January 2008
Intermediate to advanced
336 pages
9h 43m
English
Up until now, we've been talking about keeping electronic intruders out of your wireless network. It's easy enough to gain access to a network using off-the-shelf equipment that hasn't already been configured for that network; it's even easier when the intruder has stolen a laptop from an authorized user. Losing a laptop computer to a thief is bad enough. Letting the thief use a stolen computer to log in to a network is even worse. As a network operator, you should remind your users that their portables are attractive targets for thieves, and offer some guidelines for protecting them. As a user yourself, you should follow the same precautions.
The first rule is simple: Don't forget that you're carrying a computer. It seems obvious, ...