Hi Lee,

We both should make it apparent to all MUG members that while I don't doubt
for a moment the experiences that you are relating, they do represent
problems which exist at one extreme end of the spectrum.

At the other extreme would be some harmless guy like myself who has yet to
experience the first malicious intrusion.  The operating mode of an
individual user will tend to dictate whether they will pursue every
precaution in the book or adopt a nonchalant attitude about it all.  I guess
the political analogy to all of this would be comparing a liberal to a
conservative.

Ward Oldham


On 10/30/02 7:38 PM, "Lee Larson" <llarson at Louisville.edu> wrote:

> On Wednesday, October 30, 2002, at 07:16 PM, Nelson Helm wrote:
> 
>> 128 WEP?
> 
> Wireless Equivalent Privacy
> 
> This is a way to encrypt 802.11b wireless connections so someone
> sitting out on the street can't listen in on your sessions. The 128 is
> the key length in the RC4 algorithm used in the encryption.
> 
> On my system, I use both 128 WEP and I restrict the airport cards that
> can connect by their hardware (MAC) number to mine. The latter makes
> sure a spammer can't park out on the curb at midnight and send a
> million or so messages through my connection. (They really do this. The
> scumbags are actually spamming my cell phone with text messages.)
> 
> 
> The next meeting of the Louisville Computer Society will be November 26
> For more information, see <http://www.aye.net/~lcs>. A calendar of
> activities is at <http://www.calsnet.net/macusers>.
> 


The next meeting of the Louisville Computer Society will be November 26
For more information, see <http://www.aye.net/~lcs>. A calendar of
activities is at <http://www.calsnet.net/macusers>.


Reply via email to