Physical Security

Up until now, we've been talking about keeping electronic intruders out of your wireless network. It's easy enough to gain access to a network using off-the-shelf equipment that hasn't already been configured for that network; it's even easier when the intruder has stolen a laptop from an authorized user. Losing a laptop computer to a thief is bad enough. Letting the thief use a stolen computer to log in to a network is even worse. As a network operator, you should remind your users that their portables are attractive targets for thieves, and offer some guidelines for protecting them. As a user yourself, you should follow the same precautions.

The first rule is simple: Don't forget that you're carrying a computer. It seems obvious, ...

Get The Book of Wireless, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.