So my school did this thing to the wifi where you can only use it on a laptop if you have virus protection. Is it possible to fake out the WiFi and make my laptop appear as a cell phone so I don't have to deal with it?
Not a clue, but at my school it's always something simple as hell. Youtube's block is bypassed just by typing in https:// beforehand and I discovered just the other day that there's a hidden spyware control panel in Chrome that I can use to disable the whatever the program is on school computers.
its probably something like cleanaccess or similar. long story short: yes there are some methods that might work, but you personally? no. if you dont even know what is being used, you yourself do not have the technical prowess to fake it.
might as well just buy a mac, because you wont be able to handle linux (especially in college), and osx and linux do not require AV
Change your browser's UA string to something typically seen on a cell phone. If that fails, you might try spoofing your MAC address so that your laptop looks like a phone. You may also be able to rig your phone so that it acts like a proxy, preventing the school network from even seeing your laptop.
yeah i dont want to act like a dick, but it really isnt worth the trouble, especially if you have to run the client on the machine. onguard is a decent program, used in enterprise a lot and that is why i say it just isnt worth the hassle.
if the free microsoft mse counts as a valid a/v, that would be your best bet.
you are going to get all kinds of weird ways to try and bypass it, and its just going to be a bitch and take hours to test and get nowhere. ive been there and done that a long time ago
I still don't understand how this determines whether you have an AV installed on your laptop or not.
If you have a firewalled laptop and aren't running school supplied software the only way I believe it could tell if you were a laptop vs a phone would be MAC or UA or browser headers (all the extra shit about plugins) or screen size.
appart from if the AV adds extra records in browser headers, which IMHO is a horrible idea, there shouldn't be any way for it to figure out if you are running AV fromthe browser
running java or flash on the portal is a equally horrible idea.
there are different ways to enforce this type of nac. in most cases, you will download and install a client that will check the os itself, the mac address is useless and its not going to sit there waiting for the a/v to phone home or some weird shit.
if you dont need a client continuously running, it runs some sort of browser applet like activex or java to check the os.
most of the time it is using a client on the machine, doesnt really use much resources or anything.
and for mobile access they could simply require you to install an app, i have seen that before.
It doesn't do a check in the browser. If I remember correctly OnGuard initially takes you to a captive portal where you can't do anything except download an executable. That executable is what scans for AV software or whatever else the administrator wants installed on your computer. You can either install the software they mandate or you can't connect.
>running java or flash on the portal is a equally horrible idea
They already have their students vendor locked; one more horrendously stupid idea wouldn't exactly be unprecedented.
huh so a parent has to give their 12 yo admin access so they can install random executables (presumably served over http) just to connect to the wifi.
it probably sends a soap message to some machine with your MAC a collection of other information it shouldn't have access to and the AV your running.
well, as they say, don't let the door hit ya in the ass on your way out