google helps here: there are tools that inject a packet that disconnects a client. On reconnect, they try and get in first using the spoofed mac address - if they win, they have knocked your "connected" client off the air and taken its place. Finding the mac address is also easy: kismet etc. Use wpa_psk and/or openvpn with a good config so they cant slip in - they can knock you off, but cant connect.
However, I have had problems with this combination, I think because of the overhead openvpn adds to a borderline connection - sometimes its good, other times pauses as the buffer cant fill fast enough. Without openvpn it was OK. BillK On Thu, 2005-12-08 at 20:25 -0900, John Andersen wrote: > > > On 12/8/05, Todd <[EMAIL PROTECTED]> wrote: > > > Not to fan the flames here...but... > > 1. MAC filtering is a joke, any bored 12 year old kid can > spoof a trusted > MAC. So is thinking you are hidden by turning off broadcast > SSID..etc. If > you have a machine talking to your AP, the snoop can see all > they need to > know. > > > But they have to know which MAC to spoof don't they. > > And if that MAC is connected, as my remote stations always are they > will not be successful spoofing a MAC. > > > > _______________________________________________ > mythtv-users mailing list > [email protected] > http://mythtv.org/cgi-bin/mailman/listinfo/mythtv-users
_______________________________________________ mythtv-users mailing list [email protected] http://mythtv.org/cgi-bin/mailman/listinfo/mythtv-users
