weaknesses are described in "Weaknesses in the Key Scheduling Algorithm of RC4" by
Scott Fluhrer, Itsik Mantin and Adi Shamir. The first person to implement this attack was
Adam Stubblefield.
Salah satu langkah pengamanan yang biasa banyak dilakukan para admin adalah mematikan fungsi dari SSID (non broadcast) tujuannya apalagi agar ssid tidak terbaca oleh para wardriver.
Nah yang jadi pertanyaan cukup efisienkah langkah tersebut? Jawabannya pasti TIDAK.
mematikan SSID biasanya hanya berdampak bagi pemula yang memakai wireless zero windows saja. karena WZC windows tidak mampu menngkap ssid yang terhide, namun sekarang aplikasi wifi monitoring seperti netstumbler sudah mampu menangkap, menganalisa serta mencapture SSID yang terhide sekalipun.
Meskipun demikian Memang ada benarnya juga agar langkah ini tetap dilakukan para admin jaringan disamping merubah default password serta rename kembali SSID dengan nama yang lain selain default pabrik.
Fortunately, it is now possible to recover 99% of the data stored in a laptop all within the space of 24-48 hours. The Laptop being a much smaller machine compared to a regular PC, its Drives are very small in comparison to Desktop Drives and the internal mechanics too are miniature versions of their desktop counterparts. All the more reason then, that as soon as your laptop makes whining protesting sounds and throws up messages that spell trouble, it’s the right time to call in the experts, and Laptop Data Recovery experts specialists at that. A host of agencies now offers a complete solution for disk diagnostic, data recovery, and file repair needs.