On Sun, Oct 11, 2009 at 3:23 AM, Dwight Hines <[email protected]> wrote:
> Researching the use of Powerline adapters for in-home, or even within
> business sites, you notice immediately that if you are using a pc instead of
> a Macintosh computer, there is a specific software package you can download
> to secure your Powerline adapters.

As Dan asked earlier, which powerline network adapter are you talking
about? It's hard to tell what is "required" or not without knowing
which device your are referring to.

Assuming that you are talking about a device which can only be set up
by running software which will only work under Windows, that strikes
me as a tedious and annoying problem, but it could be worked around in
a number of ways. Probably the easiest would be to have someone you
know who uses a Windows laptop stop by and run the utility to set up
the security for the powerline adapters. Generally this is not
something that needs to be worked with repeatedly.

(Something to consider though is whether or not the device reverts to
a default "insecure" state if it loses power. I would not want to
purchase a device that was THAT brain dead.)

The first thought that ran through my mind when I read your post was
how many home wireless access points "out there" use no security what
so ever? Or that are still using WEP instead of WPA2? My understanding
is that no one bothers with info on just how to hack into WEP any
longer. Instead it's sort of a competition. The novelty is to see who
can break into it fastest ...

-irrational john

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are a member of G-Group, a group for 
those using G3, G4, and G5 desktop Macs - with a particular focus on Power Macs.
The list FAQ is at http://lowendmac.com/lists/g-list.shtml and our netiquette 
guide is at http://www.lowendmac.com/lists/netiquette.shtml
To post to this group, send email to [email protected]
For more options, visit this group at http://groups.google.com/group/g3-5-list
-~----------~----~----~----~------~----~------~--~---

Reply via email to