Cyborg Unplug

Post Reply
Leisher
Site Admin
Posts: 70451
Joined: Thu May 20, 2004 9:17 pm
Contact:

Post by Leisher »

"Happy slaves are the worst enemies of freedom." - Marie Von Ebner
"It was always the women, and above all the young ones, who were the most bigoted adherents of the Party, the swallowers of slogans, the amateur spies..." - Orwell
Malcolm
Posts: 32040
Joined: Fri May 21, 2004 1:04 pm
Location: Minneapolis

Post by Malcolm »

I bet this is, at best, somewhat effective at stopping intrusions. Wireless security still sucks because the fundamental problem of "Who should be able to connect," is a bitch without wires.
Step 3

Select the devices you wish to detect and choose which networks you'd like to defend (Territory Mode).

Select the devices? That implies they have a way of ID'ing what type of devices are around and whether or not their connection is legit. You can hack anything to make it report it's anything else. They could have a fantastic lookup of techie info in their firmware that has the world's greatest hardware and software recognition algorithms on there, but I doubt it. There's also the question of how secure the device is to boot. If you had sufficient rules in place that blocked all IPs and machines except a specific white list, then maybe. In that case, I'd expect a list of allowed devices, not disallowed.




Edited By Malcolm on 1447106661
Diogenes of Sinope: "It is not that I am mad, it is only that my head is different from yours."
Arnold Judas Rimmer, BSC, SSC: "Better dead than smeg."
Post Reply