It's mechanically breakable. I get UFO mac addresses back about an hour
after changing the password.
Mind you, if I really wanted to block then I'd list my devices as the
only ones allowed.
--dave
On 2020-07-09 9:06 a.m., James Knott via talk wrote:
On 2020-07-09 07:57 AM, David Collier-Brown via talk wrote:
I have an apparent neighbor who uses my connection. The use I don't
mind much, the degree to which my work is public I do mind.
They can get through WPA2? Did the key somehow slip out? One thing
you might try is a VPN. I used to use one back in the WEP days, as it
was known to be insecure. To reach my network, you needed both the
WEP key and VPN key.
---
Post to this mailing list [email protected]
Unsubscribe from this mailing list
https://gtalug.org/mailman/listinfo/talk
--
David Collier-Brown, | Always do right. This will gratify
System Programmer and Author | some people and astonish the rest
[email protected] | -- Mark Twain
CONFIDENTIALITY NOTICE AND DISCLAIMER : This telecommunication, including any
and all attachments, contains confidential information intended only for the
person(s) to whom it is addressed. Any dissemination, distribution, copying or
disclosure is strictly prohibited and is not a waiver of confidentiality. If
you have received this telecommunication in error, please notify the sender
immediately by return electronic mail and delete the message from your inbox
and deleted items folders. This telecommunication does not constitute an
express or implied agreement to conduct transactions by electronic means, nor
does it constitute a contract offer, a contract amendment or an acceptance of a
contract offer. Contract terms contained in this telecommunication are subject
to legal review and the completion of formal documentation and are not binding
until same is confirmed in writing and has been signed by an authorized
signatory.
---
Post to this mailing list [email protected]
Unsubscribe from this mailing list https://gtalug.org/mailman/listinfo/talk