<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>NetStumbler</title>
	<atom:link href="http://www.netstumbler.com/category/bugs/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.netstumbler.com</link>
	<description>The award-winning wireless networking tool and the best source for your daily Wi-Fi, WiMAX, 3G and VoIP news.</description>
	<lastBuildDate>Fri, 19 Sep 2014 17:52:12 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
		<item>
		<title>New Vulnerabilities To DoS Attacks In Wi-Fi / 802.11 Networks Revealed</title>
		<link>http://www.netstumbler.com/2004/08/10/new-vulnerabilities-to-dos-attacks-in-wi-fi-80211-networks-revealed/</link>
		<comments>http://www.netstumbler.com/2004/08/10/new-vulnerabilities-to-dos-attacks-in-wi-fi-80211-networks-revealed/#comments</comments>
		<pubDate>Tue, 10 Aug 2004 09:12:00 +0000</pubDate>
		<dc:creator>Wayne Slavin</dc:creator>
				<category><![CDATA[Bugs]]></category>
		<category><![CDATA[Research]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com:8080/?p=2076</guid>
		<description><![CDATA[The use of Wi-Fi / 802.11 wireless networks is steadily increasing despite many studies reporting security problems, Dr. Gianluigi Me, a Professor at the University of Tor Vergata of Rome, Italy and a staff member at the Wi-Fi Technology Forum (Wi-Fi-TF), together with Dr. Francesco Ferreri have just published &#8220;New vulnerabilities to DoS attacks in [...]]]></description>
				<content:encoded><![CDATA[<p>The use of Wi-Fi / 802.11 wireless networks is steadily increasing despite many studies reporting security problems, Dr. Gianluigi Me, a Professor at the University of Tor Vergata of Rome, Italy and a staff member at the Wi-Fi Technology Forum (Wi-Fi-TF), together with Dr. Francesco Ferreri have just published &#8220;New vulnerabilities to DoS attacks in 802.11 networks&#8221;, a Wi-Fi Security paper highlighting the newly discovered dangers, suggesting remedies and possible defenses.<br />
Via [<a href="http://www.wi-fitechnology.com/displayarticle1356.html">wi-fitechnology.com</a>]</p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2004/08/10/new-vulnerabilities-to-dos-attacks-in-wi-fi-80211-networks-revealed/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Security Fix Proposed For Wireless LANs</title>
		<link>http://www.netstumbler.com/2004/08/03/security-fix-proposed-for-wireless-lans/</link>
		<comments>http://www.netstumbler.com/2004/08/03/security-fix-proposed-for-wireless-lans/#comments</comments>
		<pubDate>Tue, 03 Aug 2004 19:03:00 +0000</pubDate>
		<dc:creator>Wayne Slavin</dc:creator>
				<category><![CDATA[Bugs]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com:8080/?p=2098</guid>
		<description><![CDATA[Wireless-LAN access point developer Aruba Wireless Networks will provide recommendations to the Internet Engineering Task Force this week aimed at preventing security breaches in Radius network access servers with WLAN clients. The company said the widespread use of WLANs in enterprise networks is exacerbating security problems in Radius (remote authentication dial-in user service) servers. Via [...]]]></description>
				<content:encoded><![CDATA[<p>Wireless-LAN access point developer Aruba Wireless Networks will provide recommendations to the Internet Engineering Task Force this week aimed at preventing security breaches in Radius network access servers with WLAN clients. The company said the widespread use of WLANs in enterprise networks is exacerbating security problems in Radius (remote authentication dial-in user service) servers.<br />
Via [<a href="http://www.commsdesign.com/news/tech_beat/showArticle.jhtml?articleID=26100911">commsdesign.com</a>]</p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2004/08/03/security-fix-proposed-for-wireless-lans/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Comcast Denies Role In Wi-Fi Disconnects</title>
		<link>http://www.netstumbler.com/2004/07/09/comcast-denies-role-in-wi-fi-disconnects/</link>
		<comments>http://www.netstumbler.com/2004/07/09/comcast-denies-role-in-wi-fi-disconnects/#comments</comments>
		<pubDate>Fri, 09 Jul 2004 13:17:00 +0000</pubDate>
		<dc:creator>Wayne Slavin</dc:creator>
				<category><![CDATA[Bugs]]></category>
		<category><![CDATA[ISP]]></category>
		<category><![CDATA[Research]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com:8080/?p=2161</guid>
