Bryan,

Glad this discussion got started, I have just changed my protection to 
WAP for you stated it is more robust than than the WEP which I had 
previously.  I used the WAP Personal, I hope this is correct, but what 
is the difference between the two and why is WAP more robust?

Many thanks,

John R.


On Jul 21, 2004, at 10:23 PM, Bryan Forrest wrote:

> Hi Mike -
>
> If you don't have a wireless setup in your home, then you don't have a 
> lot to worry about. Can someone tap into your internet connection? 
> Yes, but it's not going to be an easy task. Your computer is 
> physically hardwired to the cable modem, so someone would have to tap 
> your phone line either inside or outside your home. Unless you are 
> being investigated by the FBI, Homeland Security, or the Mob, I 
> wouldn't worry about it too much.
>
> If you had a wireless connection, security would be much more serious 
> an issue. Wireless has several levels of security.
> 1. Closed network - Assign a name to your AP. By doing this, someone 
> would have to know the name of your network to log in. This isn't 
> difficult if they are sniffing for wireless networks. As soon as 
> someone logs in, they have the name. It's OK for starters, but I 
> wouldn't rely on it.
> 2. Set a WEP password - In order to log into the base station, you 
> will need to know both the name of the network and the password. 
> Better security, but not perfect. WEP has been cracked, so with enough 
> packets collected a hacker can get your WEP password and access your 
> network. If you have an Airport Extreme or Express, you can use WAP 
> instead, much more robust and secure.
> 3. MAC address filtering - Each network device has a 12 digit hex code 
> that serves as a unique identifier for that device. If you restrict 
> access to your router to the network devices you own, that will 
> discourage passersby from logging into your network. If their MAC 
> address isn't registered in your router, they can't connect. Again, 
> not a perfect solution, in that a smart user can see who is currently 
> connected to a wireless network and then spoof a MAC address from 
> someone already authenticated.
> 4. Turn on your Firewall software in OS X. This won't keep someone 
> from accessing your network, but it will help to keep them out of your 
> computer if they do access your network.
>
> Obviously, none of the solutions above are perfect, but by providing a 
> multi-layered security plan, you should be much safer than your 
> neighbors. And for the most part, war drivers are going to find the 
> path of least resistance.
>
> HTH
>
> --
> Bryan C. Forrest
> Macintosh Specialist & Asst. Network Administrator
> LifeNet
> http://www.lifenet.org
>
>
> On Jul 21, 2004, at 8:29 PM, Mike Watkins wrote:
>
>> All,
>>
>> Is there anything I need to do to protect my computer's DSL service 
>> from being used by someone outside my home? I do not have a wireless/ 
>> airport type set-up... just a regular BellSouth high speed DSL 
>> conection.
>>
>> There's a kid in our neighborhood who is lurking outside some of my 
>> neighbor's houses to use their internet on his laptop... I've seen 
>> him by two of my neighbor's houses, and that's what he says he's 
>> doing. He told me he didn't think they'd mind. (Of course, they're 
>> not home at the time.) He sat out in front of my next-door neighbor's 
>> for several hours on Monday. She doesn't have a wireless set-up, 
>> either... perhaps he was really tapping into the folks across the 
>> street's system?
>>
>> If he or someone else can access my internet, what are the dangers to 
>> my system? I don't know how skilled he is. If he did anything illegal 
>> using my connection, or if his computer had a virus, or whatever... 
>> what could happen? Would you report him to anyone... and, if so, who?
>>
>> Anyone know about this stuff?
>>
>> Mike
>>
>>
>>
>> | The next meeting of the Louisville Computer Society will
>> | be July 27. The LCS Web page is <http://www.kymac.org>.
>> | List posting address: <mailto:macgroup at erdos.math.louisville.edu>
>> | List Web page: <http://erdos.math.louisville.edu/macgroup>
>>
>
>
>
> | The next meeting of the Louisville Computer Society will
> | be July 27. The LCS Web page is <http://www.kymac.org>.
> | List posting address: <mailto:macgroup at erdos.math.louisville.edu>
> | List Web page: <http://erdos.math.louisville.edu/macgroup>
>



| The next meeting of the Louisville Computer Society will
| be July 27. The LCS Web page is <http://www.kymac.org>.
| List posting address: <mailto:macgroup at erdos.math.louisville.edu>
| List Web page: <http://erdos.math.louisville.edu/macgroup>


Reply via email to