities, which an official later said were for personal use.
Encryption had not been used in some LANs at the Foreign Ministry or the Ministry of Agriculture, Forestry and Fisheries until September, when data vulnerability was pointed out.
``Use of wireless LANs is inappropriate for government agencies that handle personal information,'' Tanabe said. ``One hole in the network lets hackers in. Data can easily be stolen or altered. Or the opening can be used to spread viruses or other misdeeds.''
(12/26)
Wow (Score:3, Funny)
BUT WAIT! If they get access to the computer they might, so lets unplug it from electricity, then the data will be REALLY secure.
NO WAIT! What happens if they pull the hard drive out and connect it to another computer? I know, lets chop up the hard drive into little pieces to make sure that doesn't happen, then we'll be REALLY SECURE!
Just don't write any thing down on a piece of paper, you never know into whose hands it might end up.
Wait until they steal your brain... (Score:1)
Damn those mice, and their crazy ideas of planet-sized supercomputers.
Re:Wait until they steal your brain... (Score:1)
Re:Wow (Score:2, Informative)
I remember talking to someone at IBM about this. They told me that at the end of every shift, they were to remove the HDD from their computer (I assume it was on some sort of tray) and place it in a locked storage cabinet.
I'm very sure if IBM did this, then the government would be more than willing to do it...
Re:Wow (Score:1)
This is exactly how things are done in many US government agencies. Remember when that hard drive was lost at Los Alamos National Labs a couple of years ago (well I think that was a laptop drive)? Every computer has removable hard drive trays which you lock up every night before going home.
Re:Wow (Score:3, Informative)
I worked for a company that sold systems for use in classified environments. They all wanted removable hard drives for this very reason.
Re:Wow (Score:1)
Could it be a trend? (Score:2, Funny)
MOD UP PARENT! (Score:2)
No. Fookme (Score:2)
This is the best (Score:1)
Re:This is the best (Score:2)
Wireless will get there.
They did the right thing (Score:3, Insightful)
I'm pretty sure (Score:3, Interesting)
Can anyone elaborate on this, please?
Re:I'm pretty sure (Score:2)
Re:I'm pretty sure (Score:2)
Meanwhile in related news... (Score:4, Funny)
...Pringles have announced record sales, especially among the computing demographic. This announcement also ties in with their plans to introduce MEGA-size Pringles... just for those who can't stop when they pop (or they need extra signal catchment from the bigger tube).
[End Joke]
I do contract work with casinos (Score:4, Insightful)
so, I agree with Japan on that. and on the ps2.
Re:I do contract work with casinos (Score:2)
Not that such is trivial to crack, but it's all connected. Some stuff is just easier to reach.
Re:I do contract work with casinos (Score:2)
Re:I do contract work with casinos (Score:1)
The 'Internal' network:
Unlisted dialups: 0.
'Private leased lines': 0.
Why? Because it is a matter of national security. Not good enough? Because if someone authorized such a decision they would go to jail, possibly for treason.
Heck, just what I have already said probably violates my NDA in some way...
Re:I do contract work with casinos (Score:1)
Re:I do contract work with casinos (Score:1)
It seems like what you want is basically this [freenetproject.org] right?
Re:I do contract work with casinos (Score:2)
On Meta, you'll be able to register domain names for free. Or experiment/be involved with the grimy details of managing a big network(or not, if that's not your thing). You'll be able to be anonymous, and yet prove that you are indeed the same anonymous person that someone talked to last week. Run webservers, email, and everything else that your ISP bans. The list goes on...
I hope Freenet is modestly successful though, it will take the limelight then, and act as a distraction for Meta.
Re:I do contract work with casinos (Score:1)
Re:I do contract work with casinos (Score:2)
I'm surprised it was a surprise. (Score:1)
I'll go back to my busywork and try not to think about things I know nothing about.
Re:I'm surprised it was a surprise. (Score:1)
Security and uses of wireless. (Score:1)
My big question is, how much security is needed anyway? What are people using these networks for? If you're just doing simple web browsing at the airport (or even checking email that you don't care about) it shouldn't be much of an issue.
Are many people using this stuff for financial transactions (including HTTPS over the web)? Do people use this to check secure email? Do many people (/. is a biased crowd) use wireless hubs in their homes?
Where do the current security standards fall short? Afterall, you can listen in on any Internet traffic (in theory).
Of course, in time, we'll need good security on wireless links. I just don't think it's reached a point where wireless gets enough use to need much security (yet).
Re:Security and uses of wireless. (Score:1)
If it's HTTPS you don't have to worry about it because the HTTPS protocol already encrypts your data very well. Similarly, if it's data you really don't care about (like web browsing) then you don't really need to worry.
