Log in
Register
Home
Forums
New posts
Search forums
What's new
Featured content
New posts
New profile posts
Latest activity
News
Members
Current visitors
New profile posts
Search profile posts
Features
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
New posts
Search forums
Menu
Install the app
Install
Reply to thread
Home
Forums
Pro Audio
Varsity
Large scale concert production TCP/IP networking
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Message
<blockquote data-quote="Chad Young" data-source="post: 49113" data-attributes="member: 699"><p>Re: Large scale concert production TCP/IP networking</p><p></p><p></p><p></p><p>WPA2 is still quiet susceptible to a brute force attack, so "unbreakable" is erroneous in this case. True, a well-constructed key could take a ridiculously long time to crack, but it can be done. Also, it is not necessary to have more than one device on a WLAN 'logging in and out' to launch an attack. If I wanted to drive you nuts, a simple de-auth flood from my smart phone would drive you spare and the odds of you detecting me are close to nil.</p><p></p><p>Regardless of encryption or other technologies, it is still true that the 2.4GHz and 5.2GHz bands can be rendered unsuitable for the passing of 802.11 wireless traffic with very little effort and skill. As an IT security professional and a minor-league sound guy, I would never rely on 802.11a/b/g/n wireless as my sole path for mission critical data communication.</p><p></p><p>That is my $0.02.</p></blockquote><p></p>
[QUOTE="Chad Young, post: 49113, member: 699"] Re: Large scale concert production TCP/IP networking WPA2 is still quiet susceptible to a brute force attack, so "unbreakable" is erroneous in this case. True, a well-constructed key could take a ridiculously long time to crack, but it can be done. Also, it is not necessary to have more than one device on a WLAN 'logging in and out' to launch an attack. If I wanted to drive you nuts, a simple de-auth flood from my smart phone would drive you spare and the odds of you detecting me are close to nil. Regardless of encryption or other technologies, it is still true that the 2.4GHz and 5.2GHz bands can be rendered unsuitable for the passing of 802.11 wireless traffic with very little effort and skill. As an IT security professional and a minor-league sound guy, I would never rely on 802.11a/b/g/n wireless as my sole path for mission critical data communication. That is my $0.02. [/QUOTE]
Insert quotes…
Verification
Post reply
Home
Forums
Pro Audio
Varsity
Large scale concert production TCP/IP networking
Top
Bottom
Sign-up
or
log in
to join the discussion today!