Please excuse the search for a low-tech vulnerability to a high-tech implementation. How susceptible are various wireless networking implementations to jamming (as a means to a DoS)? Thank you. -- James W. Meritt CISSP, CISA Booz | Allen | Hamilton phone: (410) 684-6566
This archive was generated by hypermail 2b30 : Fri Mar 22 2002 - 09:08:40 PST