On 2018-09-16 1:45 p.m., David Collier-Brown via talk wrote:

I have a Rogers-supplied router and cable modem package, which twice has shown significant usage when I was out, once with the original unit and once with their replacement Cisco.  That makes me suspicious of the current state of authentication for wi-fi schemes (and I use the term "schemes" advisedly: they used to horribly leaky (;-))

What's a good approach? I have considered

  * MAC address lists,
  * no wi-fi (strictly wired doesn't work with solid concrete walls),
  * a second router with a more secure protocol (/is/ there such a
    protocol? And will my wife's Mac speak it?))
  * something I haven't thought of

--dave

I've set up MAC address lists, after a surprising number of reboots to unwedge the router  (did I even mention I hate flaky PC-style software?).

How can my hacker avoid them? Wait until my wife's Mac drops off-line and steal her MAC?

--dave

--
David Collier-Brown,         | Always do right. This will gratify
System Programmer and Author | some people and astonish the rest
[email protected]           |                      -- Mark Twain

---
Talk Mailing List
[email protected]
https://gtalug.org/mailman/listinfo/talk

Reply via email to