The point is many businesses use wireless like it's a PRIVATE network. Wirless should be viewed as a PUBLIC network, even when you have WEP enabled and MAC filtering turned on. Best practice IMO is to use IPSec encryption (it's not flawed like WEP). Basically set up VPN endpoints on each side of the WiFi link.
Re:Security and uses of wireless. (Score:1)
It's a two-way medium. (Score:2)
One problem with wireless is that people tend to look at security from only one perspective -- "are my secrets safe?" -- and conclude that people without secrets don't need any security.
The reason I use IPSec is not to keep the black hats from reading my credit card data (https keeps that safe enough), but to keep them from using my connection to send packets elsewhere. I just don't want my ISP or the police to break down the doors because some drive-by sent a million spam messages (or worse) with my return address!
Wireless security (Score:1)
The reason most wireless LANs go unsecured is that the equipment is defaulted with minimum security setings to make it easy to install and set up. Typically, once the AP is placed and running, people are just happy that it works, and neglect to apply the necessary security devices within the equipment. Additionally, research into appropriate security practice for wireless is rarely done. I've got the appropriate settings and protections on my home WLAN, and even so, if I'm not using the network, I turn it OFF - no need for unnecessary risk. A little paranoia won't hurt you, besides, they really are out to get you.
Addendum (Score:1)
or
Your PHB is the Enemy
As an informed network guru, you already know that wireless networking is inherently insecure, but you are ordered to implement it anyway. Your proposal includes keeping all wired computers wired, running cable to all new pc's that need the network connection. You've got to have a separate server for the AP so you can segregate the wireless and wired networks. You'll have to load firewall, VPN, and intrusion detection software on the new server as well as EVERY client pc, and set things such that the clients will ONLY connect to the server AP and the AP will ONLY accept authorized client connections without broadcasting info to anonymous clients (knowing full well that snort will pick up the signal anyway). The AP(s) will be placed in such a way that signal leaking out of the target area is minimal or as close to unusable as possible (You know you won't be able to use the Langley method of wire mesh in all exterior walls and windows to contain the signal will NEVER be approved). You also request a pay increase because of the additional workload of managing this second network. Here's what happens:
1) The PHB says "sure" and appropriates the equipment for you to deploy, but assigns you a new task as soon as you have it working but before you get all the security implemented. Result: insecure wireless network.
2) A contractor is hired to install the wireless network, but the security implementation they proposed is declined because the PHB says "Our network guy will set that up" and then neglects to assign you the task. Result: insecure wireless network.
3) Miraculously, you get your way and have the wireless network and security installed exactly the way you wanted. Result: your PHB bitches that the security measures are "inconvenient and slow down the network" and you are told to fix it, leaving you with an insecure wireless network.
4) Your massive proposal is rejected, no wireless network is installed, and you still have time to post semi-intelligent crap on slashdot.
Re:Wireless security (Score:1)
> Which is why you run wired (use gigabit ethernet if you got it-spanks wireless any day)
Does gigabit ethernet use unshielded twisted pair?
Any wire that transmits a signal, transmits some of it into the air. It might take some seriously sensitive equipment to pick up (think of the van from the movie `Sneakers'), but I'm willing to bet the expense of such equipment is trivial for a medium-sized governemt or international corporation (or `terrorist' group, or the Freemasons, or whoever it is that makes you want to wear a tinfoil hat).
I'm no expert on radio, but wouldn't higher speed data (like gig ethernet) use higher frequencies, and would that make it easier or harder to pick up in the hypothetical signals intelligence van? (Or would it not affect it either way? I really don't know analog too well)
Would using shielded cabling keep some of the `leakage' from happening? Of course, fiber would be the way to go, for the truly paranoid. No EMF radiation, and takes some pretty specialized (fairly expensive?) equipment to `tap' even if you're crawling around in somebody's ceiling/basement.
Sorry, that asked too many questions, I'm in ramble mode..
Re:Wireless security (Score:1)
No, but I run double-shielded UV-resistant weatherproof cat-5, even for my patch cables. Anyone can do this, it's just a lot more expensive than the plain stuff (and a little harder to work with).
I'm no expert on radio, but wouldn't higher speed data (like gig ethernet) use higher frequencies, and would that make it easier or harder to pick up in the hypothetical signals intelligence van?
