Thanks Jonathan, glad to learn yet something new again. Some folks seem to know most everything.
John. Sent from my iPad > On Feb 28, 2015, at 10:20 PM, Jonathan Fletcher <[email protected]> > wrote: > >> On Feb 28, 2015, at 9:48 PM, Lee Larson <[email protected]> wrote: >> >>> On Feb 28, 2015, at 9:27 PM, John Robinson <[email protected]> wrote: >>> >>> Since this problem seers into your mind every safety feature possible he >>> used to set up his dad’s network and one was to make it invisible. >>> >>> How is this done? I have looked for post, most are very old and they do >>> show a way…but…how do you get back into the network to update settings or >>> to make changes if you can’t see it? >> >> Most routers have the option to turn off the SSID broadcast. If you do so, >> the network won’t show up in the list of available WiFi networks, but you >> can still connect to it by manually typing in the network name. >> >>> There must be pro’s and con’s to this, what do you think? >> >> It might be somewhat useful as a security measure, but doesn’t hide your >> network from programs such as iStumbler or WiFi Explorer. > > > Lee's right, John. Not broadcasting your SSID, while a perfect stymie to the > uninitiated, does nothing to block the determined hacker. > > Having a strong password and one of the better levels of encryption (WPA2, > currently) goes a lot further. Also, filtering your network to only allow > certain Media Access Control ("MAC") addresses is another layer of security > you can add to your network. It makes things inconvenient for the casual > user, however, and still won't stop the determined hacker, but it does help a > little. > > Another way is to subnet your network to allow guests to access the internet, > but nothing else on your network. This may or may not be useful depending on > the particular situation. > > The BEST way to secure a WiFi network, hands down, and is almost 100% > effective, nearly 100% of the time, is… > > > > …to not have one. > > ::-) > > > -- > Jonathan Fletcher > FileMaker Certified Developer (9 thru 13) > > Fletcher Data Consulting, LLC > A FileMaker Business Alliance Partner > [email protected] > http://www.fletcherdata.com > 502-509-7137 > > Kentuckiana's FileMaker Developers Group > Next meeting: Tuesday, March 24th, noon to 3:30 > http://www.kyfmp.com > > > _______________________________________________ > MacGroup mailing list > [email protected] > http://www.math.louisville.edu/mailman/listinfo/macgroup
_______________________________________________ MacGroup mailing list [email protected] http://www.math.louisville.edu/mailman/listinfo/macgroup
