There are plenty of tools available which sniff wireless networks
... or wired networks.
If you are using wireless, you have to have a tunnel working ;-)
There are also tools for that. It only takes a little longer.
No matter what you put at it, given enough time and resources there will be someone somewhere that will be able to break it.
Most of the time the most secure system will be compromised because of lazy security policies that just let someone choose something like his wife name or children birth date as password...
J. Antas
------------------------------------------------------- This SF.Net email is sponsored by: IBM Linux Tutorials Free Linux tutorial presented by Daniel Robbins, President and CEO of GenToo technologies. Learn everything from fundamentals to system administration.http://ads.osdn.com/?ad_id=1470&alloc_id=3638&op=click _______________________________________________ Care2002-developers mailing list [EMAIL PROTECTED] https://lists.sourceforge.net/lists/listinfo/care2002-developers

