On 2018-09-16 1:45 p.m., David Collier-Brown via talk wrote:
I have a Rogers-supplied router and cable modem package, which twice has shown significant usage when I was out, once with the original unit and once with their replacement Cisco. That makes me suspicious of the current state of authentication for wi-fi schemes (and I use the term "schemes" advisedly: they used to horribly leaky (;-))
What's a good approach? I have considered
- MAC address lists,
- no wi-fi (strictly wired doesn't work with solid concrete walls),
- a second router with a more secure protocol (is there such a protocol? And will my wife's Mac speak it?))
- something I haven't thought of
--dave
I've set up MAC address lists, after a surprising number of
reboots to unwedge the router (did I even mention I hate flaky
PC-style software?).
How can my hacker avoid them? Wait until my wife's Mac drops off-line and steal her MAC?
--dave
-- David Collier-Brown, | Always do right. This will gratify System Programmer and Author | some people and astonish the rest davecb@spamcop.net | -- Mark Twain