Hi Lee, We both should make it apparent to all MUG members that while I don't doubt for a moment the experiences that you are relating, they do represent problems which exist at one extreme end of the spectrum.
At the other extreme would be some harmless guy like myself who has yet to experience the first malicious intrusion. The operating mode of an individual user will tend to dictate whether they will pursue every precaution in the book or adopt a nonchalant attitude about it all. I guess the political analogy to all of this would be comparing a liberal to a conservative. Ward Oldham On 10/30/02 7:38 PM, "Lee Larson" <llarson at Louisville.edu> wrote: > On Wednesday, October 30, 2002, at 07:16 PM, Nelson Helm wrote: > >> 128 WEP? > > Wireless Equivalent Privacy > > This is a way to encrypt 802.11b wireless connections so someone > sitting out on the street can't listen in on your sessions. The 128 is > the key length in the RC4 algorithm used in the encryption. > > On my system, I use both 128 WEP and I restrict the airport cards that > can connect by their hardware (MAC) number to mine. The latter makes > sure a spammer can't park out on the curb at midnight and send a > million or so messages through my connection. (They really do this. The > scumbags are actually spamming my cell phone with text messages.) > > > The next meeting of the Louisville Computer Society will be November 26 > For more information, see <http://www.aye.net/~lcs>. A calendar of > activities is at <http://www.calsnet.net/macusers>. > The next meeting of the Louisville Computer Society will be November 26 For more information, see <http://www.aye.net/~lcs>. A calendar of activities is at <http://www.calsnet.net/macusers>.
