SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : The *NEW* Frank Coluccio Technology Forum -- Ignore unavailable to you. Want to Upgrade?


To: Frank A. Coluccio who wrote (3671)8/14/2001 2:11:22 AM
From: Hands Off  Read Replies (1) | Respond to of 46821
 
WEP security flaw update.

Several papers were published last week detailing how to attack 802.11b security. I email'd ISIL tech support for a response and this is their reply:

Suggested Solution
---------------------------------------------------------------
At 08/13/2001 09:03 AM we wrote - We are preparing a firmware patch which will filter out the weak keys (initialization vectors) identifed in this paper. That is the short term solution. We are still investigating longer term solutions. The issue with longer term solutions is that they all appear to have interoperability implications and as such we are trying not to do things completely on our own and are working with other vendors. The firmware patch will address the weakness identified and a new firmware build should be available in 30-60 days.
**********************************************
Also, extracting from the article:
Representatives from the Wireless Ethernet Compatibility Alliance (WECA), a promotional body for WLAN advocates, align with Bellovin's point of view. "We perceive this as serious and different from the previous attacks, and we're not going to say 'Don't worry about it,' " said Phil Belanger, past chairman and current marketing director of WECA. "However, we've always said that if privacy is a concern, you need to be using end-to-end security mechanisms, like virtual private networks [VPNs, based on IPsec], along with the WLAN. Even if WEP wasn't compromised, you ought to be doing that."

"The good thing is that Wi-Fi integrates very well with these and other technologies; VPN, Radius [a network authentication scheme] or whatever the enterprise wants to use," said WECA chairman David Cohen.



To: Frank A. Coluccio who wrote (3671)8/14/2001 10:55:19 AM
From: TheStockFairy  Read Replies (1) | Respond to of 46821
 
All of the major and minor carriers either have a bandwidth trading desk or an individual that handles the "BTO" As for caving into the Comptel Agreement (with Liquidated Damages, force majeuer, limitations of damages, ect) there are very few that have signed it (you can count them on one hand, even if you have worked in a flour mill).

Since there has been a revenue crunch over the last year, the trading business model is more attractive to carriers, as they can see an alternate method of securing revenue.

Also, some of the energy companies have issued predatory pricing, which, IMO, drove the long haul market rates further into the ground, thus forcing the carriers to take a closer look.

Reliant announced yesterday that they have provisioned their first long haul circuit through a LighTrade switch, but that might have been just an experiment rather than a real customer.