<p>The thing is that WPA2 not only relies on not-ancient hardware, but also compliant hardware. WPA2-PSK support is fairly common, and most people will find that as being their weakness due to generally weak passwords. Most people still run WEP, and do not change their network SSID from its default.</p>
<p>The only provable way to secure a wireless network thay has sensitive information on it (in the sense that you would not want someone stealing the data on your network because you could be sued or whatever) is to use strong encryption and access control. A VPN provides both, depending on what type of VPN is being used. And it will work with very old WiFi hardware, too, which is a plus for many people I know.</p>
<p>It does require more setup... but for many reasons it is worth it if your wireless network is for more than just guest use. And you won't get your Internet shut off because they were able to come in as a guest and send out all sorts of things your ISP doesn't like.</p>
<p> --- Mike</p>
<p>--<br>
Sent from my ADP1 Phone running Cyanogen</p>
<p><blockquote type="cite">On Jan 3, 2010 11:54 PM, "Pat Regan" <<a href="mailto:thehead@patshead.com" target="_blank">thehead@patshead.com</a>> wrote:<br><br><p><font color="#500050">On 01/03/2010 11:10 PM, <a href="mailto:wolf@wolfhalton.info" target="_blank">wolf@wolfhalton.info</a> wrote:
> What is the solid range of 802.11a..g? or eve...</font></p>That might be the limit with your stock antenna and transmitter. This<br>
'sniper rifle' wifi antenna claims to be able to connect at 10 miles:<br>
<br>
<a href="http://www.theregister.co.uk/2004/08/03/wi-fi_aerial_gun/" target="_blank">http://www.theregister.co.uk/2004/08/03/wi-fi_aerial_gun/</a><br>
<br>
DIY pringles cantennas are cheap and get great range.<br>
<p><font color="#500050">
> If you route the cables discretely, your wives probably wouldn't
> complain too long.
</font></p>I'm sure not going to haul a cable out every time I want to take the<br>
laptop out to the couch. Wifi also comes in handy for our cell phones.<br>
<p><font color="#500050">
> Put your WAP on a VLAN that has no access to the wired core, and then
> your (legitimate) guests ...</font></p>As far as I know, the only attacks on WPA2+AES are brute force<br>
dictionary attacks. If you have a strong random password and disable<br>
TKIP you should be in very good shape.<br>
<font color="#888888"><br>
Pat<br>
</font><p><font color="#500050">
_______________________________________________
Ale mailing list
<a href="mailto:Ale@ale.org" target="_blank">Ale@ale.org</a>
<a href="http://mail.ale.org/ma." target="_blank">http://mail.ale.org/ma.</a>..</font></p></blockquote></p>