On Apr 26, 2011, at 3:39 PM, Bruce Johnson wrote:

On Apr 26, 2011, at 12:23 PM, peterh...@cruzio.com wrote:

Just select the defaults of WPA2 and WPA (PSK), and TKIP & AES.

Choose a good passphrase mixing letters and numbers: "Hey it's sn0w1ng
Macintoshes outside!"

OTOH, use a passphrase which is a substring of an instance of a Gibson
Research Corporation pseudo-random number generator output.

A single call to GRC's p-RNG will give you enough characters for:

1) the SSID,

2) the WPA passphrase, and

3) the router password.

All adding vastly more complexity without increasing the security one little bit. In fact, nonsense like this usually REDUCES security, because it guarantees that the password gets written down somewhere.

IMO, this is security theatre, not security.

I have relatively easy (1 and a half steps up from "password" but not a whole lot more) as the setup on my router. FWIW, I have that info taped to the top of my router at home. If someone is already inside my house with evil intent (bwwaahhahaha), having my router's password taped to it is the least of my worries.


And, no, it can not be seen from outside.

You received this message because you are a member of G-Group, a group for 
those using G3, G4, and G5 desktop Macs - with a particular focus on Power Macs.
The list FAQ is at http://lowendmac.com/lists/g-list.shtml and our netiquette 
guide is at http://www.lowendmac.com/lists/netiquette.shtml
To post to this group, send email to g3-5-list@googlegroups.com
For more options, visit this group at http://groups.google.com/group/g3-5-list

Reply via email to