Higher frequencies generally get less penetration than lower frequencies which is why 802.11b (2.4 Ghz) has such a short range and 801.11a (5 Ghz) is worse. Double-shielded cat-5 (or fiber) + wire mesh in exterior walls & windows + massive shrubbery & trees on the grounds does a damn good job at preventing any (usable) signal from leaking out to that signals van parked on the street outside my house. Though I can't do much about the outside line they tapped, except for best available encryption. With all possible security measures in place, the weakest point is always the outside connection, which is why the most sensitive stuff MUST remain disconnected from any network that has an external connection. Wireless is by definition an external connection, and must be treated as such.
The obvious next step (Score:1, Interesting)
Not remotely offtopic (Score:2)
OpenBSD, OS X, pen and paper. Most alternatives are more trustworthy.
Re:Not remotely offtopic (Score:2)
Security is in the eyes of the beholder.(or admin) (Score:3, Interesting)
Using any cheap hub, a few gel cell batteries, and some cat5 wiring knowledge, a person with physical access to the building could hide a 802.11 unit in the ceiling tile, crawlspace, outdoors in the bushes, and for the duration of the charge create a gateway into said network. Add a device (such as the dreamcast) or comprimise a computer internally to broadcast and it becomes darn near untracable.
The major problem with most 802.11 installs is the admin simple does not do enough accounting and locking down on their network. If they would just reject all unknown mac addresses and accept from a known list WITH the added benifit of encypting all the traffic there would be NOTHING to worry about.
Why doesn't someone just point that out to them? Hey Japan out of work IT dude right here in USA--I stay up all night PST playin EQ so we're on the same time zone pretty much (ba-bump)
I can SSH remotely I'll work cheaper than any indian too (baBumpTa!)
Re:Security is in the eyes of the beholder.(or adm (Score:2, Insightful)
A little too confident here? WEP encryption is flawed and hackable without too much effort. MAC addresses can be spoofed pretty easily.
Wireless is very tempting, but it should be considered a "public" network. Run all of your traffic through encrypted IPSec tunnels.
Re:Security is in the eyes of the beholder.(or adm (Score:2)
Also http://www.winton.org.uk/zebedee/ should do for a secure connection - at least no one has contradicted me regarding it yet.
One problem is.... (Score:1)
* Allowing me to specify MAC addresses. This would be ideal, since I only use two wireless clients on my network and it never changes. No clients with non-specific MAC addresses would gain access.
* Allowing me to successfully turn off "beaconing." Beaconing broadcasts the network info, which isn't necessary if the clients already know what it is. However, turning it off means I regularly lose connection, even when the PC is 30 feet away.
* Strong WEP encryption. Encryption is difficult to implement. For example, if I want a 128-bit ASCII or HEX key, I need to MANUALLY type this key into each workstation. It makes tweaking the units difficult. The "passphrase" option exists on the client software but not the WAP software. High levels of encryption are slow and result in connection loss. 64 bit works very well, 128 bit so-so.
*Allow me to run Linux. The Linux driver for the wireless card won't be available until next year.
The cheezy implementation of the standard and the highly variable implementation of various options makes these things unsecure.
Re:Security is in the eyes of the beholder.(or adm (Score:1)
On the other side, the question of safe deployment is non-trivial. While t0qer's suggestion to reject all unknown mac addresses and accept from a known list raises the bar, but doesn't eliminate problems. Again, the bad guy can readily manipulate his mac.
Best practice seems to be to put APs on a dedicated VLAN, isolated from resources until authentication is provided. [LEAP and such are nice, but subject to MITM, so make sure that mutual auth with a pre-shared secret is part of the solution, if you really want to isolate resources...] and disallow any traffic that isn't part of an encrypted session.
"Entertainment Personalities" (Score:2, Funny)
Looks like someone's porn stash got found.
Maybe they should remove fixed network (Score:2)
The risk was highest at the agency's department dealing with volcanic activity, which lacked proper firewalls such as data encryption and password-protected access.
It's sure that removing wlan APs will encrypt data and put some password mechanisms...
Re:Maybe they should remove fixed network (Score:2)
Fixing Wireless Security By Pulling The Plug (Score:2)
Good thig he was in Japan... (Score:1)
What? (Score:2)
Define good. I don't think it's good that their way of dealing with it is to avoid it. If it's broken, they should be investing in getting it fixed. Seriously, the Government's adoption of technologies like this really helps drive small businesses to innovate.
Make choices on case by case basis...... (Score:2)
If you don't want your data open for everyone to look at, don't use wireless or spend the time to create a really secure VPN/SSH connection that you trust. You shouldn't ever consider wireless any more secure/private than shouting across a couple of rows at the ball game.....that said, there are some situations where you do WANT everyone within a limited range to hear what you are saying, or simply don't care if they evesdrop...wireless is perfect for that....