		<description><![CDATA[Comcast executives point to a recent rash of wireless hardware problems as unintended &#8220;endorsements&#8221; of the cable giant&#8217;s home networking program. Via [wi-fiplanet.com]]]></description>
				<content:encoded><![CDATA[<p>Comcast executives point to a recent rash of wireless hardware problems as unintended &#8220;endorsements&#8221; of the cable giant&#8217;s home networking program.<br />
Via [<a href="http://www.wi-fiplanet.com/news/article.php/3378481">wi-fiplanet.com</a>]</p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2004/07/09/comcast-denies-role-in-wi-fi-disconnects/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Greedy Hackers Can Hog Wi-Fi Bandwidth</title>
		<link>http://www.netstumbler.com/2004/06/09/greedy-hackers-can-hog-wi-fi-bandwidth/</link>
		<comments>http://www.netstumbler.com/2004/06/09/greedy-hackers-can-hog-wi-fi-bandwidth/#comments</comments>
		<pubDate>Wed, 09 Jun 2004 16:10:00 +0000</pubDate>
		<dc:creator>Wayne Slavin</dc:creator>
				<category><![CDATA[Bugs]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Standards]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com:8080/?p=2255</guid>
		<description><![CDATA[Greedy computer hackers using open-source Linux machines could steal more than their fair share of bandwidth from Wi-Fi hotspots, Swiss computer scientists have warned. Via [newscientist.com]]]></description>
				<content:encoded><![CDATA[<p>Greedy computer hackers using open-source Linux machines could steal more than their fair share of bandwidth from Wi-Fi hotspots, Swiss computer scientists have warned.<br />
Via [<a href="http://www.newscientist.com/news/news.jsp?id=ns99995085">newscientist.com</a>]</p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2004/06/09/greedy-hackers-can-hog-wi-fi-bandwidth/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Windows XP Bedevils Wi-Fi Users</title>
		<link>http://www.netstumbler.com/2004/06/04/windows-xp-bedevils-wi-fi-users/</link>
		<comments>http://www.netstumbler.com/2004/06/04/windows-xp-bedevils-wi-fi-users/#comments</comments>
		<pubDate>Fri, 04 Jun 2004 15:28:00 +0000</pubDate>
		<dc:creator>Wayne Slavin</dc:creator>
				<category><![CDATA[Administration]]></category>
		<category><![CDATA[Bugs]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Products]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com:8080/?p=2269</guid>
		<description><![CDATA[Kevin Gilmore is a network administrator at MicroDisplay, a small company in San Pablo, California, that uses several Wi-Fi access points to give employees the freedom to roam around the office with their laptops while remaining connected to the Internet. Via [wired.com]]]></description>
				<content:encoded><![CDATA[<p>Kevin Gilmore is a network administrator at MicroDisplay, a small company in San Pablo, California, that uses several Wi-Fi access points to give employees the freedom to roam around the office with their laptops while remaining connected to the Internet.<br />
Via [<a href="http://www.wired.com/news/technology/0,1282,63705,00.html">wired.com</a>]</p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2004/06/04/windows-xp-bedevils-wi-fi-users/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Security Bug In Linksys Wireless-G Router</title>
		<link>http://www.netstumbler.com/2004/06/03/security-bug-in-linksys-wireless-g-router/</link>
		<comments>http://www.netstumbler.com/2004/06/03/security-bug-in-linksys-wireless-g-router/#comments</comments>
		<pubDate>Thu, 03 Jun 2004 16:02:00 +0000</pubDate>
		<dc:creator>Wayne Slavin</dc:creator>
				<category><![CDATA[Bugs]]></category>
		<category><![CDATA[Linksys]]></category>
		<category><![CDATA[Products]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com:8080/?p=2273</guid>
		<description><![CDATA[A security bypass flaw in a popular wireless broadband router shipped by Cisco&#8217;s Linksys unit could give malicious hackers administrative access to vulnerable devices, researchers warned on Wednesday. Via [internetnews.com]]]></description>
				<content:encoded><![CDATA[<p>A security bypass flaw in a popular wireless broadband router shipped by Cisco&#8217;s Linksys unit could give malicious hackers administrative access to vulnerable devices, researchers warned on Wednesday.<br />
