Home |
Search |
Today's Posts |
#21
![]() |
|||
|
|||
![]()
In article , Jack Twilley
writes: "N2EY" == n2ey writes: [... wireless is cheap and portable but needs to be secured ...] Jack If someone truly sets up their network in this manner, they are Jack truly running a serious risk, as you describe. I've just moved, Jack so I have to reinstall my network, and it will actually be set Jack up with two wireless access points: one for the "inside", which Jack will be MAC-restricted and locked down with WEP (until my Jack operating system fully supports TKIP in which case I'll go up to Jack that protocol), and one which is "outside" for any and all Jack comers to sit in the nearby park and reach the internet. No Jack traffic goes to the inside from the outside, and both sides can Jack see the internet, so life is good. N2EY Are WEP and TKIP sufficiently secure? For my purposes, they are. WEP is known to be breakable, and TKIP hasn't yet been properly tested, but those are the link-level encrypted layers. 95% of what I do is done through a VNC session tunneled through SSH -- the combination of WEP/TKIP and SSH is such that I'm comfortable typing my GPG passphrase over the link. Thanks for the advice, Jack. Will keep it in mind if I ever go to wireless networking. 73 de Jim, N2EY |
Thread Tools | Search this Thread |
Display Modes | |
|
|
![]() |
||||
Thread | Forum | |||
BPL Powers On | General | |||
What does "power up" mean? | Boatanchors | |||
Complex line Z0: A numerical example | Antenna | |||
Derivation of the Reflection Coefficient? | Antenna |