<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>NetStumbler</title>
	<atom:link href="http://www.netstumbler.com/category/whitepaper/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.netstumbler.com</link>
	<description>The award-winning wireless networking tool and the best source for your daily Wi-Fi, WiMAX, 3G and VoIP news.</description>
	<lastBuildDate>Fri, 19 Sep 2014 17:52:12 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
		<item>
		<title>War, Peace, Or Stalemate: Wargames, Wardialing, Wardriving, And The Emerging Market For Hacker Ethics</title>
		<link>http://www.netstumbler.com/2004/09/09/war-peace-or-stalemate-wargames-wardialing-wardriving-and-the-emerging-market-for-hacker-ethics/</link>
		<comments>http://www.netstumbler.com/2004/09/09/war-peace-or-stalemate-wargames-wardialing-wardriving-and-the-emerging-market-for-hacker-ethics/#comments</comments>
		<pubDate>Thu, 09 Sep 2004 13:11:00 +0000</pubDate>
		<dc:creator>Wayne Slavin</dc:creator>
				<category><![CDATA[Commentary]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Wardriving]]></category>
		<category><![CDATA[Whitepaper]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com:8080/?p=2005</guid>
		<description><![CDATA[There are inconspicuous ethical shades to wardriving that are poorly understood, and to date, no academic literature has analyzed the legality of the activity. This article will argue that the act of wardriving itself is quite innocuous, legal, and can even be quite beneficial to society. It will also highlight the need for wardrivers &#8211; [...]]]></description>
				<content:encoded><![CDATA[<p>There are inconspicuous ethical shades to wardriving that are poorly understood, and to date, no academic literature has analyzed the legality of the activity. This article will argue that the act of wardriving itself is quite innocuous, legal, and can even be quite beneficial to society. It will also highlight the need for wardrivers &#8211; and for anyone accessing open networks &#8211; to help establish and adhere to strict ethical guidelines. Such guidelines are available in various proposal-stage forms, and this article will review these ethics within the context of a larger movement among hackers to develop a coherent ethical code.<br />
Via [<a href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=585867">papers.ssrn.com</a>]</p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2004/09/09/war-peace-or-stalemate-wargames-wardialing-wardriving-and-the-emerging-market-for-hacker-ethics/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Wireless Attacks Primer</title>
		<link>http://www.netstumbler.com/2004/08/17/wireless-attacks-primer-2/</link>
		<comments>http://www.netstumbler.com/2004/08/17/wireless-attacks-primer-2/#comments</comments>
		<pubDate>Tue, 17 Aug 2004 07:25:00 +0000</pubDate>
		<dc:creator>Wayne Slavin</dc:creator>
				<category><![CDATA[Commentary]]></category>
		<category><![CDATA[Guide]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Whitepaper]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com:8080/?p=2061</guid>
		<description><![CDATA[In general, attacks on wireless networks fall into four basic categories: passive attacks, active attacks, man-in-the middle attacks, and jamming attacks. Lets review what these attacks mean on a wireless network. Via [netsecurity.about.com]]]></description>
				<content:encoded><![CDATA[<p>In general, attacks on wireless networks fall into four basic categories: passive attacks, active attacks, man-in-the middle attacks, and jamming attacks. Lets review what these attacks mean on a wireless network.<br />
Via [<a href="http://netsecurity.about.com/od/secureyourwifinetwork/a/aa081604.htm">netsecurity.about.com</a>]</p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2004/08/17/wireless-attacks-primer-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>QUT Researchers Find WiFi Flaw</title>
		<link>http://www.netstumbler.com/2004/05/13/qut-researchers-find-wifi-flaw/</link>
		<comments>http://www.netstumbler.com/2004/05/13/qut-researchers-find-wifi-flaw/#comments</comments>
		<pubDate>Thu, 13 May 2004 16:11:00 +0000</pubDate>
		<dc:creator>Wayne Slavin</dc:creator>
				<category><![CDATA[Bugs]]></category>
		<category><![CDATA[Research]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Whitepaper]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com:8080/?p=2305</guid>
		<description><![CDATA[Researchers at the Queensland University of Technology have discovered an easily-exploited vulnerability which can be used to take down most 802.11 wireless networks. Via [australianit.news.com.au]]]></description>
				<content:encoded><![CDATA[<p>Researchers at the Queensland University of Technology have discovered an easily-exploited vulnerability which can be used to take down most 802.11 wireless networks.<br />
Via [<a href="http://australianit.news.com.au/articles/0,7204,9549723%5E15331%5E%5Enbv%5E15306-15319,00.html">australianit.news.com.au</a>]</p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2004/05/13/qut-researchers-find-wifi-flaw/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Best Practices For Wireless Fidelity (802.11b) Network Vulnerabilities</title>