Via [<a href="http://www.internetnews.com/infra/article.php/3362321">internetnews.com</a>]</p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2004/06/03/security-bug-in-linksys-wireless-g-router/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>QUT Researchers Find WiFi Flaw</title>
		<link>http://www.netstumbler.com/2004/05/13/qut-researchers-find-wifi-flaw/</link>
		<comments>http://www.netstumbler.com/2004/05/13/qut-researchers-find-wifi-flaw/#comments</comments>
		<pubDate>Thu, 13 May 2004 16:11:00 +0000</pubDate>
		<dc:creator>Wayne Slavin</dc:creator>
				<category><![CDATA[Bugs]]></category>
		<category><![CDATA[Research]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Whitepaper]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com:8080/?p=2305</guid>
		<description><![CDATA[Researchers at the Queensland University of Technology have discovered an easily-exploited vulnerability which can be used to take down most 802.11 wireless networks. Via [australianit.news.com.au]]]></description>
				<content:encoded><![CDATA[<p>Researchers at the Queensland University of Technology have discovered an easily-exploited vulnerability which can be used to take down most 802.11 wireless networks.<br />
Via [<a href="http://australianit.news.com.au/articles/0,7204,9549723%5E15331%5E%5Enbv%5E15306-15319,00.html">australianit.news.com.au</a>]</p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2004/05/13/qut-researchers-find-wifi-flaw/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Cisco Warns Of Wireless Security Hole</title>
		<link>http://www.netstumbler.com/2004/04/07/cisco-warns-of-wireless-security-hole/</link>
		<comments>http://www.netstumbler.com/2004/04/07/cisco-warns-of-wireless-security-hole/#comments</comments>
		<pubDate>Wed, 07 Apr 2004 23:18:00 +0000</pubDate>
		<dc:creator>Wayne Slavin</dc:creator>
				<category><![CDATA[Bugs]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[Products]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com:8080/?p=2366</guid>
		<description><![CDATA[Cisco is warning customers about a security hole in two products used to manage wireless LANs and e-business services in corporate data centers. Via [nwfusion.com]]]></description>
				<content:encoded><![CDATA[<p>Cisco is warning customers about a security hole in two products used to manage wireless LANs and e-business services in corporate data centers.<br />
Via [<a href="http://www.nwfusion.com/news/2004/0407ciscowarns.html">nwfusion.com</a>]</p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2004/04/07/cisco-warns-of-wireless-security-hole/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How To Disable Detection Of Devices On Serial Ports</title>
		<link>http://www.netstumbler.com/2001/07/30/how-to-disable-detection-of-devices-on-serial-ports/</link>
		<comments>http://www.netstumbler.com/2001/07/30/how-to-disable-detection-of-devices-on-serial-ports/#comments</comments>
		<pubDate>Mon, 30 Jul 2001 17:26:00 +0000</pubDate>
		<dc:creator>Wayne Slavin</dc:creator>
				<category><![CDATA[Bugs]]></category>
		<category><![CDATA[Microsoft]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com:8080/?p=2883</guid>
		<description><![CDATA[When you start Windows NT, NTDETECT searches for the pointing device (usually a mouse). In the course of this process, data is sent to the serial (COM) ports. If a serial mouse is detected, Windows NT disables the port so a device driver for the mouse can load instead. If a device is not detected, [...]]]></description>
				<content:encoded><![CDATA[<p>When you start Windows NT, NTDETECT searches for the pointing device (usually a mouse). In the course of this process, data is sent to the serial (COM) ports. If a serial mouse is detected, Windows NT disables the port so a device driver for the mouse can load instead. If a device is not detected, Windows NT disables the port. A disabled COM port does not display any information in Control Panel Ports.<br />
Via [<a href="http://support.microsoft.com/default.aspx?scid=http://support.microsoft.com:80/support/kb/articles/Q131/9/76.ASP&#038;NoWebContent=1">support.microsoft.com</a>]</p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2001/07/30/how-to-disable-detection-of-devices-on-serial-ports/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
