MAC address filtering is good, but like anything there are ways to spoof a MAC 
address.  A Pretty simple and easy way to limit access, at least until the kids 
bring their friends over and they want wireless access....

What it really boils down to is striking a balance between security and risk. 
If you expect that people are going to be trying to compromise your stuff, 
fine. If you just want to make it difficult for the teenager living next door 
who is playing around with hacking tools, don't burn a lot of calories trying 
to harden your systems.

I keep my stuff locked down at home using a number of simple approaches. I also 
monitor the traffic, so I know if there is an attempt to compromise my systems. 
 When/if that happens, I'll dig in to see what that attempt is and where it's 
coming from.

Like any security environment, a lot of it has to do with vigilance and just 
watching for abnormal behaviors or events. That means you need to have a good 
idea of what is normal, too.

Dan

Sent from my iPad

> On Oct 24, 2014, at 9:17 AM, Mitch Haley via Mercedes <mercedes@okiebenz.com> 
> wrote:
> 
> Dan Penoff via Mercedes wrote:
>> Just leave it out there, but enable security. WPA for sure, as WEP has been 
>> compromised for years.  
> 
> My neighborhood is full of Uverse customers running Motorola NGV510s with 
> default settings. wifi password is a 10 digit number printed on the router, 
> admin password to change settings is another 10 digit number.
> 
> The one thing I did besides turning the RF power down was to 'whitelist' the 
> connecting devices.
> Supposedly, if the device ID doesn't match one of the devices in the 
> whitelist, it can't connect. How strong is this protection?
> 
> Mitch.
> 
> _______________________________________
> http://www.okiebenz.com
> 
> To search list archives http://www.okiebenz.com/archive/
> 
> To Unsubscribe or change delivery options go to:
> http://mail.okiebenz.com/mailman/listinfo/mercedes_okiebenz.com
> 
> All posts are the result of individual contributors and as such, those 
> individuals are responsible for the content of the post.  The list owner has 
> no control over the content of the messages of each contributor.

_______________________________________
http://www.okiebenz.com

To search list archives http://www.okiebenz.com/archive/

To Unsubscribe or change delivery options go to:
http://mail.okiebenz.com/mailman/listinfo/mercedes_okiebenz.com

All posts are the result of individual contributors and as such, those 
individuals are responsible for the content of the post.  The list owner has no 
control over the content of the messages of each contributor.

Reply via email to