Penetration Testing mailing list archives
RE: Emulating a wireless access point
From: "Meredith S" <merediths () pwaor com>
Date: Wed, 15 Aug 2001 11:06:35 -0700
[snip]
:No, it probably has more to do with the fact that they both operate in the
:unlicensed but regulated 2.4Ghz band.
[snip]
That's not incompatible w/ my earlier surmise...as long as two frequencies
aren't relatively prime, they can cause harmonic interfearence w/ each
other. There are many frequency pairs in the 2.4 Ghz range that meet this
criteria.
FCC Regulation has nothing to do w/ the laws of physics. The fact that two
devices operate in an unregulated range do not cause them to interfere with
each other. I doubt the underlying electronics of the device are even aware
of FCC regulation.
[snip]
:I strongly disagree with your methodologies. Please explain?
[snip]
I wasn't proposing a methodolgy, just one possible explanation of the cause
of an event. Possible -- I'm not an RF expert by far.
-- Meredith S.
-----Original Message-----
From: Al Potter [mailto:apotter () icsa net]
Sent: Wednesday, August 15, 2001 10:13 AM
To: Meredith S
Cc: pen-test () securityfocus com
Subject: Re: Emulating a wireless access point
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Content-Type: text/plain; charset=us-ascii
merediths () pwaor com said:
Actually, it probably has to do w/ the frequency / harmonic resonance
of the phone interfearing w/the AP ... not the proximity.
No, it probably has more to do with the fact that they both operate in the unlicensed but regulated 2.4Ghz band. You _may_ get some relief by manipulating the channel on the access point or on the telephone handset. AL -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Exmh version 2.2 06/23/2000 iQCVAwUBO3qtktuN3h5YyVRRAQJamQP8DsBgWN/pFq4YmaFR9Xj4GbYxTruaMF9z +yGAaowajbk5XJcOPq/UtqNKAAeJ+D6mBJY0pOx0AnF1x+1vUw+AtYIPn/d6VdGS 5Jt08BKmwMUCmQ7cqnUHDKlCYpUoPE+ti9nDBZIGTfj0Qqtdc4ZvQgmcdOQhUax/ yBjKydkk15U= =mORv -----END PGP SIGNATURE----- ---------------------------------------------------------------------------- This list is provided by the SecurityFocus Security Intelligence Alert (SIA) Service. For more information on SecurityFocus' SIA service which automatically alerts you to the latest security vulnerabilities please see: https://alerts.securityfocus.com/
Current thread:
- Emulating a wireless access point Steve Skoronski (Aug 13)
- Re: Emulating a wireless access point Robert van der Meulen (Aug 13)
- Re: Emulating a wireless access point Thorsten Fischer (Aug 14)
- RE: Emulating a wireless access point Jason Lewis (Aug 14)
- <Possible follow-ups>
- RE: Emulating a wireless access point Jason Brvenik (Aug 14)
- RE: Emulating a wireless access point Meredith S (Aug 15)
- Re: Emulating a wireless access point Al Potter (Aug 15)
- RE: Emulating a wireless access point Meredith S (Aug 15)
- Re: Emulating a wireless access point Michael Boman (Aug 16)
- RE: Emulating a wireless access point Meredith S (Aug 15)
- Re: Emulating a wireless access point Robert van der Meulen (Aug 13)
- RE: Emulating a wireless access point Nicholas de Jong (Aug 14)
- RE: Emulating a wireless access point Jason Lewis (Aug 15)
- RE: Emulating a wireless access point Artes, Francisco (Aug 15)
- RE: Emulating a wireless access point bparis (Aug 15)
- Re: Emulating a wireless access point David Ford (Aug 15)
- Re: Emulating a wireless access point Marc Mosko (Aug 16)
