On Apr 26, 2011, at 3:39 PM, Bruce Johnson wrote:
On Apr 26, 2011, at 12:23 PM, peterh...@cruzio.com wrote:
Just select the defaults of WPA2 and WPA (PSK), and TKIP & AES.
Choose a good passphrase mixing letters and numbers: "Hey it's
OTOH, use a passphrase which is a substring of an instance of a
Research Corporation pseudo-random number generator output.
A single call to GRC's p-RNG will give you enough characters for:
1) the SSID,
2) the WPA passphrase, and
3) the router password.
All adding vastly more complexity without increasing the security
one little bit. In fact, nonsense like this usually REDUCES
security, because it guarantees that the password gets written down
IMO, this is security theatre, not security.
I have relatively easy (1 and a half steps up from "password" but not
a whole lot more) as the setup on my router. FWIW, I have that info
taped to the top of my router at home. If someone is already inside
my house with evil intent (bwwaahhahaha), having my router's password
taped to it is the least of my worries.
And, no, it can not be seen from outside.
You received this message because you are a member of G-Group, a group for
those using G3, G4, and G5 desktop Macs - with a particular focus on Power Macs.
The list FAQ is at http://lowendmac.com/lists/g-list.shtml and our netiquette
guide is at http://www.lowendmac.com/lists/netiquette.shtml
To post to this group, send email to firstname.lastname@example.org
For more options, visit this group at http://groups.google.com/group/g3-5-list