Khó khăn với việc sử dụng SOCKS là ai đó đã thay thế các cuộc gọi hệ thống mạng với các phiên bản SOCKS (quá trình này thường được gọi là ification-SOCKS SOCKS ifying một ứng dụng). May mắn thay, hầu hết các ứng dụng mạng phổ biến (chẳng hạn như Telnet, FTP, ngón tay, và whois) đã được SOCKS-ified, | MAC-based authentication should be used only as a supplementary authentication method. If MAC-based authentication is used the network becomes vulnerable to such rogue wireless LAN adapters which may impersonate an authorized wireless LAN adapter to gain access to the network. Network Authentication If a communication link is successfully established between two wireless LAN devices for example an AP and an adapter the next step by a user is to establish a network session by authenticating himself or herself to the network AP or an authentication server that an AP uses . Unfortunately most currently available wireless LAN technologies do not include a robust mechanism for network authentication. Most network technologies for example devices only allow a service set identifier SSID -based authentication in which each AP is assigned a unique identifier consisting of letters and numbers and broadcasts this identifier to show its presence. All wireless LAN devices use this identifier to communicate with the AP. The SSID-based authentication is extremely weak and only provides AP identification. The SSIDs are easily programmable on most APs. An attack on APs known as rogue AP attack is the most popular attack that involves an adversary planting an AP in a wireless LAN with the SSID set to the one that is used by the network users. If the network relies only on the SSID of an AP for its authentication the rogue AP successfully gains access to all the incoming traffic from wireless LAN adapters that is addressed to the intended AP. More information on authentication mechanisms used in is provided in WEP Authentication later in this chapter. Wireless LAN Data Security As mentioned in Chapter 5 Network Security data in transit in an insecure medium must always be protected using encryption primitives. Encryption-based data security is even more important in wireless LAN because without encryption the data is available for examination to all .