Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Use WPA2, not WEP(vanity)
self | 1/27/2013 | Self

Posted on 01/27/2013 10:23:07 AM PST by Signalman

I was viewing some of my neighbors' wi-fi connections on my tablet computer and noticed that most are using the outdated WEP network security standard. This was deemed to be insecure a decade ago and was replaced by the WPA and, later, the WPA2 security standard.

Someone in "listening range" of a wi-fi hotspot using the WEP encryption standard could, potentially, break into the network relatively easily and disrupt it.

Many internet service providers (ISP) still provide WEP as the default, but they are now required to also provide WPA.

So it is a good idea to insure that your current wi-fi security standard is WPA, WPA2 or WPA2/PSK. This can be done using the software provided by your ISP.


TOPICS: Computers/Internet
KEYWORDS: wep; wpa; wpa2
Navigation: use the links below to view more comments.
first 1-2021-30 next last

1 posted on 01/27/2013 10:23:12 AM PST by Signalman
[ Post Reply | Private Reply | View Replies]

To: Signalman

All wireless can be hacked with free software available on the internet.

WEP is far easier to hack.


2 posted on 01/27/2013 10:30:52 AM PST by driftdiver (I could eat it raw, but why do that when I have a fire.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: driftdiver

“All wireless can be hacked with free software available on the internet”

True, but its sort of like securing a safe. You can use a cheap, flimsy lock or a heavy padlock. Both can be violated. It´s just that the former makes it a lot easier.


3 posted on 01/27/2013 10:39:06 AM PST by Signalman
[ Post Reply | Private Reply | To 2 | View Replies]

To: Signalman
Every once in a while my modem goes out and I have to reboot. In my XP, I have to choose from a number of wireless sources, mostly security-laden neighbors wifi.

However, every now and then, one of the optional wifi selections says "TSA Security, Region 7 (WPA)".

4 posted on 01/27/2013 10:44:51 AM PST by Zuben Elgenubi
[ Post Reply | Private Reply | To 1 | View Replies]

To: Signalman

Security comes in various forms. For some of us, it you are in range to intercept the router signal, you are also in reach out and touch you range.


5 posted on 01/27/2013 10:46:41 AM PST by Truth29
[ Post Reply | Private Reply | To 1 | View Replies]

To: Zuben Elgenubi

A neighbor with a sense of humor?


6 posted on 01/27/2013 10:55:55 AM PST by Nita Nupress
[ Post Reply | Private Reply | To 4 | View Replies]

To: Signalman

This is exactly why I have never trusted wifi from day one. I still use hard-wired networking and always will. Did I have to make holes in walls? Yes. Did I have to crawl through the attic? Yes. Did I get tired and sweaty? Yes, but my network is secure! :-)


7 posted on 01/27/2013 11:02:27 AM PST by spel_grammer_an_punct_polise (Learn three chords and you, too, can be a Rock Star!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Zuben Elgenubi
The other option to name your wifi connection so others will leave it alone is "FBI surveillance van"

CC

8 posted on 01/27/2013 11:12:41 AM PST by Celtic Conservative
[ Post Reply | Private Reply | To 4 | View Replies]

To: Signalman

Good advice. But as others are saying, given enough time wifi can/will be hacked.

My password is pretty strong too. I took a sha1 hash of some random file I had on my thumbdrive and use the output for a password. I figure if I make it hard enough to break, they will move on to easier pickings.

Here’s a very good article on the subject:
http://arstechnica.com/security/2012/08/wireless-password-easily-cracked/


9 posted on 01/27/2013 11:16:04 AM PST by 3Fingas (Sons and Daughters of Freedom, Committee of Correspondence)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Signalman

Throughput on many of the older routers had difficulty handling the extra overhead associated with WPA2 or WPA2/PSK, especially when accomodating several clients or streaming video. Since WiFi routers have proven remarkably sturdy (compared to a lot of other comparable computer gear) people tend to keep what they’ve got until it breaks. So it was easier for them just to leave things alone.

