Now my brother has gotten a Linksys AP and wants to use WEP with his Mac. The Linksys offers 64 or 128 bit WEP, but I believe the Mac wants 40 or 104 bit "passwords". Should he establish a 15 character key and enter those characters in as the Mac password? This Mac stuff is easy! Mike Ellsworth StratVantage Consulting, LLC Helping Successful Companies Make Winning Technology Decisions 8273 Westwood Hills Curve St. Louis Park, MN 55426 952-525-1584 mellsworth at stratvantage.com www.StratVantage.com www.TheWiFiGuys.com They that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety. Ben Franklin, ~1784 -----Original Message----- From: tcwug-list-admin at tcwug.org [mailto:tcwug-list-admin at tcwug.org]On Behalf Of Mike Ellsworth Sent: Friday, August 15, 2003 6:26 PM To: tcwug-list at tcwug.org Subject: RE: [TCWUG] Airport/XP problem "BTW - did you ever get your Airport/XP problem ironed out, if so, what was the trick ?" Nope. Haven't been back at it. But now my friend complains that the Airport keeps dropping the XP machine. And I haven't found the XP utility for the Airport due to lack of time. Mike Ellsworth StratVantage Consulting, LLC Helping Successful Companies Make Winning Technology Decisions 8273 Westwood Hills Curve St. Louis Park, MN 55426 952-525-1584 mellsworth at stratvantage.com www.StratVantage.com www.TheWiFiGuys.com They that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety. Ben Franklin, ~1784 -----Original Message----- From: tcwug-list-admin at tcwug.org [mailto:tcwug-list-admin at tcwug.org]On Behalf Of Andy Warner Sent: Friday, August 15, 2003 6:09 PM To: tcwug-list at tcwug.org Subject: Re: [TCWUG] Re: Why secure your WLAN? Mike Ellsworth wrote: > Regarding the assertion that companies don't want to know about security > vulnerabilities: > > Thirty-one percent of executives surveyed by Jupiter Research cited low > network security as the number one barrier to deployment of WLANs, their top > concern centering on rogue users accessing the corporate network from > outside the corporation. So that's 31% of the population that's unlikely to show up in your kismet log. A large proportion of the other 69% might have WLANs deployed by IT folks who are *very* unlikely to appreciate you turning up on their doorstep implicitly saying "you're incompetant" (which is how the pointy-haired types will intepret your intervention.) I agree with those that suggest that if you regard this as a problem (and there's obviously more than 1 school of thought on that); education is the answer - it's just a fairly long (and unprofitable) process. Don't look for people to answer the door with a look of grateful relief (or with their checkbook already open.) IMHO, things like kismet logs are useful at two extrememly different levels: 1. tracking down a particular problem (like the coverage of node x, the source of interference, etc.) 2. at the level of aggregated statistics (overall percentage of secure/insecure APs, rate of deployment, AP density per unit area, residential vs. commercial, making pretty maps, etc.) To me, they seem of limited use between these two extremes. BTW - did you ever get your Airport/XP problem ironed out, if so, what was the trick ? -- andyw at pobox.com Andy Warner Voice: (612) 801-8549 Fax: (208) 575-5634 _______________________________________________ Twin Cities Wireless Users Group Mailing List - Minneapolis/St. Paul, Minnesota http://www.tcwug.org tcwug-list at tcwug.org https://mailman.real-time.com/mailman/listinfo/tcwug-list _______________________________________________ Twin Cities Wireless Users Group Mailing List - Minneapolis/St. Paul, Minnesota http://www.tcwug.org tcwug-list at tcwug.org https://mailman.real-time.com/mailman/listinfo/tcwug-list _______________________________________________ Twin Cities Wireless Users Group Mailing List - Minneapolis/St. Paul, Minnesota http://www.tcwug.org tcwug-list at tcwug.org https://mailman.real-time.com/mailman/listinfo/tcwug-list