Freaky. Was talking to the dev team about getting some new .G wireless gear for the house, and one of the network guys dropped by to make sure it wasn’t running here.

I damn well know better, TYVM. I’ve (a) heard the stories, and (b) have more sense than that. Geeze, how stupid do people think Sales *IS*.

Don’t answer that.

About Kevin Sonney

Kevin Sonney - who, contrary to popular opinion was NOT raised by wolves - grew up in central North Carolina. He fell into the technology field by accident in 1991, when he gave up the wild and crazy lifestyle of an on-air AM radio DJ to become a mundane technical support monkey. The technology industry has never really recovered from this. Kevin has worked for such names as IBM, Red Hat, webslingerZ, and Lulu Technologies (we won't mention the ones that didn't survive the experience). He currently works as a Linux Administrator for Apptio. In his spare time he rescues stray animals and plays video games with his two sons. His wife, we're sad to say, helps him get past the really hard bits. Kevin is still not very mundane, he just got better at hiding it.
This entry was posted in Uncategorized. Bookmark the permalink.

5 Responses to INCOMING

  1. detritus says:

    /me holds tongue.

    I consider you above sales. You actually know what you’re doing. Somehow sales coerced you into working with them, and now the Stockholm syndrome has set in.

  2. jay says:

    Technically they should regularly scan the network with WLAN intrusion detection tools to find rogue networks.

    If they asked if “it” was running -here- maybe they do. Still, there is always the matter of finding the person involved.

    This can be as simple as placing a linux box with a wifi cards that just looks for “new” things and notified IT about it.

    The fear is this… new Mac’s come with 802.11g built in so there could be a visitor that shows up with a ah-hoc enabled unit. If someone was to give a visitor in a window office an ethernet drop and watch the fun begin… Even if you have a WLAN IDT running… most off the shelf products for IDT do 802.11b but not 802.11a and 802.11g.

    So, make sure the IDT has the latest whiz bang 802.11* cards…

  3. badger says:

    When I did the networking chapter (last week) of my current OS X book I kept throwing in notes in the Sharing Internet Connection section that loosely read “In a work environment, a company may have policies about wireless broadcast of company network traffic, please check with your sysadmins before turning this on.”

  4. jay says:

    Some VPN products (a la Contivity) try to tout that they do not support split tunnels (a la Cisco VPN) and are a more secure solution. CSO and other FUD types exist because of such fears. It’s like any tool. There are reasons to do it and reasons not to do it. More importantly, just because you can, it doesn’t mean you should. If you apply corporate policy then it is a matter of being compliant rather than technically possible.

  5. badger says:

    More importantly, just because you can, it doesn’t mean you should. Exactly why I suggest to people they check with others before turning it on.

Comments are closed.