You are absolutely correct - with the increased performance and features available in current routers, there is no reason not to adopt a more secure security schema.


10 posted on 01/27/2013 11:26:06 AM PST by rockrr (Everything is different now...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: spel_grammer_an_punct_polise

I use MAC address filtering in addition to password for the wifi. If your machine MAC address isn’t on the list, it never even gets a chance to enter a password.


11 posted on 01/27/2013 11:34:27 AM PST by Gaffer
[ Post Reply | Private Reply | To 7 | View Replies]

To: Gaffer

You can’t stop the signal...there is no security...just making yourself a harder target....mac spoofing

http://www.securitytube.net/video/433


12 posted on 01/27/2013 11:48:30 AM PST by 3Fingas (Sons and Daughters of Freedom, Committee of Correspondence)
[ Post Reply | Private Reply | To 11 | View Replies]

To: driftdiver

True, but a WPA2 protected network with a secure password (not “password” or “ABC123”) is theoretically crackable, but for practical purposes beyond the ability of average hackers.


13 posted on 01/27/2013 12:01:07 PM PST by Astronaut
[ Post Reply | Private Reply | To 2 | View Replies]

To: Astronaut

” theoretically crackable, but for practical purposes beyond the ability of average hackers.”

It just takes longer as the software needs a large sample size. WPA is better of course, just saying don’t use wireless networking and expect it to be secure.


14 posted on 01/27/2013 12:03:25 PM PST by driftdiver (I could eat it raw, but why do that when I have a fire.)
[ Post Reply | Private Reply | To 13 | View Replies]

To: Signalman

My router is wide open. I don’t use a key. It’s too much trouble when people come over. I can’t even connect to it from the garage and my neighbors are too far to tap in. I check the logs periodically and no one has ever tried.


15 posted on 01/27/2013 12:06:07 PM PST by AppyPappy (You never see a massacre at a gun show.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Signalman

bflr


16 posted on 01/27/2013 12:07:21 PM PST by sauropod (I will not comply)
[ Post Reply | Private Reply | To 1 | View Replies]

To: AppyPappy

Bad idea. You should always use some sort of encryption and just provide a key to your guests on a thumbdrive. Very easy to do and it will save your butt. You don’t want people using your connection to surf for things that could get you in trouble. Just saying....


17 posted on 01/27/2013 12:24:29 PM PST by 3Fingas (Sons and Daughters of Freedom, Committee of Correspondence)
[ Post Reply | Private Reply | To 15 | View Replies]

To: spel_grammer_an_punct_polise

Until you tie it to the internet - at which point you are vulnerable. Just like Wep/WAP - it’s just the time it takes to get through and the skill level required that is the question.


18 posted on 01/27/2013 1:52:37 PM PST by fremont_steve
[ Post Reply | Private Reply | To 7 | View Replies]

To: Gaffer

This is a GOOD piece of advice! It IS possible to do MAC spoofing, but you have to know what they are too. If someone can decrypt your Wireless stream they likely can pull the MAC addresses out too. It is one more point in raising the bar to being hacked though.


19 posted on 01/27/2013 1:54:41 PM PST by fremont_steve
[ Post Reply | Private Reply | To 11 | View Replies]

To: AppyPappy

So, someone does some wardriving with a very sensitive WIFI adapter and finds your open network. Not only are they hackers, but they’re also pedophiles and use your network to download kiddy porn. Next thing you know, the FBI is crashing through your door, and you’re on the local news all the while protesting your innocence.

They search all your computers and don’t find anything incriminating. A year later, on page g20, there’s a little ‘correction’ that says you were cleared of all charges but no one sees that or even if they do, they still think you’re guilty.

Checking the logs is locking the barn door after the horse is long gone.

At least add a password.


20 posted on 01/27/2013 1:59:50 PM PST by Lx (Do you like it, do you like it. Scott? I call it Mr. and Mrs. Tennerman chili.)
[ Post Reply | Private Reply | To 15 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-30 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson