Disabling at least the IP Address assignment function of the network's DHCP server, with the IP addresses of the various network devices then set by hand, will also make it more difficult for a casual or unsophisticated intruder to log onto the network. This is especially effective if the subnet size is also reduced from a standard default setting to what is absolutely necessary and if permitted but unused IP addresses are blocked by the access point's firewall. In this case, where no unused IP addresses are available, a new user can log on without detection using TCP/IP only if he or she stages a successful Man in the Middle Attack using appropriate software.
About Me
Blog Archive
-
▼
2009
(99)
-
▼
Mei
(21)
- Menghentikan Timer Saat Download Di 4Shared
- The Lord of the Rings: Conquest 2009 [D-Links]
- bikin pdf pake php
- Lirik Saykoji DI bajak ama MalaYSiaNG
- Membuat Blog Lebih Gaul
- Garuda di Dadaku
- Source VB (just share)
- No Copy/Cut ke Flashdisk dari Kompie Anda (TANPA S...
- Archive for the ‘proxy tutorial’ Category
- Pasang Proxy Ala R3B3L
- Static IP addressing
- Wireless security
- PR di saat menunggu hasil pengumuman sekolah
- cara membuat virus ala R3B3L
- Kalau ada pertanyaan tentang apa sih arti seorang ...
- arti cinta sesungguh nya
- Tutorial SQL 2009
- hears greeting from lucifer courier:my name is reb...
- Cara tahu website joomla?
- Daftar situs-situs web Boot dan Anti Boot Yahoo Me...
- Rahasia Memahami Hati Cewek
-
▼
Mei
(21)
0 comments:
Posting Komentar