Those of you that have taken our vSphere Ultimate Bootcamp, know what great lengths we Read more →
Posted by: Admin | Posted on: December 30th, 2011 | 0 Comments
Some examples are:
1. Not broadcasting your WLAN SSID. Or, if you do broadcast iy, setting it to something silly (though comical) like OUTOFRANGE or UNAVAILABLE or ERROR.
2. Using Port Security or MAC Filtering as the sole mechanism for controlling access to your network.
3. Hiding files in obscure file system directory structures because “nobody will find them there”
4. Using older/seldom used wireless technologies to transmit data (HomeRF, OpenAir, etc.).
5. Setting your computer name to something obscure like UNKNOWN unwitting users misinterpret the output.
Examples like #1 and #5 are meant to be tongue-in-cheek offerings in class.
Hopefully nobody would ever consider them to be valid efforts at security…