On 2018-09-16 1:45 p.m., David Collier-Brown via talk wrote:
I have a Rogers-supplied router and cable modem package, which twice
has shown significant usage when I was out, once with the original
unit and once with their replacement Cisco. That makes me suspicious
of the current state of authentication for wi-fi schemes (and I use
the term "schemes" advisedly: they used to horribly leaky (;-))
What's a good approach? I have considered
* MAC address lists,
* no wi-fi (strictly wired doesn't work with solid concrete walls),
* a second router with a more secure protocol (/is/ there such a
protocol? And will my wife's Mac speak it?))
* something I haven't thought of
--dave
I've set up MAC address lists, after a surprising number of reboots to
unwedge the router (did I even mention I hate flaky PC-style software?).
How can my hacker avoid them? Wait until my wife's Mac drops off-line
and steal her MAC?
--dave
--
David Collier-Brown, | Always do right. This will gratify
System Programmer and Author | some people and astonish the rest
[email protected] | -- Mark Twain
---
Talk Mailing List
[email protected]
https://gtalug.org/mailman/listinfo/talk