On Mon, 2004-12-13 at 12:41 -0600, Mike Hord wrote: > Agreed. If you check out the link below, you can rate your PC's protection. On > my system at home, behind a standard off-the-shelf Linksys router, it comes > back as being nigh impervious to assault. > > https://grc.com/x/ne.dll?bh0bkyd2 I used to recommend that site, no longer. I recommend you do a search on Steve Gibson on usenet, his "advice" sometimes isn't as good as he thinks it is (and IMHO sometimes harbours a false sense of security). > My linksys is the sort with 802.11 built in, and to secure THAT I turned on the > MAC filter, telling it to ignore all devices other than the MACs that I specify. > Can't get much more secure than that, I'd imagine, since it's completely > passive and won't respond to anything from any other MAC. Unfortunately MAC filtering isn't much of a deterrent. If the person interested is running Linux it's a very trivial matter to sniff the network for a working MAC and then use that MAC. While it's true that it isn't possible to completely stop someone from accessing your network, I believe the best hope you have is to simply USE WEP, and rotate the keys. It's not perfect, but it'll deter most people out there. TTYL ----------------------------- Herbert's PIC Stuff: http://repatch.dyndns.org:8383/pic_stuff/ _______________________________________________ http://www.piclist.com PIC/SX FAQ & list archive View/change your membership options at http://mailman.mit.edu/mailman/listinfo/piclist