Name Size Description
Parent Directory - ARP_Poisoning/ - Configuration/ - IDS/ - Security/ - Tools/ - WEP/ - war-driving/ - 1x.pdf 237K [en] Analyse de la securite globale dans les reseaux Wireless 5362.pdf 1.0M [en] Securite des réseaux Wireless avançées - chapter 10 : Wireless hacking 802.11d-2001.pdf 510K 802_11b.pdf 1.0M Building_Wireless_Community_Networks.pdf 1.0M Hack Proofing Your Wireless Network.pdf 6.6M Hardening_802.11.pdf 632K [en] Architecture, Securite et Optimisation des WLANs - Hardening IEEE 802.11 wireless networks IEEE_802.11g.pdf 200K [en] La norme IEEE 802.11g - IEEE 802.11g Explained Key_Hopping.pdf 83K [en] Presentation et interet de la technologie Key hopping sur un reseau 802.11 ProcessOverview-802.pdf 842K TCP_UDP.pdf 103K [en] Performance de TCP/UDP sur un reseau Wireless - TCP and UDP Performance over a Wireless LAN Wireless_Howto.txt 38K [en] Configuration d'un reseau Wireless sous GNU/linux algo_Wireless.pdf 319K [fr] Rapport securite - Les algorithmes de cryptographie dans les reseaux Wireless ebook_beta2.pdf 1.8M [fr Ebook] Tout sur le Wifi, mise a jour du ebook_sept2003.pdf - Un grand merci au wardrivers de Nantes ;) ebook_sept2003.pdf 2.7M [fr] Ebook du Wifi - Document Opensource regulierement mis a jours mobicom.pdf 99K [en] Insecurite 802.11 : Interception des Communications Mobile - Intercepting Mobile Communications:The Insecurity of 802.11 nasa_wireless.html 11K [en] Wireless Firewall Gateway White Paper report5.pdf 72K [en] Description des mecanismes de securite - 802.11b Wireless LAN Authentication, Encryption, and Security whax-aircrack-wep.swf 5.2M whax-aircrack-wpa.swf 5.2M wireless-diag.jpg 130K [en] General Wireless Firewall Gateway Diagram wireless-lan-security.pdf 147K [en] Document tres interessant avec notamment plusieurs chapitres explicitant de facon precise quelques attaques possible wireless.pdf 323K [en] Paper assez complet sur l'architecture des reseaux Wireless et leurs problemes de securite wireless_hacking.pdf 328K [en] Un tour complet de la (in)securite des reseaux WIFI - Hacking the invisible Network wpa.pdf 293K [en - White Paper] Un bon paper sur le WPA, permet d'assimiler les nouveaux mecanismes de protections des reseaux Wifi
Merci a tous les Uploaders anonymes, pour toutes demandes/remarques : Contact
TESTIMONY BY GEOFFREY S. GOODFELLOWBefore the Subcommittee on Transportation, Aviation and Materials on the subject of Telecommunications Security and Privacy.
26 September 1983
Table of Contents 1. Introduction 2. The Nature of Computer Hackers and Hacking. 3. What Can and Should Be Done to Help Abate The Unsavory Hacking Problem? 4. Let Us Not Lull Ourselves into a False Sense of Security. 5. Recommendations 6. Biography (The Making of a Hacker)
1.IntroductionMy name is Geoffrey S. Goodfellow. I am primarily employed by the Computer Science Laboratory at SRI International, Menlo Park, California. For the past 10 years at SRI, I have been involved in research efforts related with packet switched computer network communication systems, protocols and security technologies. I have also been involved in various operating and sub-system development projects. Currently, my responsibilities include a position as Principle Investigator of SRI's involvement in a Department of Defense program aimed at developing and proving secure computer systems, that operate at different security levels and communicate via networks. A detailed biography of my career from 7th grade school where I discovered computers (which eventually lead to my permanent abandonment of the formal educational system during high school) to how I got to where I am today with no degrees or any type of equivalency to my name is included at the end of my testimony. I am a coauthor of the Hacker's Dictionary -- A Guide to the World of Computer Wizards, a new book being published this fall. THE STATEMENTS INCLUDED HEREIN ARE MY OWN AND DO NOT NECESSARILY REPRESENT THOSE OF SRI INTERNATIONAL OR ANY CLIENTS OF SRI.
2. The Nature of Computer Hackers and Hacking.The primary nature of a computer hacker can be defined as follows: - A person who enjoys learning or knowing the details of computer systems and how to stretch their capabilities, as opposed to most users of computers, who prefer to learn or know only the minimum amount necessary in order to get their job done. - One who programs computers enthusiastically, for the sheer fun of it, and gets a non professional amount of enjoyment out of using them. - A person capable of appreciating the irony and beauty (i.e.`hack value') of a program. - A person who is good at programming quickly or is an expert on aparticular program. (This definition and the proceeding ones are correlated, and people who fit them congregate). Unfortunately, though, hacking has an unsavory faction to it: - A malicious or inquisitive meddler (i.e. `poacher') who tries to discover information by poking around.For example, a "password hacker" is one who tries, possibly by deceptive or illegal means, to discover other people's computer passwords. - A "network hacker" is one who tries to learn about the computer network (possibly because he wants to interfere--one can tell the difference only by context, tone of voice and manner of approach). [...]
- More >> Testimony - 1983