Jump to content

chill

Members
  • Content Count

    7
  • Joined

  • Last visited

Community Reputation

0 Neutral

Converted

  1. chill

    CCTV records office worker during rampage

    This was found to be a hoax...
  2. chill

    Networking help needed.

    Just knowing what the programs are doesn't give you the knowledge and experience to know how to use them. The programs I mentioned are mainly for linux anyway. Just about any linux nerd (like me) would know about them.
  3. chill

    Mac workarounds...

    There is an old version of IE that was written for the Mac. Darn the no-linking thing here. If you google: internet explorer mac, it will be the third choice from the top of the list. mac dot oldapps dot com slash internet_explorer dot php I would start with the most recent version first, 5.2.3, and see if that works. If not, well it was worth a shot.
  4. Free NICEVision? NICE makes some very expensive gear, and I've never heard of anything of theirs that is free. I'm interested in hearing about where you saw this.
  5. chill

    Networking help needed.

    Sure, for every level of protection there is another level of attack. But those higher levels of security require higher levels of aptitude and experience to break. The higher up the chain you go, the less people are going to be able to know how to do it. For instance, I could use a program called Kismet to sniff an SSID which is not broadcasted. I could then find the IP and MAC address of clients on that network. I could then use the aircrack-ng package to disassociate that client, spoof their MAC, and have my way with the network. Aircrack could also help me crack a WEP key in very little time. I agree, this might be over the top for some people. But there are people out there with nothing better to do than break in to something or at least try just to see if they can do it. As far as how I would design the network (Keep in mind that the router is not an access point, these words are interchanged incorrectly most of the time when talking about wireless APs): Cable Modem->Wan port of router->Lan port of router to Port 24 of VLAN Switch. Two VLANs, 1 and 2. These could be port-based VLANs. Say you've got a 24 port VLAN switch (just an example). I would set up the ports like this: port 1 and port 24 would be VLAN 1, port 2 and port 24 would be VLAN 2. The router would connect to port 24 of the switch (uplink). This layout would allow both ports to connect to the internet, but 1 and 2 would not be able to talk to each other. Port 1 would go to your POS system. Port 2 would go to the office AP, set up with a WPA2-PSK encryption key (still crackable but not as easy as WEP, I would feel safe with it in this setting). Keep in mind that if the AP is not set up for client isolation, any wireless client will be able to connect to anyone else on the wireless network. This may be what you want for a small office setting where you have a Windows network setup with multiple shares. If the office clients do not have a common Workgroup (or domain) it would be advisable to set up client isolation. I think that covers how your network is to be laid out. I may have missed something along the way. You can get a smaller switch with VLAN capability than the example 24 port model. I usually use the last port as the uplink just to keep things simple, but you can set it up however you feel comfortable. Netgear and Trendnet make some cheapish VLAN switches. As far as APs go, the company I used to work for tended to use the Versatek VX-AP250. This is a professional grade AP with many security options. Hope this helps. Chris
  6. chill

    Hello from Vegas...

    Hello all, I am fairly new to the CCTV world, but I work for a surveillance company in Las Vegas where there is plenty of business. Our bread and butter is smaller businesses but we also have worked on some prominent hotels on the strip. I myself have worked with everything from high end NICE NVR systems to just building a little linux 4-channel DVR at home in my spare time. Again, I don't have years of experience with this stuff, but I am diving in head first. My previous position before this was a Network Engineer, 100% travel, designing and installing wireless networks in hotels across North America - Vancouver to Cabo to Key West to Maine and everywhere in between. After 3 years of 100% travel I was ready to take a break and 'settle down' in Las Vegas after growing up in Milwaukee, WI. I look forward to learning a lot from the fine members of this forum. Chris
  7. chill

    Networking help needed.

    Hello, first time poster. Maybe I missed something along the way...but even though you are using two separate SSIDs on the wireless network, if that AP is connecting to the same subnet as the POS system, a person with malicious intent could sniff that traffic and dig in with little to no problem. This is definitely where you would want a layer 3 switch with VLAN capability.
×