1) MAC filtering is entirely useless. It will only annoy you when you can't figure out why things don't work properly. Likewise for SSID broadcast, leave it on and lead a happier life. WPA with a decent passphrase is quite strong enough for anything you're sending over your network. Remember it's all in the clear once it leaves your cable modem anyway...
2) Steve Gibson is, IMHO, a pompous snake oil salesman. Sorry, but it has to be said. I know some people around here love him, but hey, if you've read the audiophile forum you'll know there are people who will believe anything :) I'm not going to present any evidence for my statement, just google around if you're interested. No one in the actual security business takes him seriously. 3) Feel free to use a 20 character passphrase if you like, it's certainly true that the longer the better. However, I use 8 truly random characters. It's easy to enter with an SB remote and I would be quite happy to challenge anyone to break it, and offer a nice bottle of something to anyone who can do so before we're both dead :) This makes interesting reading: http://blogs.zdnet.com/Ou/?p=127. GRC seems to have got his value of 20 from the study of attacks on the IDEA cypher which is really unrelated to WPA. According to the authors of the best WPA craking tool (aircrack) you can only test around 300 keys per second (http://www.aircrack-ng.org/doku.php?id=cracking_wpa). Thus, my 8 characters would take 91 years for a single computer to break. Maybe when computers get a little faster I'll up it to 9 chars - that's over 3000 years :) -- radish ------------------------------------------------------------------------ radish's Profile: http://forums.slimdevices.com/member.php?userid=77 View this thread: http://forums.slimdevices.com/showthread.php?t=44054 _______________________________________________ discuss mailing list [email protected] http://lists.slimdevices.com/lists/listinfo/discuss
