[citw150] Re: CITW 150 L3, Q6

  • From: Todd Stott <stottt@xxxxxxxxxxxx>
  • To: citw150@xxxxxxxxxxxxx
  • Date: Tue, 8 Feb 2005 11:15:58 -0500 (EST)

Encryption keys are useful though many people may not know how to use them. 
Anyone that has a wireless network in their home should use the Wireless 
Equivalent Privacy (WEP) algorithm. WEP uses a secret key that is shared 
between a computer and a wireless access point. The key is used to encrypt data 
before it is transmitted. Without it anyone that is close enough to receive the 
signal with a wireless device can "sniff" the network.
Todd D.Stott


-- Attached file included as plaintext by Ecartis --
-- File: [citw150] CITW 150 L3, Q6

Return-Path: <citw150-bounce@xxxxxxxxxxxxx>
Received: from pmxmail.lcc.edu by suburban.lcc.edu
        with ESMTP id 8429361107641965; Sat, 05 Feb 2005 17:19:25 -0500
Received: from turing.freelists.org (freelists-180.iquest.net [206.53.239.180])
        by pmxmail.lcc.edu (8.12.10/8.12.10) with ESMTP id j15MU093031534;
        Sat, 5 Feb 2005 17:30:00 -0500
        (envelope-from citw150-bounce@xxxxxxxxxxxxx)
Received: from localhost (localhost [127.0.0.1])
        by turing.freelists.org (Avenir Technologies Mail Multiplex) with ESMTP 
id E3C7E6CCFD;
        Sat,  5 Feb 2005 17:29:59 -0500 (EST)
Received: from turing.freelists.org ([127.0.0.1])
        by localhost (turing [127.0.0.1]) (amavisd-new, port 10024)
        with ESMTP id 14071-10; Sat, 5 Feb 2005 17:29:59 -0500 (EST)
Received: from turing (localhost [127.0.0.1])
        by turing.freelists.org (Avenir Technologies Mail Multiplex) with ESMTP 
id 6B4AD6C942;
        Sat,  5 Feb 2005 17:29:59 -0500 (EST)
Received: with ECARTIS (v1.0.0; list citw150); Sat, 05 Feb 2005 17:29:56 -0500 
(EST)
X-Original-To: citw150@xxxxxxxxxxxxx
Delivered-To: citw150@xxxxxxxxxxxxx
Received: from localhost (localhost [127.0.0.1])
        by turing.freelists.org (Avenir Technologies Mail Multiplex) with ESMTP 
id 2E47A6CC91
        for <citw150@xxxxxxxxxxxxx>; Sat,  5 Feb 2005 17:29:56 -0500 (EST)
Received: from turing.freelists.org ([127.0.0.1])
        by localhost (turing [127.0.0.1]) (amavisd-new, port 10024)
        with ESMTP id 14077-03 for <citw150@xxxxxxxxxxxxx>;
        Sat, 5 Feb 2005 17:29:56 -0500 (EST)
Received: from mxsf33.cluster1.charter.net (mxsf33.cluster1.charter.net 
[209.225.28.158])
        by turing.freelists.org (Avenir Technologies Mail Multiplex) with ESMTP 
id F204F6C942
        for <citw150@xxxxxxxxxxxxx>; Sat,  5 Feb 2005 17:29:55 -0500 (EST)
Received: from mxip08.cluster1.charter.net (mxip08a.cluster1.charter.net 
[209.225.28.138])
        by mxsf33.cluster1.charter.net (8.12.11/8.12.11) with ESMTP id 
j15MTtmq030231
        for <citw150@xxxxxxxxxxxxx>; Sat, 5 Feb 2005 17:29:55 -0500
Received: from fep04.charter.net (HELO 209.225.8.224) (209.225.8.84)
  by mxip08.cluster1.charter.net with SMTP; 05 Feb 2005 17:29:55 -0500
Message-Id: <3k77vr$hqlcvf@xxxxxxxxxxxxxxxxxxxxxxxxxxxx>
X-Ironport-AV: i="3.88,180,1102309200"; 
   d="scan'208"; a="598389743:sNHT12009728"
X-Mailer: Openwave WebEngine, version 2.8.12 (webedge20-101-197-20030912)
From: <wieberb@xxxxxxxxxxx>
To: <citw150@xxxxxxxxxxxxx>
Subject: [citw150] CITW 150 L3, Q6
Date: Sat, 5 Feb 2005 16:29:55 -0600
MIME-Version: 1.0
Content-type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 8bit
X-Virus-Scanned: by amavisd-new-20030616-p9 (Debian) at avenirtech.net
X-archive-position: 450
X-ecartis-version: Ecartis v1.0.0
Sender: citw150-bounce@xxxxxxxxxxxxx
Errors-To: citw150-bounce@xxxxxxxxxxxxx
X-original-sender: wieberb@xxxxxxxxxxx
Precedence: normal
Reply-To: citw150@xxxxxxxxxxxxx
X-list: citw150
X-Virus-Scanned: by amavisd-new-20030616-p9 (Debian) at avenirtech.net
X-PMX-Version: 4.6.1.107272, Antispam-Core: 4.6.1.106808, Antispam-Data: 
2005.2.5.5

Encryption
Through the use of encryption people can feel extremely protected of their 
privacy.  Encryption systems scramble your e-mail by altering the characters in 
your message.  The only people who can read it are the one's that know the 
encryption key to decode the message.  Although it is not totally fool proof it 
does prevent it from being sniffed.  This is why the government doesn't like 
encryption because they can't monitor the e-mails for security against 
terrorism unless they have a court order to decode it.

For more information visit: http://www.cdt.org/crypto/ 

Brian Wieber





Other related posts: