Jimmy 2004
New Member
- Joined
- Jan 15, 2005
- Messages
- 5,458 (0.78/day)
- Location
- England
System Name | Jimmy 2004's PC |
---|---|
Processor | S754 AMD Athlon64 3200+ @ 2640MHz |
Motherboard | ASUS K8N |
Cooling | AC Freezer 64 Pro + Zalman VF1000 + 5x120mm Antec TriCool Case Fans |
Memory | 1GB Kingston PC3200 (2x512MB) |
Video Card(s) | Saphire 256MB X800 GTO @ 450MHz/560MHz (Core/Memory) |
Storage | 500GB Western Digital SATA II + 80GB Maxtor DiamondMax SATA |
Display(s) | Digimate 17" TFT (1280x1024) |
Case | Antec P182 |
Audio Device(s) | Audigy 4 + Creative Inspire T7900 7.1 Speakers |
Power Supply | Corsair HX520W |
Software | Windows XP Home |
WEP (Wired Equivalent Privacy), the technology used to secure many wireless networks around the world, has been demonstrated to be extremely insecure in new research by a team of cryptographic researchers at the University of Darmstadt in Germany. Using information collected by previous studies that demonstrated correlations in the encryption used by WEP, the team found that they could recover a 104-bit WEP key 50% of the time using just 40,000 captured packets, increasing to a 95% success rate with 85,000 packets. To put it into perspective, 40,000 packets can be captured in under a minute, and a 1.7GHz Pentium M can them work out the WEP key in about three seconds. WEP has been known to have security flaws since 2001, but this latest research demonstrates how weak the technology has become in recent years - if your hardware supports WPA or WPA2 it is highly recommended that you shift to that if you are worried about keeping hackers out of your wireless network.
Source:University of Darmstadt via The Inquirer
View at TechPowerUp Main Site
Source:University of Darmstadt via The Inquirer
View at TechPowerUp Main Site