You're absolutely right Marta. I should have said WPA rather than WAP. Chalk it up to a couple of margaritas at Chili's last night. WPA is WiFi Protected Access, the more robust encryption standard now included in many recent wireless routers. WPA uses a dynamic key encryption method, instead of WEP's flawed static key method. This makes guessing a WPA key very difficult, if not impossible.
WAP is an acronym for Wireless Access Point. It's also the sound my hand made when it struck my forehead after reading my post from last night. Bryan On Jul 21, 2004, at 11:25 PM, Marta Edie wrote: > People, I don't have a WAP, but above the WEP is a WPA. Since I don't > know what the abbreviation means, I cannot tell whether WAP an WPA are > the same. > Marta > On Jul 21, 2004, at 23:01, Mike Watkins wrote: > >> Everybody, >> >> Thanks for the great responses. I guess since I'm not a wireless user >> I won't have a problem. I will pass on the answers to my friends in >> the immediate neighborhood, though... some do use an Airport set-up. >> My good friend across the street, for instance, may not know about >> the WEP/ WAP difference. You people are all so smart and good about >> helping! I'm glad to have found the MacGroup. >> >> Mike >> >> >> On Wednesday, July 21, 2004, at 10:42 PM, John Robinson wrote: >> >>> Bryan, >>> >>> Glad this discussion got started, I have just changed my protection >>> to WAP for you stated it is more robust than than the WEP which I >>> had previously. I used the WAP Personal, I hope this is correct, >>> but what is the difference between the two and why is WAP more >>> robust? >>> >>> Many thanks, >>> >>> John R. >>> >>> >>> On Jul 21, 2004, at 10:23 PM, Bryan Forrest wrote: >>> >>>> Hi Mike - >>>> >>>> If you don't have a wireless setup in your home, then you don't >>>> have a lot to worry about. Can someone tap into your internet >>>> connection? Yes, but it's not going to be an easy task. Your >>>> computer is physically hardwired to the cable modem, so someone >>>> would have to tap your phone line either inside or outside your >>>> home. Unless you are being investigated by the FBI, Homeland >>>> Security, or the Mob, I wouldn't worry about it too much. >>>> >>>> If you had a wireless connection, security would be much more >>>> serious an issue. Wireless has several levels of security. >>>> 1. Closed network - Assign a name to your AP. By doing this, >>>> someone would have to know the name of your network to log in. This >>>> isn't difficult if they are sniffing for wireless networks. As soon >>>> as someone logs in, they have the name. It's OK for starters, but I >>>> wouldn't rely on it. >>>> 2. Set a WEP password - In order to log into the base station, you >>>> will need to know both the name of the network and the password. >>>> Better security, but not perfect. WEP has been cracked, so with >>>> enough packets collected a hacker can get your WEP password and >>>> access your network. If you have an Airport Extreme or Express, you >>>> can use WAP instead, much more robust and secure. >>>> 3. MAC address filtering - Each network device has a 12 digit hex >>>> code that serves as a unique identifier for that device. If you >>>> restrict access to your router to the network devices you own, that >>>> will discourage passersby from logging into your network. If their >>>> MAC address isn't registered in your router, they can't connect. >>>> Again, not a perfect solution, in that a smart user can see who is >>>> currently connected to a wireless network and then spoof a MAC >>>> address from someone already authenticated. >>>> 4. Turn on your Firewall software in OS X. This won't keep someone >>>> from accessing your network, but it will help to keep them out of >>>> your computer if they do access your network. >>>> >>>> Obviously, none of the solutions above are perfect, but by >>>> providing a multi-layered security plan, you should be much safer >>>> than your neighbors. And for the most part, war drivers are going >>>> to find the path of least resistance. >>>> >>>> HTH -- Bryan C. Forrest Macintosh Specialist & Asst. Network Administrator LifeNet http://www.lifenet.org >>>> >>>> >>>> On Jul 21, 2004, at 8:29 PM, Mike Watkins wrote: >>>> >>>>> All, >>>>> >>>>> Is there anything I need to do to protect my computer's DSL >>>>> service from being used by someone outside my home? I do not have >>>>> a wireless/ airport type set-up... just a regular BellSouth high >>>>> speed DSL conection. >>>>> >>>>> There's a kid in our neighborhood who is lurking outside some of >>>>> my neighbor's houses to use their internet on his laptop... I've >>>>> seen him by two of my neighbor's houses, and that's what he says >>>>> he's doing. He told me he didn't think they'd mind. (Of course, >>>>> they're not home at the time.) He sat out in front of my next-door >>>>> neighbor's for several hours on Monday. She doesn't have a >>>>> wireless set-up, either... perhaps he was really tapping into the >>>>> folks across the street's system? >>>>> >>>>> If he or someone else can access my internet, what are the dangers >>>>> to my system? I don't know how skilled he is. If he did anything >>>>> illegal using my connection, or if his computer had a virus, or >>>>> whatever... what could happen? Would you report him to anyone... >>>>> and, if so, who? >>>>> >>>>> Anyone know about this stuff? >>>>> >>>>> Mike >>>>> >>>>> >>>>> >>>>> | The next meeting of the Louisville Computer Society will >>>>> | be July 27. The LCS Web page is <http://www.kymac.org>. >>>>> | List posting address: <mailto:macgroup at erdos.math.louisville.edu> >>>>> | List Web page: <http://erdos.math.louisville.edu/macgroup> >>>>> >>>> >>>> >>>> >>>> | The next meeting of the Louisville Computer Society will >>>> | be July 27. The LCS Web page is <http://www.kymac.org>. >>>> | List posting address: <mailto:macgroup at erdos.math.louisville.edu> >>>> | List Web page: <http://erdos.math.louisville.edu/macgroup> >>>> >>> >>> >>> >>> | The next meeting of the Louisville Computer Society will >>> | be July 27. The LCS Web page is <http://www.kymac.org>. >>> | List posting address: <mailto:macgroup at erdos.math.louisville.edu> >>> | List Web page: <http://erdos.math.louisville.edu/macgroup> >>> >> >> >> >> | The next meeting of the Louisville Computer Society will >> | be July 27. The LCS Web page is <http://www.kymac.org>. >> | List posting address: <mailto:macgroup at erdos.math.louisville.edu> >> | List Web page: <http://erdos.math.louisville.edu/macgroup> >> > > > > | The next meeting of the Louisville Computer Society will > | be July 27. The LCS Web page is <http://www.kymac.org>. > | List posting address: <mailto:macgroup at erdos.math.louisville.edu> > | List Web page: <http://erdos.math.louisville.edu/macgroup> > | The next meeting of the Louisville Computer Society will | be July 27. The LCS Web page is <http://www.kymac.org>. | List posting address: <mailto:macgroup at erdos.math.louisville.edu> | List Web page: <http://erdos.math.louisville.edu/macgroup>
