test

Back in the old days, before everyone had broadband internet access, modems were the standard way of accessing other computers and consequently other networks. In order to connect to another computer, you first had to know what phone number to call. People would often run programs that would call huge amounts of phone numbers in an attempt to find computers that they could connect to. Often times people would find dial-in phone numbers to corporate, school, or other networks that they probably shouldn't have access to.

With the advent of the Internet, a similar activity has been born. Scanning. On the Internet, an IP address is analogous to a phone number. People often scan through large amounts of IP addresses looking for computers that are running certain types of servers.

The new wireless age has introduced a new brute force attack. Originally, WarDriving was when crackers drove around in a car equipped with wireless gear looking for unsecured wireless networks, to gain illicit access. Over time, the term has evolved to include harmless types like us simply checking on the RF environment. A year ago, TheRegister had an article about War driving. There are some tools to facilitate finding AccessPoints.

Tools

 # cd /usr/ports/x11/wscan 
 # make install clean 


There are also some tools available to help you subvert the security of an AccessPoint (or more acurately audit the security of your own AccessPoint ... right?). These should be refactored into another page.BR


Power Inverters can be used to run laptops and computers in cars or trucks. The range in power from those able to power laptops to those able to power several computers in a van. A wide selection of power Inverters can be found at: http://www.4lots.com There are also some tools available to help you subvert the security of an AccessPoint (or more acurately audit the security of your own AccessPoint ... right?). These should be refactored into another page.