I have a question about user based security.

If I was a WLAN user on a network which implemented 3 levels of access.
Level 1 allowing me to access an Internet connection through my NT user
account, with no user authentication or encryption.

What are the basic measures I should take to secure myself against attack in
ad-hoc mode (is this possible?).

I don't have laptop, or wireless adaptor, or access to any to test.
(And I am trying to design a campus WLAN)

Thanks

Rob
--
general wireless list, a bawug thing <http://www.bawug.org/>
[un]subscribe: http://lists.bawug.org/mailman/listinfo/wireless

Reply via email to