We tech types have a responsibility to help educate the folks who are still trying to hook up their X-mas gifts. If people understand what's going on with wireless, they will be less likely to gripe about the problems with it and we all will be less likely to have a government solution imposed upon us...
Pretty good practise actually. (Score:1)
Shutting it all off till they can afford to place the resources on it that it requires is perfectly reasonable.
well duh (Score:2)
If the fire can't get in, how can the volcanologists study it?
Encryption? (Score:1)
What do Japanese officials have to say for encrypted wireless networks?
Re:Encryption? (Score:1)
Re:Encryption? (Score:2)
http://airsnort.shmoo.com/
--jeff++
Lacking Firewalls (Score:1)
Oh wow...data encryption and password-protected access are proper firewalls...the one I have must not be doing anything then! I can go ahead and shut it off, and just leave my access password to protect my system, and not have to deal with the headaches of hosting games through my current "improper" one.
802.11 is broken (Score:2, Interesting)
After I bought it and plugged it in, and I sat down and read up on security, and I was simply shocked at how the Linksys equipment have completely zero security.
The most you can do to protect yourself is:
1) disable SSID broadcasts
2) filter based on MAC addresses
3) use 128 bit WEP to obfuscate your data to only the casual
Of course, WEP can be broken by any hacker worth his-or-her salt, and filtering based on MAC addresses doesn't work because you can spoof MAC addresses. There is zero security from a determined hacker.
The Linksys APs also have a severe security issue where anyone can get the ssid [securityfocus.com] through a simple udp broadcast, meaning they don't even need a valid IP address. Once they get your SSID, it makes it way easier to connect to the AP.
From what I've heard, Linksys even isn't doing anything about it.
It really seems as though 802.11X is going to only find a place at home where consumers care more about getting rid of wires than about security. There is no valid reason for a business or governments, where their information is worth much much more, to be using such a security-free mechanism.
I'm okay because I needed the wireless stuff for my gf's computer, and all she does is surf the web. I put in place a FreeBSD firewall just in case, so I'm not too worried about my neighbors or wardrivers getting connected. But for those people that don't care about security, this is probably the way that untraceable hacking in the 21st is going to go through - via some idiot that left his 802.11b connection open to hackers that live across the street, or just happened to pull by in their car to try and hack into some military site, etc.
Re:802.11 is broken (Score:1)
At my house I use some of the cheap stuff. But I would still enable WEP and MAC filtering even though they can be broken. You still lock your car door even though someone can slim-jim it or just bash your window.
Re:802.11 is broken (Score:1)
I belive the term is "cracker", not "hacker".
IN SOVIET RUSSIA (Score:1)
A way with words - or not (Score:2)
b) Addressing the problem - means deal with it - I think banning wireless networks because they can be cracked is a way of addressing/dealing with the cracking problem, in the same way that changing your front door to a steel one 'addresses' the burglar-getting-through-glass-door problem.
c) Aggressive but not thorough - how can you not be more thorough in fixing a problem then by completely removing the source of the problem? Wireless suffers from warwalking / wardriving problems. Remove wireless, remove the warwalking problems.
Okay, you might not agree with me on the technical issues but I was adressing the problems that the submitter had with expressing himself. If you can't express yourself properly, then people will not listen to, consider or internalise what you're trying to tell them.
wireless lan: use carefully (Score:1)
enough said.
mmm, entertaining! (Score:3, Funny)
Cut off your nose... (Score:2)
Some explain to me again how 802.11b is so much more insecure than a wired, hubbed network? *hears silence* It's not. For 5 years I worked in an environment where we have a hubbed network. In case you don't know, that means any computer on the network can see all packets (assuming the viewer is in promiscuous mode). So what do you do? You use ssh to log in to machines. You use HTTPS for secure web data. You use Kerberos for POP3 authentication, or IMAP/SSL for IMAP authentication. You use PGP to encrypt any e-mail you're worried about. Everything else, you suck it up and deal. I don't really care that the guy down the hall knows I'm reading Slashdot.
It's the same with wireless. You want to send sensitive data? Do it over HTTPS or an IPSec connection, or an SSH tunnel, or copy it using FTP over SSHv2, or Kerberos, or one of the numerous other methods for encrypting data. If you can't use one of these methods, then maybe you want to send your data in some other form (like, dead-tree form, or verbal form, or using semaphore signals, or something). But don't pretend that sending data in clear text over a wired network is somehow better than sending it over a wireless link. (Note: I'm discounting leased pairs/dedicated circuits, since those are prohibitively expensive.) If your data is readable by someone other than you, assume that someone other than you will read it. Assuming anything else is like walking into a bank and yelling "OK, Mr. Bank Teller, I'm going to give you my PIN number - everyone else, just don't listen, ok?"
