Wireless routers are the current rage in mobile computing. WIFI hotspots are popping up all over, and the Futurelawyer thought it was time for a rudimentary discussion of the technology. In the last installment we discussed the inherent security of the NAT inside a typical router. But, what happens when you start shooting your network traffic around the house, office or coffee shop with radio waves? Naturally, any radio wave can be intercepted by someone with evil or curious intent. Thus, enter the standards for wireless security known as WEP, WPA, and other protocols. All you really need to know is that these are just one method of securing your signal, and that they operate by encrypting all traffic within the wireless network. WEP is outdated, and easily intercepted and read, so the Futurelawyer doesn't recommend it. WPA is relatively secure, but difficult to implement. Each computer on the network has to support the protocol, and a lot of older cards don't. The best thing you can do is layer your protection, and the Futurelawyer does this by telling the router to only accept traffic from wireless appliances with an approved MAC address. Every computer, and every card has a unique identifier, called the MAC address, and you can tailor your wireless network to those computers and cards only. Well, that is enough geek speak for one day, don't you think. Let's go earn a living.
Rick
Comments