LinkBack Thread Tools Search this Thread Display Modes
Prev Previous Post   Next Post Next
  #13   Report Post  
Old August 19th 04, 03:06 AM
Jack Twilley
 
Posts: n/a
Default

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

"N2EY" == n2ey writes:


[...]

N2EY One caveat!

N2EY A lot of folks are setting up their own little wireless
N2EY networks. The stuff is becoming cheaper than the cable it
N2EY replaces!

And for good reason. In my new location, I'm terrified to drill
through the walls (it's an old *solid* house that predates cheap
sheetrock by decades) but I've no trouble using wireless.

N2EY But not enough folks understand the need to encrypt. Without
N2EY good encryption of your network, anybody can drive by with a
N2EY lapper and access your network - and your hard drives, etc. Your
N2EY internet firewall won't help because your network thinks the
N2EY invader is *inside* your network, not outside. You need for the
N2EY network itself to be encrypted.

If someone truly sets up their network in this manner, they are truly
running a serious risk, as you describe. I've just moved, so I have
to reinstall my network, and it will actually be set up with two
wireless access points: one for the "inside", which will be
MAC-restricted and locked down with WEP (until my operating system
fully supports TKIP in which case I'll go up to that protocol), and
one which is "outside" for any and all comers to sit in the nearby
park and reach the internet. No traffic goes to the inside from the
outside, and both sides can see the internet, so life is good.

N2EY Where's my RJ-45 plugs?

Put some time and effort into understanding exactly how to make it all
work properly, and you'll find that you need fewer RJ-45 plugs.

N2EY 73 de Jim, N2EY

Oh, and I get that you're not talking about setting up your own
network in the encryption-free manner in which you describe. I'm just
trying to show that there are many good ways to make wireless work
such that you can be friendly to your neighbors while protecting your
assets.

Jack.
(one of those paranoid computer security types)
- --
Jack Twilley
jmt at twilley dot org
http colon slash slash www dot twilley dot org slash tilde jmt slash
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (FreeBSD)

iD8DBQFBJAtEGPFSfAB/ezgRAtWqAJ9crOHo6IKrEZ089EPMgfeXTJpb+QCfUztP
Rtp9XKoV8+kiWCs4iL8r7O4=
=Fcq3
-----END PGP SIGNATURE-----
 
Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes

Posting Rules

Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


Similar Threads
Thread Thread Starter Forum Replies Last Post
BPL Powers On Phil General 0 August 26th 04 10:17 PM
What does "power up" mean? Doug Shields Boatanchors 22 September 29th 03 04:41 AM
Complex line Z0: A numerical example Roy Lewallen Antenna 11 September 13th 03 01:04 AM
Derivation of the Reflection Coefficient? Dr. Slick Antenna 104 September 6th 03 02:27 AM


All times are GMT +1. The time now is 07:26 PM.

Powered by vBulletin® Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
Copyright ©2004-2025 RadioBanter.
The comments are property of their posters.
 

About Us

"It's about Radio"

 

Copyright © 2017