Hi all, first post (read up on the rules - not sure what to make of hacker community with no hack talk, but hey, rules are rules).
I wanna start a topic about using tools to identify weak networks for the purpose of consultancy, and where lines are drawn between legal and illegal activity.
The reason is that I want to become a WiFi security consultant, I wrote a dissertation on WLAN security management and can't find work in the field. Its all I wanna do, so now I have the idea of using some software and tools to locate insecure business networks and approach the network managers with my consultancy.
I realise there are grey areas in the law, and indeed different legislation from different states/countries. So, how do I find out what I can/can't do?
UK
I wanna start a topic about using tools to identify weak networks for the purpose of consultancy, and where lines are drawn between legal and illegal activity.
The reason is that I want to become a WiFi security consultant, I wrote a dissertation on WLAN security management and can't find work in the field. Its all I wanna do, so now I have the idea of using some software and tools to locate insecure business networks and approach the network managers with my consultancy.
I realise there are grey areas in the law, and indeed different legislation from different states/countries. So, how do I find out what I can/can't do?
UK
Comment