On Apr 26, 2011, at 3:39 PM, Bruce Johnson wrote:
On Apr 26, 2011, at 12:23 PM, [email protected] wrote:
Just select the defaults of WPA2 and WPA (PSK), and TKIP & AES.
Choose a good passphrase mixing letters and numbers: "Hey it's
sn0w1ng
Macintoshes outside!"
OTOH, use a passphrase which is a substring of an instance of a
Gibson
Research Corporation pseudo-random number generator output.
A single call to GRC's p-RNG will give you enough characters for:
1) the SSID,
2) the WPA passphrase, and
3) the router password.
All adding vastly more complexity without increasing the security
one little bit. In fact, nonsense like this usually REDUCES
security, because it guarantees that the password gets written down
somewhere.
IMO, this is security theatre, not security.
I have relatively easy (1 and a half steps up from "password" but not
a whole lot more) as the setup on my router. FWIW, I have that info
taped to the top of my router at home. If someone is already inside
my house with evil intent (bwwaahhahaha), having my router's password
taped to it is the least of my worries.
Len
And, no, it can not be seen from outside.
--
You received this message because you are a member of G-Group, a group for
those using G3, G4, and G5 desktop Macs - with a particular focus on Power Macs.
The list FAQ is at http://lowendmac.com/lists/g-list.shtml and our netiquette
guide is at http://www.lowendmac.com/lists/netiquette.shtml
To post to this group, send email to [email protected]
For more options, visit this group at http://groups.google.com/group/g3-5-list