		<link>http://www.netstumbler.com/2002/01/23/best-practices-for-wireless-fidelity-80211b-network-vulnerabilities/</link>
		<comments>http://www.netstumbler.com/2002/01/23/best-practices-for-wireless-fidelity-80211b-network-vulnerabilities/#comments</comments>
		<pubDate>Wed, 23 Jan 2002 21:49:00 +0000</pubDate>
		<dc:creator>Wayne Slavin</dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Whitepaper]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com:8080/?p=2839</guid>
		<description><![CDATA[The deployment of wireless networking systems is proceeding rapidly. Advancements in the technology and reduction in the cost of ownership have converged such that wireless systems are becoming a measurable part of the national information infrastructure. The growth in sales booked and sales projected indicate that it qualifies as a technology mega-trend. Along with their [...]]]></description>
				<content:encoded><![CDATA[<p>The deployment of wireless networking systems is proceeding rapidly. Advancements in the technology and reduction in the cost of ownership have converged such that wireless systems are becoming a measurable part of the national information infrastructure. The growth in sales booked and sales projected indicate that it qualifies as a technology mega-trend. Along with their convenience and popularity, however, wireless systems provide new and attractive opportunities for those seeking to exploit them. &#8220;Raising the security bar&#8221; by reducing wireless network vulnerabilities, therefore, becomes an important consideration for any organization that adopts wireless systems.<br />
Via [<a href="http://www.nipc.gov/publications/nipcpub/bestpract.html">nipc.gov</a>]</p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2002/01/23/best-practices-for-wireless-fidelity-80211b-network-vulnerabilities/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Wireless Firewall Gateway White Paper</title>
		<link>http://www.netstumbler.com/2001/09/01/wireless-firewall-gateway-white-paper/</link>
		<comments>http://www.netstumbler.com/2001/09/01/wireless-firewall-gateway-white-paper/#comments</comments>
		<pubDate>Sat, 01 Sep 2001 20:38:00 +0000</pubDate>
		<dc:creator>Wayne Slavin</dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Whitepaper]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com:8080/?p=2877</guid>
		<description><![CDATA[With the deployment of wireless network access in the workplace, the requirement for a more enhanced security design emerges. Wireless technology offers a more accessible means of connectivity but does not address the security concerns involved with offering this less restrained service. In order to facilitate management of this network, maintain a secure network model, [...]]]></description>
				<content:encoded><![CDATA[<p>With the deployment of wireless network access in the workplace, the requirement for a more enhanced security design emerges. Wireless technology offers a more accessible means of connectivity but does not address the security concerns involved with offering this less restrained service. In order to facilitate management of this network, maintain a secure network model, and keep a high level of usability, a multi-functional device to do these tasks must be placed in the wireless environment.<br />
Via [<a href="http://www.nas.nasa.gov/Groups/Networks/Projects/Wireless/index.html">nas.nasa.gov</a>]</p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2001/09/01/wireless-firewall-gateway-white-paper/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Cipher Attack Delivers Heavy Blow To WLAN Security</title>
		<link>http://www.netstumbler.com/2001/08/05/cipher-attack-delivers-heavy-blow-to-wlan-security/</link>
		<comments>http://www.netstumbler.com/2001/08/05/cipher-attack-delivers-heavy-blow-to-wlan-security/#comments</comments>
		<pubDate>Mon, 06 Aug 2001 04:56:00 +0000</pubDate>
		<dc:creator>Wayne Slavin</dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Whitepaper]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com:8080/?p=2881</guid>
		<description><![CDATA[A new report dashes any remaining illusions that 802.11-based (Wi-Fi) wireless local-area networks are in any way secure. The paper, written by three of the world&#8217;s foremost cryptographers, describes a devastating attack on the RC4 cipher, on which the WLAN wired-equivalent privacy (WEP) encryption scheme is based. Via [eetimes.com]]]></description>
				<content:encoded><![CDATA[<p>A new report dashes any remaining illusions that 802.11-based (Wi-Fi) wireless local-area networks are in any way secure. The paper, written by three of the world&#8217;s foremost cryptographers, describes a devastating attack on the RC4 cipher, on which the WLAN wired-equivalent privacy (WEP) encryption scheme is based.<br />
Via [<a href="http://www.eetimes.com/story/OEG20010803S0082">eetimes.com</a>]</p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2001/08/05/cipher-attack-delivers-heavy-blow-to-wlan-security/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
