As mr. bunny noted you can't realy hide the SSID & MAC addresses. They are broadcast in every packet sent and received by the AP. WEP does present a barrier to the casual browser though. You are being more than cautous enough for Time Warner if that's what keeps you up at night. Why not switch to a nicer broadband provider and open up your AP a la NYCWireless?
If you want to secure a radio device, you should use point-to-point strong encryption, such as ssh or IPsec. This doesn't provide airtight security since all electronic devices are radio devices, so a really determined advesary can just read your screen, place a keyboard logger in your computer, etc. Truly secure devices are never networked and placed in guarded windowless offices. If you block port 25 you'll probably keep out the so far hypothetical spammer on the run, mostly cuz he will just use your neighbor's network. -- Daniel <<You cant eat before a operashun. Not even cheese.>> -- Charlie Gordon On Mon, 9 Sep 2002, Paul Goode wrote: ]I have an early Cabletron AP thatI think is optimally configured for ]security. All clients are requiredto know the SSID, the WEP encryption ]key and have the right MAC adress. Recent article still claim that all ]of these precautions can still besidesteped. I tested my AP with ]Netstumbler and found that if I did not specify my SSID in the profile ]my client cards would not become activet therefore Netstumbler would not ]indicate its presence. Is would this be true of all RF devices? Is ]there a radio wave device that coould still detect my AP brodcast and ]decode my SSID. If not then does't configuring AP to require the SSID ]allow it torun in stealth mode? ]-- ]NYCwireless - http://www.nycwireless.net/ ]Un/Subscribe: http://lists.nycwireless.net/mailman/listinfo/nycwireless/ ]Archives: http://lists.nycwireless.net/pipermail/nycwireless/ ] -- NYCwireless - http://www.nycwireless.net/ Un/Subscribe: http://lists.nycwireless.net/mailman/listinfo/nycwireless/ Archives: http://lists.nycwireless.net/pipermail/nycwireless/
