Welcome to the GoFuckYourself.com - Adult Webmaster Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content and access many other special features. Registration is fast, simple and absolutely free so please, join our community today!

If you have any problems with the registration process or your account login, please contact us.

Post New Thread Reply

Register GFY Rules Calendar
Go Back   GoFuckYourself.com - Adult Webmaster Forum > >
Discuss what's fucking going on, and which programs are best and worst. One-time "program" announcements from "established" webmasters are allowed.

 
Thread Tools
Old 05-29-2004, 05:56 PM   #1
AaronM
GFY Royality ;)
 
AaronM's Avatar
 
Industry Role:
Join Date: Oct 2001
Location: ┌∩┐ ◣_◢ ┌∩┐
Posts: 46,921
Lets talk about wireless security.

Currently I have my wireless router set for 128bit WEP encryption as well as using the MAC address filter.

The WEP makes me feel a bit more secure but it clearly slows down the connection and it tends to drop the connection from time to time.

Are both nevessary? I would think that the MAC filter alone would be enough but since I am not very well versed in these things.....I thought I would run it by a few of you highschool kids.
AaronM is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 05-29-2004, 06:00 PM   #2
xxxoutsourcing
Confirmed User
 
Join Date: Oct 2003
Posts: 3,888
From what i have been told the MAC filter is enough, lets hear it..
Only thing that can be seen is the wireless network within range.

Intresting question Aaron.
__________________

xxxoutsourcing.com
ICQ:119936 | Aim:xxxoutsourcing | MSN:msn@ xxxoutsourcing.com | Yahoo:xxxoutsourcing
Submitters, Designers, Programmers, Cartoonist, Creative Writers, Video & Photo Editors
Convert your Paysite into a cartoon site convert2toons.com
xxxoutsourcing is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 05-29-2004, 06:02 PM   #3
Juicy D. Links
So Fucking Banned
 
Industry Role:
Join Date: Apr 2001
Location: N.Y. -Long Island --
Posts: 122,992
blowfish encryption
Juicy D. Links is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 05-29-2004, 06:02 PM   #4
AndrewKanuck
Confirmed User
 
Join Date: Jan 2004
Location: Cleveland & Atlanta
Posts: 6,706
MAC's can be cloned - but do people within range of your AP care enough to be doing that much digging around so they can access your wireless network?

It's enough for an AP.
__________________
AndrewKanuck is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 05-29-2004, 06:03 PM   #5
cyberpunk
Confirmed User
 
Join Date: Feb 2001
Posts: 1,377
Depends on what you need to protect. If you are pulling CC info, your own to buy stuff, or clients then I'd leave the WEP in place and for those of you doing things that that Uncle Sam would beintrested in don;t be fooled by 128bit crypto it doesn't protect you worth a shit if someon really wants to see what your doing.

If anyone wants info on real secure crypto stuff ping me on ICQ
__________________
POST NO ADS!
cyberpunk is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 05-29-2004, 06:09 PM   #6
fris
Too lazy to set a custom title
 
fris's Avatar
 
Industry Role:
Join Date: Aug 2002
Posts: 55,436
good document i have by internet security systems

http://www.dreambigmedia.com/wireless_security.pdf

goes over a lot of stuff
__________________
Since 1999: 69 Adult Industry awards for Best Hosting Company and professional excellence.


WP Stuff
fris is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 05-29-2004, 06:12 PM   #7
xxxoutsourcing
Confirmed User
 
Join Date: Oct 2003
Posts: 3,888
Quote:
Originally posted by juicylinks
blowfish encryption
412 or summot, tooooo slow man...
or am i wrong?
__________________

xxxoutsourcing.com
ICQ:119936 | Aim:xxxoutsourcing | MSN:msn@ xxxoutsourcing.com | Yahoo:xxxoutsourcing
Submitters, Designers, Programmers, Cartoonist, Creative Writers, Video & Photo Editors
Convert your Paysite into a cartoon site convert2toons.com
xxxoutsourcing is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 05-29-2004, 06:13 PM   #8
xxxoutsourcing
Confirmed User
 
Join Date: Oct 2003
Posts: 3,888
Quote:
Originally posted by egonetworks
MAC's can be cloned - but do people within range of your AP care enough to be doing that much digging around so they can access your wireless network?

It's enough for an AP.
Educated, thank you.... did not know that.
__________________

xxxoutsourcing.com
ICQ:119936 | Aim:xxxoutsourcing | MSN:msn@ xxxoutsourcing.com | Yahoo:xxxoutsourcing
Submitters, Designers, Programmers, Cartoonist, Creative Writers, Video & Photo Editors
Convert your Paysite into a cartoon site convert2toons.com
xxxoutsourcing is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 05-29-2004, 06:15 PM   #9
OzMan
Confirmed User
 
OzMan's Avatar
 
Join Date: Sep 2003
Location: Los Begas
Posts: 9,162
Did you see that recent story about the news reporters who flew over LA with a wireless laptop and were able to access several thousand home and business wireless networks!

So for the moment anyhow it seems there are more than enough easy targets for wireless hackers without them bothering to go after the harder encrypted networks.
OzMan is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 05-29-2004, 06:19 PM   #10
AndrewKanuck
Confirmed User
 
Join Date: Jan 2004
Location: Cleveland & Atlanta
Posts: 6,706
Quote:
Originally posted by xxxoutsourcing
Educated, thank you.... did not know that.
Just takes a network card with a flashable PROM chip and someone with a prom writer. I've got one laying around as I used to code ASM onto 8031 chips...we toy'd around with Cloning mac's back when we were coding out firewall software for our wireless isp.
__________________
AndrewKanuck is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 05-29-2004, 06:37 PM   #11
erehwon
Confirmed User
 
erehwon's Avatar
 
Industry Role:
Join Date: Nov 2003
Location: A secure undisclosed location...
Posts: 3,759
Quote:
Originally posted by AaronM
Currently I have my wireless router set for 128bit WEP encryption as well as using the MAC address filter.

The WEP makes me feel a bit more secure but it clearly slows down the connection and it tends to drop the connection from time to time.

Are both nevessary? I would think that the MAC filter alone would be enough but since I am not very well versed in these things.....I thought I would run it by a few of you highschool kids.
The enviroment I come from works with the belief that if you want to insure the security of the information on your network, avoid using wireless.

With that said, if you insist on using wireless, make your network more of a challenge for the random hacker to give up wanting to access your network and find an easier mark.

One of the better FAQ's can be found at Michigan Wireless' Wireless Networking Basic Security Checklist.
__________________
Money NEVER $leep$...
erehwon is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Post New Thread Reply
Go Back   GoFuckYourself.com - Adult Webmaster Forum > >

Bookmarks



Advertising inquiries - marketing at gfy dot com

Contact Admin - Advertise - GFY Rules - Top

©2000-, AI Media Network Inc



Powered by vBulletin
Copyright © 2000- Jelsoft Enterprises Limited.