Hangout for experimental confirmation and demonstration of software, computing, and networking. The exercises don't always work out. The professor is a bumbler and the laboratory assistant is a skanky dufus.
ACM News Service: Researchers Study Wi-Fi Weaknesses. 2004-10-29: There are stealth attacks that can be made against ad hoc wireless networks and they seem to also apply for wired ad hoc networks too. The attacks show up as a form of denial-of-service or traffic interception (and spoofing) attacks. It is suggested that this could be mitigated by trusted relationships among nodes based on reputation schemes. I wonder if there is a pattern that can be applied to spam as well?
Mike Martin's 2004-10-25 Enterprise Security Today article provides further anecdotal description. I am on a hunt for more information.