Everybody,

Thanks for the great responses. I guess since I'm not a wireless user I 
won't have a problem. I will pass on the answers to my friends in the 
immediate neighborhood, though... some do use an Airport set-up. My 
good friend across the street, for instance, may not know about the 
WEP/ WAP difference. You people are all so smart and good about 
helping! I'm glad to have found the MacGroup.

Mike


On Wednesday, July 21, 2004, at 10:42  PM, John Robinson wrote:

> Bryan,
>
> Glad this discussion got started, I have just changed my protection to 
> WAP for you stated it is more robust than than the WEP which I had 
> previously.  I used the WAP Personal, I hope this is correct, but what 
> is the difference between the two and why is WAP more robust?
>
> Many thanks,
>
> John R.
>
>
> On Jul 21, 2004, at 10:23 PM, Bryan Forrest wrote:
>
>> Hi Mike -
>>
>> If you don't have a wireless setup in your home, then you don't have 
>> a lot to worry about. Can someone tap into your internet connection? 
>> Yes, but it's not going to be an easy task. Your computer is 
>> physically hardwired to the cable modem, so someone would have to tap 
>> your phone line either inside or outside your home. Unless you are 
>> being investigated by the FBI, Homeland Security, or the Mob, I 
>> wouldn't worry about it too much.
>>
>> If you had a wireless connection, security would be much more serious 
>> an issue. Wireless has several levels of security.
>> 1. Closed network - Assign a name to your AP. By doing this, someone 
>> would have to know the name of your network to log in. This isn't 
>> difficult if they are sniffing for wireless networks. As soon as 
>> someone logs in, they have the name. It's OK for starters, but I 
>> wouldn't rely on it.
>> 2. Set a WEP password - In order to log into the base station, you 
>> will need to know both the name of the network and the password. 
>> Better security, but not perfect. WEP has been cracked, so with 
>> enough packets collected a hacker can get your WEP password and 
>> access your network. If you have an Airport Extreme or Express, you 
>> can use WAP instead, much more robust and secure.
>> 3. MAC address filtering - Each network device has a 12 digit hex 
>> code that serves as a unique identifier for that device. If you 
>> restrict access to your router to the network devices you own, that 
>> will discourage passersby from logging into your network. If their 
>> MAC address isn't registered in your router, they can't connect. 
>> Again, not a perfect solution, in that a smart user can see who is 
>> currently connected to a wireless network and then spoof a MAC 
>> address from someone already authenticated.
>> 4. Turn on your Firewall software in OS X. This won't keep someone 
>> from accessing your network, but it will help to keep them out of 
>> your computer if they do access your network.
>>
>> Obviously, none of the solutions above are perfect, but by providing 
>> a multi-layered security plan, you should be much safer than your 
>> neighbors. And for the most part, war drivers are going to find the 
>> path of least resistance.
>>
>> HTH
>>
>> --
>> Bryan C. Forrest
>> Macintosh Specialist & Asst. Network Administrator
>> LifeNet
>> http://www.lifenet.org
>>
>>
>> On Jul 21, 2004, at 8:29 PM, Mike Watkins wrote:
>>
>>> All,
>>>
>>> Is there anything I need to do to protect my computer's DSL service 
>>> from being used by someone outside my home? I do not have a 
>>> wireless/ airport type set-up... just a regular BellSouth high speed 
>>> DSL conection.
>>>
>>> There's a kid in our neighborhood who is lurking outside some of my 
>>> neighbor's houses to use their internet on his laptop... I've seen 
>>> him by two of my neighbor's houses, and that's what he says he's 
>>> doing. He told me he didn't think they'd mind. (Of course, they're 
>>> not home at the time.) He sat out in front of my next-door 
>>> neighbor's for several hours on Monday. She doesn't have a wireless 
>>> set-up, either... perhaps he was really tapping into the folks 
>>> across the street's system?
>>>
>>> If he or someone else can access my internet, what are the dangers 
>>> to my system? I don't know how skilled he is. If he did anything 
>>> illegal using my connection, or if his computer had a virus, or 
>>> whatever... what could happen? Would you report him to anyone... 
>>> and, if so, who?
>>>
>>> Anyone know about this stuff?
>>>
>>> Mike
>>>
>>>
>>>
>>> | The next meeting of the Louisville Computer Society will
>>> | be July 27. The LCS Web page is <http://www.kymac.org>.
>>> | List posting address: <mailto:macgroup at erdos.math.louisville.edu>
>>> | List Web page: <http://erdos.math.louisville.edu/macgroup>
>>>
>>
>>
>>
>> | The next meeting of the Louisville Computer Society will
>> | be July 27. The LCS Web page is <http://www.kymac.org>.
>> | List posting address: <mailto:macgroup at erdos.math.louisville.edu>
>> | List Web page: <http://erdos.math.louisville.edu/macgroup>
>>
>
>
>
> | The next meeting of the Louisville Computer Society will
> | be July 27. The LCS Web page is <http://www.kymac.org>.
> | List posting address: <mailto:macgroup at erdos.math.louisville.edu>
> | List Web page: <http://erdos.math.louisville.edu/macgroup>
>



| The next meeting of the Louisville Computer Society will
| be July 27. The LCS Web page is <http://www.kymac.org>.
| List posting address: <mailto:macgroup at erdos.math.louisville.edu>
| List Web page: <http://erdos.math.louisville.edu/macgroup>


Reply via email to