Re:Cut off your nose... (Score:1)
access something quickly on the network. there you go.
Re:Cut off your nose... (Score:1)
Tell me please how Kerberos, an authentication method, secures a network? If your kerb password is sent in plaintext, it can still be sniffed. Does using buzzwords increase your security too? Maybe we can HTML my WEP NET and FBI my LAX...
Re:Cut off your nose... (Score:2)
Kerberos V5 can be used for both authentication AND encryption.
If your kerb password is sent in plaintext, it can still be sniffed
But it's not sent in plaintext. That's the whole point of Kerberos.
Re:Cut off your nose... (Score:1)
Re:Cut off your nose... (Score:2)
Not really. Yes, your Kerb password could be compromised if you send it in the clear, but the whole point of Kerberos is that you shouldn't need to. Normally, what you do is get your tickets (using your password) on the local machine, and use those tickets to make secure connections (a trite explanation, but I'm not getting into TGTs here) to hosts using kerberized telnet and kerberized ftp. But no, there's nothing to stop you from typing your password in plaintext except your own brain.
Yes, you are correct, there is no Kerberized HTTP (anymore), but, well, there's SSL and "it seems to work OK".
Wireless security is not an Oxymoron (Score:2, Informative)
It is up and running right now, using cisco and MS hardware and software. A similar solution could be done using cisco LEAP with slightly less security for the DMZ authentication servers.
Unfortunately, a cross platform solution does not fully exist at his point. Windows has the best security at this point. Go figure. PEAP so far is only supported on windows. LEAP runs on quite a few platforms including linux and OS X.
So please... stop posting uninformed slams on 802.11. Its all about knowledge and implimentation. Our wired network here is no where near as secure as out wireless one!
Re:Wireless security is not an Oxymoron (Score:2)
Do you have a spanning switch port on the outside of your building/office that anyone can sniff? Regardless of what you're doing now to encrypt the traffic, the fact is that it can all be captured and processed at a later time. This inherently makes it way more insecure, no matter how you've scrambled the data.
Given enough time, horsepower and/or smart people (the best encryption schemes are destroyed mathematically, not by brute/distributed force) the codes can be broken. Say it takes 3-5 years. Well, where I work, we have information that has a 20 year life span. If some critical pieces are uncovered any time during that, it's game over.
No matter what security you use, 802.11 will never be truly secure.
(the really sad thing is that I blew the ability to mod because of this...there were some good posts too...sigh)
Re:Wireless security is not an Oxymoron (Score:1)
A ten second window is not sufficient to get even close to grabbing a 128bit key. The only choice is to try and figure out the key rotation. I put my faith in the fact that the key switching is reasonably random. That is my weakness, if you can call it that.
Besides, Even if they broke the keys for the wireless network, the data is heavily encrypted through a VPN tunnel and IPsec. Access to the wireless network does not grant access to the wired network. Have fun cracking the VPN!
The easiest way to get into our network over wireless is to steal a company laptop, and then try to hack a user password. We track the laptops religiously, and the users are not allowed to use their own passwords over wireless. If they want wireless, we issue them keys.
Yes, it is more secure than our wired network.
Is our network fully encrypted? NO.
Does our wired network have port atentication? NO.
Do we have to tunnel to our servers? NO.
Anyone visiting our office can drop a dreamcast in the corner of the lobby, plug it into a network jack, and POOF! they're in. Easy as that. Even if you disable the network ports in the lobby, a visitor could do the same in any office, cube, of conf room.
Troll posting (Score:2)
Dangit.... (Score:1)
In related news (Score:1, Funny)
Wireless is easy to secure (Score:2)
Meteorological Data? (Score:2)
Is anyone else a little slow to associate meteorological information with tough security? I mean, what are they doing over there if they're worried about their department of volcanic activity?
Ironic that the "sensitive data" would be prove to be personnel records. As for minutes of meetings, again, I would like to know what top secret plans were discussed. Perhaps I'm paranoid, or I've seen too many of the 600 Godzilla movies.
Last Post! (Score:1)
power of computers:
Enter lots of data on calorie & nutritive content of foods. Instruct
the thing to maximize a function describing nutritive content, with a
minimum level of each component, for fixed caloric content. The
results are that one should eat each day:
1/2 chicken
1 egg
1 glass of skim milk
27 heads of lettuce.
-- Rev. Adrian Melott
- this post brought to you by the Automated Last Post Generator...