- "Marko Vojinovic" escreveu:
> Does anyone know about some free (as in beer, and maybe as in speech)
> software which would implement authentication and authorization of a user
> prior
> to issuing a valid dhcp lease?
>
> I imagine the following scenario: someone walks into my office
> bu
Marko Vojinovic wrote:
> Does anyone know about some free (as in beer, and maybe as in speech)
> software
> which would implement authentication and authorization of a user prior to
> issuing a valid dhcp lease?
>
> I imagine the following scenario: someone walks into my office building with
>
On Monday 19 October 2009 01:36:58 Mathew S. McCarrell wrote:
> On Sun, Oct 18, 2009 at 11:38 AM, Marko Vojinovic wrote:
> > On Sunday 18 October 2009 15:18:29 Jonathan Moore wrote:
> > > On Sun, Oct 18, 2009 at 8:58 AM, Marko Vojinovic
> >
> > wrote:
> > > > I imagine the following scenario: som
2009/10/19 Marko Vojinovic :
> I've never had a case of deliberate network intrusion&misuse, since physical
> access to the building is rather restricted. So far problems have occurred
> exclusively because of user ignorance. Users don't bother to obey local policy
> about p2p, antivirus and other
On Monday 19 October 2009 08:05:39 Amos Shapira wrote:
> 2009/10/19 Marko Vojinovic :
> > with a form the user is supposed to fill in and send. After he does so,
> > an administrator does a sanity check of the data the user provided, and
> > grants or denies access. If access is granted, the user g
2009/10/19 Marko Vojinovic :
> with a form the user is supposed to fill in and send. After he does so, an
> administrator does a sanity check of the data the user provided, and grants or
> denies access. If access is granted, the user gets a new, unrestricted dhcp
> lease, which provides him with a
On Sun, Oct 18, 2009 at 11:38 AM, Marko Vojinovic wrote:
> On Sunday 18 October 2009 15:18:29 Jonathan Moore wrote:
> > On Sun, Oct 18, 2009 at 8:58 AM, Marko Vojinovic
> wrote:
> > > I imagine the following scenario: someone walks into my office building
> > > with a laptop (a colleague, a visi
On Sunday 18 October 2009 15:18:29 Jonathan Moore wrote:
> On Sun, Oct 18, 2009 at 8:58 AM, Marko Vojinovic wrote:
> > I imagine the following scenario: someone walks into my office building
> > with a laptop (a colleague, a visitor, a guest, whoever), and hooks up
> > onto the local net (wired or
On Sun, Oct 18, 2009 at 8:58 AM, Marko Vojinovic wrote:
---8<
> I imagine the following scenario: someone walks into my office building with a
> laptop (a colleague, a visitor, a guest, whoever), and hooks up onto the local
> net (wired or wireless). The server detects an unknown MAC address,
9 matches
Mail list logo