[=-NewFFR's REPOSITORY-=]

Icon  Name                                     Size  Description
[DIR] Parent Directory - [DIR] ARP_Poisoning/ - [DIR] Configuration/ - [DIR] IDS/ - [DIR] Security/ - [DIR] Tools/ - [DIR] WEP/ - [DIR] war-driving/ - [PDF file] 1x.pdf 237K [en] Analyse de la securite globale dans les reseaux Wireless [PDF file] 5362.pdf 1.0M [en] Securite des réseaux Wireless avançées - chapter 10 : Wireless hacking [PDF file] 802.11d-2001.pdf 510K [PDF file] 802_11b.pdf 1.0M [PDF file] Building_Wireless_Community_Networks.pdf 1.0M [PDF file] Hack Proofing Your Wireless Network.pdf 6.6M [PDF file] Hardening_802.11.pdf 632K [en] Architecture, Securite et Optimisation des WLANs - Hardening IEEE 802.11 wireless networks [PDF file] IEEE_802.11g.pdf 200K [en] La norme IEEE 802.11g - IEEE 802.11g Explained [PDF file] Key_Hopping.pdf 83K [en] Presentation et interet de la technologie Key hopping sur un reseau 802.11 [PDF file] ProcessOverview-802.pdf 842K [PDF file] TCP_UDP.pdf 103K [en] Performance de TCP/UDP sur un reseau Wireless - TCP and UDP Performance over a Wireless LAN [TXT] Wireless_Howto.txt 38K [en] Configuration d'un reseau Wireless sous GNU/linux [PDF file] algo_Wireless.pdf 319K [fr] Rapport securite - Les algorithmes de cryptographie dans les reseaux Wireless [PDF file] ebook_beta2.pdf 1.8M [fr Ebook] Tout sur le Wifi, mise a jour du ebook_sept2003.pdf - Un grand merci au wardrivers de Nantes ;) [PDF file] ebook_sept2003.pdf 2.7M [fr] Ebook du Wifi - Document Opensource regulierement mis a jours [PDF file] mobicom.pdf 99K [en] Insecurite 802.11 : Interception des Communications Mobile - Intercepting Mobile Communications:The Insecurity of 802.11 [TXT] nasa_wireless.html 11K [en] Wireless Firewall Gateway White Paper [PDF file] report5.pdf 72K [en] Description des mecanismes de securite - 802.11b Wireless LAN Authentication, Encryption, and Security [   ] whax-aircrack-wep.swf 5.2M [   ] whax-aircrack-wpa.swf 5.2M [IMG] wireless-diag.jpg 130K [en] General Wireless Firewall Gateway Diagram [PDF file] wireless-lan-security.pdf 147K [en] Document tres interessant avec notamment plusieurs chapitres explicitant de facon precise quelques attaques possible [PDF file] wireless.pdf 323K [en] Paper assez complet sur l'architecture des reseaux Wireless et leurs problemes de securite [PDF file] wireless_hacking.pdf 328K [en] Un tour complet de la (in)securite des reseaux WIFI - Hacking the invisible Network [PDF file] wpa.pdf 293K [en - White Paper] Un bon paper sur le WPA, permet d'assimiler les nouveaux mecanismes de protections des reseaux Wifi
Merci a tous les Uploaders anonymes, pour toutes demandes/remarques : Contact


TESTIMONY BY GEOFFREY S. GOODFELLOW Before the Subcommittee on Transportation, Aviation and Materials on the subject of Telecommunications Security and Privacy.

26 September 1983

Table of Contents 1. Introduction 2. The Nature of Computer Hackers and Hacking. 3. What Can and Should Be Done to Help Abate The Unsavory Hacking Problem? 4. Let Us Not Lull Ourselves into a False Sense of Security. 5. Recommendations 6. Biography (The Making of a Hacker)

1.Introduction

My name is Geoffrey S. Goodfellow. I am primarily employed by the Computer Science Laboratory at SRI International, Menlo Park, California. For the past 10 years at SRI, I have been involved in research efforts related with packet switched computer network communication systems, protocols and security technologies. I have also been involved in various operating and sub-system development projects. Currently, my responsibilities include a position as Principle Investigator of SRI's involvement in a Department of Defense program aimed at developing and proving secure computer systems, that operate at different security levels and communicate via networks. A detailed biography of my career from 7th grade school where I discovered computers (which eventually lead to my permanent abandonment of the formal educational system during high school) to how I got to where I am today with no degrees or any type of equivalency to my name is included at the end of my testimony. I am a coauthor of the Hacker's Dictionary -- A Guide to the World of Computer Wizards, a new book being published this fall. THE STATEMENTS INCLUDED HEREIN ARE MY OWN AND DO NOT NECESSARILY REPRESENT THOSE OF SRI INTERNATIONAL OR ANY CLIENTS OF SRI.

2. The Nature of Computer Hackers and Hacking.

The primary nature of a computer hacker can be defined as follows: - A person who enjoys learning or knowing the details of computer systems and how to stretch their capabilities, as opposed to most users of computers, who prefer to learn or know only the minimum amount necessary in order to get their job done. - One who programs computers enthusiastically, for the sheer fun of it, and gets a non professional amount of enjoyment out of using them. - A person capable of appreciating the irony and beauty (i.e.`hack value') of a program. - A person who is good at programming quickly or is an expert on aparticular program. (This definition and the proceeding ones are correlated, and people who fit them congregate). Unfortunately, though, hacking has an unsavory faction to it: - A malicious or inquisitive meddler (i.e. `poacher') who tries to discover information by poking around.For example, a "password hacker" is one who tries, possibly by deceptive or illegal means, to discover other people's computer passwords. - A "network hacker" is one who tries to learn about the computer network (possibly because he wants to interfere--one can tell the difference only by context, tone of voice and manner of approach).

[...]