![]() |
Re: Concerned about "Piggybackers".
While you're at it - setting up security (if not already done) make sure that you change the routers default admin password too. ;)
|
Re: Concerned about "Piggybackers".
Another simple solution, if your router has a 'Attached Devices' option check what devices are connected.
You should know what devices are yours. |
Re: Concerned about "Piggybackers".
Quote:
Quote:
Quote:
"For example, a 15 character password made up of uppercase, lowercase, digits and common punctuation is highly resistant to a brute-force attack. Even at the rate of 100,000,000 password attempts a second, cracking that could take 3.5 x 10^12 years." Anyone with the patience and the technology to bruteforce a good WPA2 password (if such a person existed) will find MAC spoofing incredibly trivial to circumvent. In this situation it provides no backup whatsoever - nobody is going to go to the trouble of cracking a WPA2 password and then give up when they see there's MAC filtering to workaround. Quote:
|
Re: Concerned about "Piggybackers".
It could be that the op is being forced to disconnect to allow data for the dictionary attack to occur, however as Ed mentioned, using a random password with WPA or WPA2 is enough
I also agree that MAC filtering is useless and probably dangerous, giving a false sense of security : http://blogs.zdnet.com/Ou/?p=43&tag=col1;post-127 , number one in the list of six dumbest ways of securing a wireless network. I use a 32 character randomly generated key and keep it on a USB key and transport that between computers while setting them up. It's worth noting that a ten character password would take 400~ years to crack with a single PC. Never use christian/surnames either as keys since there's plenty of dictionary lists that have comprehensive coverage of names. http://www.yellowpipe.com/yis/tools/.../generator.php is a WPA key generator if you don't feel random enough ~ |
Re: Concerned about "Piggybackers".
i never secure my connection and rarely get any one on it BUT if you don't want people on there just follow the security set up guide for your router they are mostly fairly easy to follow with the hardest part being deciding on your password
long password and frequent changes too there are some rather easy to use programs out there that can break these codes rather quicker than that 400 years ;) |
Re: Concerned about "Piggybackers".
Quote:
And what programs? WEP is relatively easy to crack (although still more difficult than MAC filtering) because the alorithm used to generate the encryption keys is borked. WPA2, which is what most people are recommending, is as far as I know still considered secure. If you know of software that can crack WPA without using a bruteforce approach (which would be the only way of doing it in a reasonable time period with current (and probably future) technology) I'd like to know. Examples please! Ed |
Re: Concerned about "Piggybackers".
Quote:
|
Re: Concerned about "Piggybackers".
Quote:
Ed. |
Re: Concerned about "Piggybackers".
Quote:
Silly man and you would never know until the Police smash down your door. Silly man indeed. Fantastic advice! WTP |
Re: Concerned about "Piggybackers".
Quote:
|
Re: Concerned about "Piggybackers".
Quote:
and ? 1 no mater what people try to tell you you wont be responsible unless it can be shown you knew they were doing so 2 if tons was being downloaded i would soon notice when i checked the modem logs 3 as i have loads of computers coming and going i really cant be bothered to have to set it up for each one and BT think its a great idea http://www.btfon.com/ |
Re: Concerned about "Piggybackers".
I must confess..I was a piggybacker once..several times in fact
I blame my youth, and my parents. And of course, everyone did it, you got bored..someone shouted "war" Next thing you know, if you were lucky, someone jumps on your shoulders and fighting ensued. i'm not going to apologise..I enjoyed..:) |
All times are GMT +1. The time now is 22:39. |
Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2025, vBulletin Solutions Inc.
All Posts and Content are © Cable Forum