Go Back   IceInSpace > Equipment > Software and Computers
Register FAQ Calendar Today's Posts Search

Reply
 
Thread Tools Rate Thread
  #21  
Old 20-01-2013, 06:38 PM
AstroJunk's Avatar
AstroJunk (Jonathan)
Shadow Chaser

AstroJunk is offline
 
Join Date: Jan 2006
Location: Moonee Beach
Posts: 1,945
[QUOTE=deadsimple;937152]Sounds like a fairly strong recommendation that MAC filtering is all you need.
QUOTE]

Only if you ignore the previous post that recommended the addition of MAC filtering to WPA2. It was not my intention to mean MAC alone and thankfully the rest of humanity got the point
Reply With Quote
  #22  
Old 20-01-2013, 06:47 PM
supernova1965's Avatar
supernova1965 (Warren)
Buddhist Astronomer

supernova1965 is offline
 
Join Date: Aug 2009
Location: Phillip Island,VIC, Australia
Posts: 4,073
In AstroJunk's quote you edited out most of what AstroJunk said selective quoting is too often used to skew what was said by someone if you quote someone at least don't edit out some of what they say when it doesn't support your point it's disrespectful.
Reply With Quote
  #23  
Old 20-01-2013, 07:29 PM
deadsimple's Avatar
deadsimple (Ash)
Registered User

deadsimple is offline
 
Join Date: Sep 2008
Location: Brisbane
Posts: 180
Ah yes, diving into specific quotes now. Let me get my dissection kit

Quote:
Originally Posted by AstroJunk View Post
Only if you ignore the previous post that recommended the addition of MAC filtering to WPA2. It was not my intention to mean MAC alone and thankfully the rest of humanity got the point
In the previous post you're referring to, supernova1965 talks about "different security measures one is never enough" - note "measures" in plural.

Your reply started with "+1 for MAC address blocking", followed immediately by "That will all but sort out access to your network", and "funny how that article never mentions this basic and fairly robust security measure".

Note the specific mention and recommendation of MAC address blocking by you, singular reference to "security measure" and no mention of WPA2, which naturally leads one to assume you are praising MAC address blocking for being "fairly robust" - which it isn't. If you really did mean both then I apologise for not being able to mind-read <-- yes, humour involved as I'm not having a personal go at anyone.

Quote:
Originally Posted by supernova1965 View Post
In AstroJunk's quote you edited out most of what AstroJunk said selective quoting is too often used to skew what was said by someone if you quote someone at least don't edit out some of what they say when it doesn't support your point it's disrespectful.
Huh?? I don't know why you're saying that. There's nothing disrespectful nor sneaky about my edit. The second part of his post talked wireless security philosophy in general and sensitivity of what you're broadcasting (most of his points which I agree with) - which is not a line of discussion I am addressing nor intending to address in any of my posts.

My comments are about the implications of the security provided by WPA2 encryption. i.e. that since WPA2, the likelihood of being bruteforced with a good password is so remote compared to older standards (like WEP or WPA with TKIP), that extra security layers for home networks are mostly unnecessary and more of an annoyance for legitimate access. It's not like NCIS where all it takes is some whiz-kid with enough time in front of the keyboard to "crack" a network There's a strong and real mathematical basis behind WPA2, but of course if news of an exploit is released, then it'll be time to re-evaluate things and move onto a stronger standard. Until then ....

Think we need to calm down a bit before throwing accusations about people's posting intentions around

EDIT: I would like to add that for business for government networks, it is of course good practice to have extra authentication/encryption on top of regular WPA2 (MAC filtering is of course not one of them), as having all the encrypted traffic recorded by someone and decrypted 10-20 years down the track when it's more feasible to crack .. can really be almost as bad as having it decrypted and accessible now. Not really an issue for home users with the typical stuff they would have on their computers.
Reply With Quote
  #24  
Old 20-01-2013, 09:51 PM
tlgerdes's Avatar
tlgerdes (Trevor)
Love the moonless nights!

tlgerdes is offline
 
Join Date: Mar 2009
Location: Sydney
Posts: 2,285
Put it this way, if they wanted your information, they'ed get it, regardless of what wireless security you had.

1 find out where you hang out online, like ISS.
2 ingratiate themselves to your circle of friendship, ask for help on a few astro topics.
3 send you a malicious payload in PM tailored to the IT infrastructure you have previously told everyone about win/Mac/linux- click here and have a look a my website that describes my issue, or here is a PDF in which I have been keeping track of my problem.
4 Yhey now own your computer, they infect every all other devices they can on your network within 3 mins.
5 They tell all their software to go to sleep for 2 months.
6 They start up and collect your info and send it their C&C server at regular intervals.

And they did all of this from 10,000kms away from your "secured" wireless access point, and your Antivirus program didn't bleep once during the whole affair.
Reply With Quote
  #25  
Old 20-01-2013, 10:29 PM
AstroJunk's Avatar
AstroJunk (Jonathan)
Shadow Chaser

AstroJunk is offline
 
Join Date: Jan 2006
Location: Moonee Beach
Posts: 1,945
That reminds me Trevor, I've a great processing tip to share with you. Send me your email and I'll mail it straight away. Oh and BTW, what's your IP, mothers Maiden name and Bank sort code...

Reply With Quote
  #26  
Old 20-01-2013, 11:11 PM
deadsimple's Avatar
deadsimple (Ash)
Registered User

deadsimple is offline
 
Join Date: Sep 2008
Location: Brisbane
Posts: 180
Quote:
Originally Posted by tlgerdes View Post
Put it this way, if they wanted your information, they'ed get it, regardless of what wireless security you had.
Hah, nice post! Anyway I think on a home network, intruders are far more likely to be interested in just using your connection for downloading or for illegal activities. Though I've heard of some who just leeched and/or deleted movie/music collections from people's computers. Funny how many people don't care about security until their precious media gets touched
Reply With Quote
  #27  
Old 21-01-2013, 06:28 AM
tlgerdes's Avatar
tlgerdes (Trevor)
Love the moonless nights!

tlgerdes is offline
 
Join Date: Mar 2009
Location: Sydney
Posts: 2,285
Quote:
Originally Posted by AstroJunk View Post
That reminds me Trevor, I've a great processing tip to share with you. Send me your email and I'll mail it straight away. Oh and BTW, what's your IP, mothers Maiden name and Bank sort code...

You forgot to ask what sort of computer I use. No use sending me windows malware if I use a Mac.

Last edited by tlgerdes; 21-01-2013 at 06:46 AM.
Reply With Quote
  #28  
Old 21-01-2013, 06:37 AM
tlgerdes's Avatar
tlgerdes (Trevor)
Love the moonless nights!

tlgerdes is offline
 
Join Date: Mar 2009
Location: Sydney
Posts: 2,285
Quote:
Originally Posted by deadsimple View Post
Hah, nice post! Anyway I think on a home network, intruders are far more likely to be interested in just using your connection for downloading or for illegal activities. Though I've heard of some who just leeched and/or deleted movie/music collections from people's computers. Funny how many people don't care about security until their precious media gets touched
Likewise, the people who could break into your wireless would probably have a better internet service then you do, so leaching isn't their goal, and probably have downloaded all same movies as you have.

They would do it, just as you say, just to delete your media library and annoy you and leave you a message on you email from yourself telling you how to make your system more secure.

The old adage, you don't have to be the fastest person running away from the lion, just not the slowest.
Reply With Quote
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump


All times are GMT +10. The time is now 03:28 AM.

Powered by vBulletin Version 3.8.7 | Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
Advertisement
Bintel
Advertisement