Skip to comments.Use WPA2, not WEP(vanity)
Posted on 01/27/2013 10:23:07 AM PST by Signalman
I was viewing some of my neighbors' wi-fi connections on my tablet computer and noticed that most are using the outdated WEP network security standard. This was deemed to be insecure a decade ago and was replaced by the WPA and, later, the WPA2 security standard.
Someone in "listening range" of a wi-fi hotspot using the WEP encryption standard could, potentially, break into the network relatively easily and disrupt it.
Many internet service providers (ISP) still provide WEP as the default, but they are now required to also provide WPA.
So it is a good idea to insure that your current wi-fi security standard is WPA, WPA2 or WPA2/PSK. This can be done using the software provided by your ISP.
All wireless can be hacked with free software available on the internet.
WEP is far easier to hack.
“All wireless can be hacked with free software available on the internet”
True, but its sort of like securing a safe. You can use a cheap, flimsy lock or a heavy padlock. Both can be violated. It´s just that the former makes it a lot easier.
However, every now and then, one of the optional wifi selections says "TSA Security, Region 7 (WPA)".
Security comes in various forms. For some of us, it you are in range to intercept the router signal, you are also in reach out and touch you range.
A neighbor with a sense of humor?
This is exactly why I have never trusted wifi from day one. I still use hard-wired networking and always will. Did I have to make holes in walls? Yes. Did I have to crawl through the attic? Yes. Did I get tired and sweaty? Yes, but my network is secure! :-)
Good advice. But as others are saying, given enough time wifi can/will be hacked.
My password is pretty strong too. I took a sha1 hash of some random file I had on my thumbdrive and use the output for a password. I figure if I make it hard enough to break, they will move on to easier pickings.
Here’s a very good article on the subject:
Throughput on many of the older routers had difficulty handling the extra overhead associated with WPA2 or WPA2/PSK, especially when accomodating several clients or streaming video. Since WiFi routers have proven remarkably sturdy (compared to a lot of other comparable computer gear) people tend to keep what they’ve got until it breaks. So it was easier for them just to leave things alone.
You are absolutely correct - with the increased performance and features available in current routers, there is no reason not to adopt a more secure security schema.
I use MAC address filtering in addition to password for the wifi. If your machine MAC address isn’t on the list, it never even gets a chance to enter a password.
You can’t stop the signal...there is no security...just making yourself a harder target....mac spoofing
True, but a WPA2 protected network with a secure password (not “password” or “ABC123”) is theoretically crackable, but for practical purposes beyond the ability of average hackers.
” theoretically crackable, but for practical purposes beyond the ability of average hackers.”
It just takes longer as the software needs a large sample size. WPA is better of course, just saying don’t use wireless networking and expect it to be secure.
My router is wide open. I don’t use a key. It’s too much trouble when people come over. I can’t even connect to it from the garage and my neighbors are too far to tap in. I check the logs periodically and no one has ever tried.
Bad idea. You should always use some sort of encryption and just provide a key to your guests on a thumbdrive. Very easy to do and it will save your butt. You don’t want people using your connection to surf for things that could get you in trouble. Just saying....
Until you tie it to the internet - at which point you are vulnerable. Just like Wep/WAP - it’s just the time it takes to get through and the skill level required that is the question.
This is a GOOD piece of advice! It IS possible to do MAC spoofing, but you have to know what they are too. If someone can decrypt your Wireless stream they likely can pull the MAC addresses out too. It is one more point in raising the bar to being hacked though.
So, someone does some wardriving with a very sensitive WIFI adapter and finds your open network. Not only are they hackers, but they’re also pedophiles and use your network to download kiddy porn. Next thing you know, the FBI is crashing through your door, and you’re on the local news all the while protesting your innocence.
They search all your computers and don’t find anything incriminating. A year later, on page g20, there’s a little ‘correction’ that says you were cleared of all charges but no one sees that or even if they do, they still think you’re guilty.
Checking the logs is locking the barn door after the horse is long gone.
At least add a password.
Wardriving went out with the 90’s. They can surf for free at Starbucks. I live on a mountain. No one is going to drive up here to use my internet connection which doesn’t even reach the street anyway.
Who is going to use my router? They would have to park in my driveway. I can’t even see another house in the summer.
it is still en vogue around here. Lots of Red Necks driving around using open and hackable wireless networks to download Movies and Music.
Parking lot at Starbucks is easier than parking my my driveway. There is no street parking here. I had to install another router just to reach the other side of the house.
Why take the chance when it is so easy to protect yourself?
Better to spend 5 minutes setting up a wpa-enabled password then 1 week trying to prove to the police that you had nothing to do with illegal stuff transiting your router.
I hear what you are saying, but really, save yourself a potential headache.
For the same reason I don’t lock my car keys in a safe at night to keep people from taking my car. The chances of me forgetting the safe combination are greater than my chances of someone taking my keys.
The nearest Starbucks to us is about a 2 hour drive. And Wardrivers usually have some very sensitive antennas which means they can grab your signal from much further away.
A buddy of mine built a DIY antenna for his wireless card and can pick up the McDonald's free wifi from several blocks away, yet when you use a normal laptop you can barely pickup the signal outside of the parking lot.
Most routers have a reset to factory default button on the back. If you forget the password, hit the reset. Anyway, it’s a free country...
Well, if they get past the router with packet-monitoring then good luck to them. :-)
Understood, but better than the rest. You still have to get the address of the prime wireless (its own) and that means you’ve been able to decrypt what it puts out anyway, right?
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.