Sponsored Content
Full Discussion: Problem with wireless card
Special Forums Windows & DOS: Issues & Discussions Problem with wireless card Post 49011 by NetAX on Tuesday 23rd of March 2004 02:07:56 PM
Old 03-23-2004
I think you need to have your wireless connection encrypted to stop others from eavesdropping or you from eavesdropping onto another connection.
 

10 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

Lucent/Orinoco Wireless card problems

Im running mandrake 9.0 and i just got a Lucent/orinoco PC24E-H-FC. I beleive it was originaly made by lucent but then made by Orinoco.. But anyways i just cant get connected. Ive tried 3 differemt drivers. My wireless access point router is a Linksys. I just cant figure this out ive talked on... (3 Replies)
Discussion started by: jason1234
3 Replies

2. Linux

wireless card for mandrake 9.1 hp laptop

I just recently bought a HP Pavilion zt3020us and it had came with an internal WiFi NIC (Intel(R) PRO/Wireless LAN 2100 3B Mini PCI Adapter) and I was wondering where I could go to find a device driver for it under Mandrake 9.1 Linux. (2 Replies)
Discussion started by: N0C717
2 Replies

3. Linux

Wireless network card performance

I am running FC4: Linux maincomp 2.6.13-1.1532_FC4smp I recently changed the OS from windows XP, and have a feeling that for some reason my wireless network card is slower on Fedora Core 4. The Belkin PCI 802.11b card was automatically detected and configured by FC4 when I installed the OS,... (0 Replies)
Discussion started by: dangral
0 Replies

4. Linux

Wireless card won't pick up network

I'm trying to get my wireless card up. I've been at it for a while now and something just isn't quite working right. I'm not getting any wireless signal. I'm using FC4 with a stack 16 kernel and ndiswrappr to load my drivers. here are the outputs that i get. Alittle bit about my... (3 Replies)
Discussion started by: byblyk
3 Replies

5. Solaris

Installing RT2500 Wireless network card

I need to install a driver for my RT2500 PCI wireless network card on my Solaris 10. So I went to the ralink website (the manufacturer of the network card), and downloaded the linux (well supposedly the unix driver) binary file. Burned it to dvd, and copied from the dvd to my solaris computer.... (3 Replies)
Discussion started by: Xannen
3 Replies

6. Linux

wireless card

Ive been fooling around on my spare laptop and put different cores of Fedora on and the computer uses an ibm a/b/g card but the os wont recognize the card and doesnt have the software fore it is there anyway to get the software for the card on the comp or should i buy a card that the os knows? (7 Replies)
Discussion started by: Texasone
7 Replies

7. IP Networking

use one wireless card for two pc's

I'm not what this is called so I don't exactly know what to search for to do my homework.:D But I have two IBM T40's and only one wireless internet card. I don't have to money to buy another wireless card, so my question is this: Can I use the card on one system and use an ethenet cable linked... (2 Replies)
Discussion started by: Texasone
2 Replies

8. Red Hat

Dlink Dwl-g630 Wireless card

Hello, I'm extremely new to Linux. I've been a windows admin for years stupid me, should have got into Linux way back. So now playing catch up. I was hoping someone could help me get started. I've been online reading but getting confused a lot of info and very different from windows. I... (0 Replies)
Discussion started by: kidsusuki
0 Replies

9. Programming

Turn ON/OFF Wireless Card

Hi all, In my program, I am trying to use ioctl to turn on/off the wireless card, using SIOCSIFFLAGS (I am new to it but somebody said it is the most traditional way). However, it seems that I didn't set the flag correctly since the wireless is always on (I have root permission). If any one... (2 Replies)
Discussion started by: tetelee
2 Replies

10. Hardware

identify wireless network card

hi Howto identify wireless network card using Live CD? (2 Replies)
Discussion started by: ccc
2 Replies
ipsecesp(7P)                                                         Protocols                                                        ipsecesp(7P)

NAME
ipsecesp, ESP - IPsec Encapsulating Security Payload SYNOPSIS
drv/ipsecesp DESCRIPTION
The ipsecesp module provides confidentiality, integrity, authentication, and partial sequence integrity (replay protection) to IP data- grams. The encapsulating security payload (ESP) encapsulates its data, enabling it to protect data that follows in the datagram. For TCP packets, ESP encapsulates the TCP header and its data only. If the packet is an IP in IP datagram, ESP protects the inner IP datagram. Per-socket policy allows "self-encapsulation" so ESP can encapsulate IP options when necessary. See ipsec(7P). Unlike the authentication header (AH), ESP allows multiple varieties of datagram protection. (Using a single datagram protection form can expose vulnerabilities.) For example, only ESP can be used to provide confidentiality. But protecting confidentiality alone exposes vulner- abilities in both replay attacks and cut-and-paste attacks. Similarly, if ESP protects only integrity and does not fully protect against eavesdropping, it may provide weaker protection than AH. See ipsecah(7P). ESP Device ESP is implemented as a module that is auto-pushed on top of IP. Use the /dev/ipsecesp entry to tune ESP with ndd(1M). Algorithms ESPuses encryption and authentication algorithms. Authentication algorithms include HMAC-MD5 and HMAC-SHA-1. Encryption algorithms include DES, Triple-DES, Blowfish and AES. Each authentication and encryption algorithm contain key size and key format properties. You can obtain a list of authentication and encryption algorithms and their properties by using the ipsecalgs(1M) command. You can also use the functions described in the getipsecalgbyname(3NSL) man page to retrieve the properties of algorithms. Because of export laws in the United States, not all encryption algorithms are available outside of the United States. Security Considerations ESP without authentication exposes vulnerabilities to cut-and-paste cryptographic attacks as well as eavesdropping attacks. Like AH, ESP is vulnerable to eavesdropping when used without confidentiality. ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Availability |SUNWcsr (32-bit) | +-----------------------------+-----------------------------+ |Interface Stability |Evolving | +-----------------------------+-----------------------------+ SEE ALSO
ipsecalgs(1M), ipsecconf(1M), ndd(1M), attributes(5), getipsecalgbyname(3NSL), ip(7P), ipsec(7P), ipsecah(7P) Kent, S. and Atkinson, R.RFC 2406, IP Encapsulating Security Payload (ESP), The Internet Society, 1998. SunOS 5.10 18 May 2003 ipsecesp(7P)
All times are GMT -4. The time now is 04:02 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy