At 3:23 AM -0400 10/11/2009, Dwight Hines wrote:
>Researching the use of Powerline adapters for in-home, or even 
>within business sites, you notice immediately that if you are using 
>a pc instead of a Macintosh computer, there is a specific software 
>package you can download to secure your Powerline adapters.

Not sure what you're point is here.  The powerline hardware I've 
fooled with was plug'n'play, and the bridge box had a web-based 
interface.  No extra software needed.  Of course they offer some 
bizarre package for Windoze, because, as everyone knows, Windoze 
can't do anything without something new/extra/perfumesented being 
installed. *shrug*

If you have some specific hardware in mind, say so, so we can look at it.

>what is the liability of AT&T for selling hardware that creates 
>insecure networks?

None.  Read the ISP's TOS/AUP.

Keeping your computers secure is YOUR responsibility.  If your ISP 
provides you with something fancy, like a NAT router, or a media 
bridge, that's great -- but that's done to conveniently maintain 
routing integrity, not security.  Your home is YOUR responsibility.

>What is the value of privacy for a home or business network?

In general, Q$10,000,001.  OTGH, it depends on how much you pay your 
local geek to lock things down.  Kindof like paying someone to put in 
a thicker steel door and better locks.  Don't forget to put steel 
plating in your walls too - otherwise a clever burgurgeler could use 
a chain saw to make his own door.

>And, has anyone figured out how to "secure" the individual Powerline adapters?

Exactly what do you mean by '"secure" the individual Powerline adapters'?

This is a technology that bridges ethernet over home in-wall power 
lines.  The etheric packets are encrypted, (most commonly with a 
56-bit DES?), just in case they "leak" beyond the transformer.

- Dan.
-- 
- Psychoceramic Emeritus; South Jersey, USA, Earth.

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are a member of G-Group, a group for 
those using G3, G4, and G5 desktop Macs - with a particular focus on Power Macs.
The list FAQ is at http://lowendmac.com/lists/g-list.shtml and our netiquette 
guide is at http://www.lowendmac.com/lists/netiquette.shtml
To post to this group, send email to [email protected]
For more options, visit this group at http://groups.google.com/group/g3-5-list
-~----------~----~----~----~------~----~------~--~---

Reply via email to