For testing I used an Itronix GoBook II laptop running Windows XP with integrated Wi-Fi and GPRS capabilities as my primary wireless workstation, Dell Latitude C640 and C840’s with integrated WNICs running Windows XP, Red Hat Linux 9, and VMware Workstation 4, along with a Sony Vaio SR-7K running Windows 2000 with US Robotics WNICs. For management and authentication I used a Compaq Presario and NEC Corp’s Direction Desktops. Funk Software’s Steel-Belted RADIUS Enterprise Edition, Version 4.4 was used for user authentication. For the AP infrastructure I used 3Com’s AP 8000, Cisco’s Aironet 1200 Series, Proxim’s Orinoco AP-2000, and AP-600 and USR’s 2249. For passive wireless security testing a handheld 802.11b AirMagnet and Fluke WaveRunner were used and for active penetration testing on the wireless gateways and servers I used Core Impact v3.2. I used several applications to test session-based application persistence and subnet roaming on the client, including using thick- and thin-client access using media players and conducting FTP transfers, telnet sessions, e-mail connectivity, and remote control.I also conducted straightforward traffic analysis and passive eavesdropping attacks during our testing for security, those products supporting Web-based authentication I attempted an MITM (man-in-the-middle attack), a trivial matter of spoofing the Web-based login page to gain login credentials. This MITM attack could have been a predecessor to several other escalating attacks. Technology Industry