On Sun, Mar 2, 2014 at 1:59 PM, Gene Heskett <ghesk...@wdtv.com> wrote:

>
>
> I do have such a setup out in the shop building, and have had a fully
> bridged AP setup there, basically so I wouldn't have to string an almost
> too short piece of cat5 from the hub to a teeny little table the lappy
> lives on when I need to sit down and write some gcode by ssh -Y into one of
> the machine controllers.
>
> At any one time, I have one of those pocket wifi sniffers that can see a
> half a dozen similar routers scattered about my neighborhood.  In 5 or 6
> years, I have had one outside signal come into the system and go on out on
> the internet, apparently uninterested or un-aware of the extent of my local
> network. No clue if he was watching porn or what, but I reached into the
> router and disabled the radio, then setup a WPA2/AES login with a loooooong
> passphrase, and have had no further trouble.  However, trying to get that
> same security model setup in the Mint14 that is currently on the lappy, I
> am back to using the short cat5, stretched across the front of the machines
> and definitely in harms way.
>
> I understand Mint16 is out now, and maybe it has a smarter wpa_supplicant
> that can do that security, because the cable really is a PIMA.
>
> So, my one "breakin" was benign in its effect on me other than hogging some
> bandwidth.
>


Gene,

Security by obscurity was once a valid technique.  Still may be effective
if you live way out in the sticks.

However, anybody with a car, a laptop, and a wireless network sniffer can
latch on to a wireless network that's either unprotected, or lightly
protected.

My machine controller is hardwired into a full copper network.  Someone
trying to get into the machine must first breach two firewalls, one on the
router and one inside the network, and networking must be turned on the
machine controller in order for someone to get even a chance at running a
port mapper against it.

Maybe I'm being paranoid, but I watch attack attempts from all over the
world at work on a daily basis run against blocks of addresses.  You're not
really paranoid if they are out to get ya...  ;-)

Mark
------------------------------------------------------------------------------
Subversion Kills Productivity. Get off Subversion & Make the Move to Perforce.
With Perforce, you get hassle-free workflows. Merge that actually works. 
Faster operations. Version large binaries.  Built-in WAN optimization and the
freedom to use Git, Perforce or both. Make the move to Perforce.
http://pubads.g.doubleclick.net/gampad/clk?id=122218951&iu=/4140/ostg.clktrk
_______________________________________________
Emc-users mailing list
Emc-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/emc-users

Reply via email to