<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
</head>
<body text="#000000" bgcolor="#FFFFFF">
<p>On 2018-09-16 1:45 p.m., David Collier-Brown via talk wrote:<br>
</p>
<blockquote type="cite"
cite="mid:9ac61071-1983-0216-3c15-ef04bd433f23@rogers.com">
<meta http-equiv="content-type" content="text/html; charset=UTF-8">
<p>I have a Rogers-supplied router and cable modem package, which
twice has shown significant usage when I was out, once with the
original unit and once with their replacement Cisco. That makes
me suspicious of the current state of authentication for wi-fi
schemes (and I use the term "schemes" advisedly: they used to
horribly leaky (;-))</p>
<p>What's a good approach? I have considered<br>
</p>
<ul>
<li>MAC address lists, <br>
</li>
<li>no wi-fi (strictly wired doesn't work with solid concrete
walls), </li>
<li>a second router with a more secure protocol (<i>is</i> there
such a protocol? And will my wife's Mac speak it?))</li>
<li>something I haven't thought of<br>
</li>
</ul>
<p>--dave</p>
</blockquote>
<p>I've set up MAC address lists, after a surprising number of
reboots to unwedge the router (did I even mention I hate flaky
PC-style software?). <br>
</p>
<p>How can my hacker avoid them? Wait until my wife's Mac drops
off-line and steal her MAC?</p>
<p>--dave<br>
</p>
<pre class="moz-signature" cols="72">--
David Collier-Brown, | Always do right. This will gratify
System Programmer and Author | some people and astonish the rest
<a class="moz-txt-link-abbreviated" href="mailto:davecb@spamcop.net">davecb@spamcop.net</a> | -- Mark Twain
</pre>
</body>
</html>