Considering that WEP is essentially flawed anyway, and that a user logged into the system can generally access the network (and mount a cleartext attack too), this doesn't seem like cause for concern. Martin?
Considering that WEP is essentially flawed anyway, and that a user logged into
the system can generally access the network (and mount a cleartext attack too),
this doesn't seem like cause for concern. Martin?