
On 2018-09-16 1:45 p.m., David Collier-Brown via talk wrote:
I have a Rogers-supplied router and cable modem package, which twice has shown significant usage when I was out, once with the original unit and once with their replacement Cisco. That makes me suspicious of the current state of authentication for wi-fi schemes (and I use the term "schemes" advisedly: they used to horribly leaky (;-))
What's a good approach? I have considered
* MAC address lists, * no wi-fi (strictly wired doesn't work with solid concrete walls), * a second router with a more secure protocol (/is/ there such a protocol? And will my wife's Mac speak it?)) * something I haven't thought of
--dave
I've set up MAC address lists, after a surprising number of reboots to unwedge the router (did I even mention I hate flaky PC-style software?). How can my hacker avoid them? Wait until my wife's Mac drops off-line and steal her MAC? --dave -- David Collier-Brown, | Always do right. This will gratify System Programmer and Author | some people and astonish the rest davecb@spamcop.net | -- Mark Twain