On 2011/04/26 13:39, Bruce Johnson so eloquently wrote:
On Apr 26, 2011, at 12:23 PM,peterh...@cruzio.com wrote:
Just select the defaults of WPA2 and WPA (PSK), and TKIP&
Choose a good passphrase mixing letters and numbers: "Hey
it's sn0w1ng Macintoshes outside!"
OTOH, use a passphrase which is a substring of an instance of a
Gibson Research Corporation pseudo-random number generator
A single call to GRC's p-RNG will give you enough characters
1) the SSID,
2) the WPA passphrase, and
3) the router password.
All adding vastly more complexity without increasing the security one
little bit. In fact, nonsense like this usually REDUCES security,
because it guarantees that the password gets written down somewhere.
It doesn't have to be complex. Using a random generator such as RPG and
an *encrypted* password repository such as Pastor, PasswordWallet,
Keychain Access, 1Password, etc… provides good security without having
to resort to memorizing or writing them down.
Granted Pastor's RC4 encryption algorhythem isn't the strongest in the
world, but it is free and should be sufficient unless you are trying to
protect national security data.
iMac 20" USB 2 1.25GHz G4 2GB RAM GeForceFX5200 Ultra 64MB VRAM 10.4.11
PB G4 15" HR-DLSD 1.67GHz G4 2GB RAM Radeon 9700 128MB VRAM 10.4.11
Mac Pro Mid-2010 2.8 GHz QC 6 GB RAM Radeon HD 5770 1GB VRAM 10.6.7
You received this message because you are a member of G-Group, a group for
those using G3, G4, and G5 desktop Macs - with a particular focus on Power Macs.
The list FAQ is at http://lowendmac.com/lists/g-list.shtml and our netiquette
guide is at http://www.lowendmac.com/lists/netiquette.shtml
To post to this group, send email to email@example.com
For more options, visit this group at http://groups.google.com/group/g3-5-list