It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
When asked if Wi-Fi brings more people into businesses and improves customer loyalty, Paula Rosenblum, a managing partner with Retail Systems Research (RSR), says: "Absolutely. Yes. Definitely." Her belief is that "anything that brings customers back to a store" is critical, "whether it's the music, the newspapers or the Wi-Fi-if it's a part of the experience, you'll go there," she says. "Wi-Fi is really a customer-centric practice for businesses."
Threatening e-mails were sent to media organisations prior to the July 26 Ahmedabad and September 13 Delhi serial blasts from unsecured wireless Internet connections in Navi Mumbai and Mumbai respectively. Another email was sent from a wireless internet connection at a college in Central Mumbai.
"They sat in the car in which they came and sent the e-mail after which they left," Maria said.
wi-fi connections were being hacked into by the hacker.
Anticipated Problems
There are lots of problems that can come up that will make the above fail, or work very slowly.
• No traffic
o No traffic is being passed, therefore you can't capture any IVs..
• MAC Address filtering
o AP is only responding to connected clients. Probably because MAC address filtering is on.
• Can't Crack even with tons of IVs
o Some of the statistical attacks can create false positives and lead you in the wrong direction.
• Still Nothing
If the key is not static, then you'll mix up all your IVs and it'll take forever to decrypt the key.
Using the captured data, I was able to repeatably crack 64 bit WEP keys in 1-2 seconds using
the ---------program. (That means I did it twice). This required very little data, since it was just brute
force.
Late-breaking news: with almost 2,000,000 IV's, --------- cracked my 128-bit key in about 43 seconds.
Finally! Those must have been really strong IV's!
To complete the experiment, I tried decrypting the pcap captured packets. The wep_decrypt program didn't like my hex key (format to supply wasn't clear, and I didn't take time to read the source). When I supplied the passphrase the keys were generated from, Ethereal had no joy reading the packets, so maybe a header file constant was off when I compiled the code. The 80211ether Windows binary program worked very quickly and the results were clearly cleartext.
"WEP key discovery has gotten very sophisticated". Both articles explains the tools and some of the clever ideas they're based on. In particular, the ------- program uses packet replay to attack a single packet one bit at a time and decode it, exploiting the lack of replay protection in WEP
I’m sure that I’m like other judges that you use, in that I put a reasonable amount of time an energy into reading each post, comparing it to previous posts, following up on links and research and in general trying to do the best job that I can. When that happens it is natural to place yourself in the position of the participant. How would I have tackled this? What would my response be?
I was shocked at how the large, overriding concerns were ignored or minimized. Who would pay for the services and infrastructure? Why should they be forced to do so? What benefit would it provide to society in general (as opposed to individuals)? Would it help give a society a competitive edge in the information age? Should it be considered part of a national infrastructure and treated as such (like bridges, dams and roadways)? Would it facilitate cheaper or free secondary education for citizens? How would it be evenly distributed? Would you prioritize who gets the system implemented first? How would rural areas be handled?
It has come down to who had the weaker arguments, and that was Tesla and therefore peacejet wins.
Challenge Match: N. Tesla vs peacejet: Wireless Access For Free?
The topic for this debate is “WiFi Should Be Free For Everyone.”
N. Tesla
While a fairly short opening he did manage to outline his intent very nicely.
Very nice first post in addressing the business advantage, yet as we will see, peacejet killed in answering the Socratic Questions Tesla asked.
Peacejet
I felt that peacejet restricted himself initially in his opening by addressing only one issue surrounding the topic.
Home run to peacejet on his first reply. Perfect example of the use of “answers” to Socratic Questions. This shows why using Socratic Questions should be considered long and hard prior to just asking them.
Peacejet’s insertion of the terrorist aspect was brilliant in his later posts.
Final Thoughts:
Over all a nice debate although I felt that Tesla could really have put more into it. There were several aspect that Tesla could have hammered home, such as the cost issue, that he really never sunk his teeth into, while peacejet effectively argued his position and defended Tesla’s assertions quite nicely.
Win; hands down to peacejet