"Anon" (tjsielsistneb)
03/06/2015 at 20:48 • Filed to: None | 0 | 17 |
What is the toughest encryption you know of? Even though I changed the password twice someone keeps using software to figure it out. I'm willing to get a new modem if necessary! I'm just tired of this! I need something hevily ecypted! Wpa isn't cutting it!
E. Julius
> Anon
03/06/2015 at 20:49 | 0 |
WPA 2?
Sportwägen, Driver Of The Red Sportwagen
> Anon
03/06/2015 at 20:51 | 0 |
Change the name of the network (SSID) and make it "not visible" but not in this order...
Also, WPA2.
Übel
> Anon
03/06/2015 at 20:52 | 0 |
http://www.ex-parrot.com/pete/upside-do…
McMike
> Anon
03/06/2015 at 20:57 | 1 |
What's happening? What makes you think someone is getting in your network?
Jonathan Harper
> McMike
03/06/2015 at 21:06 | 1 |
I'm also curious.
spanfucker retire bitch
> Anon
03/06/2015 at 21:12 | 3 |
Use WPA2. WEP and WPA no longer cut the mustard. WEP in fact is so weak you might as well not even secure the router, and WPA is simply an old standard.
Do not even bother with hiding your WiFi or enabling MAC Address filtering. Those absolutely worthless and beyond trivial to crack.
Most importantly, you need to choose a 20+ character randomized password AND DISABLE WPS.
I can not stress that last part enough. DISABLE. WPS. It is a known security flaw. Someone can crack into your system in minutes due to that. WPS only uses something like 8 numerical characters for its pairing. It can bypass your long, complex password.
Also, make sure they don't have access to your admin account. To be safe, disable your Wireless radio, attach to your router directly via ethernet, change your Admin username and password, adjust the settings I mentioned above, and turn the radio back on.
If he's still getting in after that, then go look up some guides online on how to set up a RADIUS server.
Anon
> Sportwägen, Driver Of The Red Sportwagen
03/06/2015 at 21:27 | 0 |
Did all of this! Lets see him take this on!
Katsumoto
> Anon
03/06/2015 at 21:45 | 0 |
I had this problem in my apartment. Figured out who it was, so I got on their machine with network sharing and gave them a very virus.
Since I've been cconnected by wire only, and my fiancee uses her mobile hot spot for wifi when she does use her tablet.
JGrabowMSt
> Anon
03/06/2015 at 22:12 | 0 |
MAC Address Filtering. Allow only devices you specifically add to the list. For poops and giggles you can leave it totally unsecured once its set up as well, because unless they have a MAC address on your routers approved list, it wont work.
Alternatively, WPA2 Enterprise takes a long time to crack. Downside is that the passwords are stupid long.
Also, if you can get the MAC address of the offending computer, you can block it. Its only partially effective though, because it is possible to spoof a MAC address.
I'll take 911 RS for $5000
> JGrabowMSt
03/06/2015 at 22:21 | 0 |
Please don't rely just on MAC address filtering. Like you said, it's possible, and really not that difficult, to spoof a MAC address. I'm fairly sure Backtrack has it automated so you could get around MAC address filtering in a few hours at most.
JGrabowMSt
> I'll take 911 RS for $5000
03/06/2015 at 22:27 | 0 |
Well, theres block and allow. When youre serious about doing MAC address filtering you would allow a specific list only. When you try to just block devices, thats when you run into trouble. In enterprise firewalls its the difference between positive and negative reinforcement for traffic control. Its not for the average user, and if you set it up wrong you could make it so you cant even use your own internet. Also best configured through a server rather than a dedicated router that handles your internet connection coming in.
Nibbles
> Anon
03/06/2015 at 22:39 | 0 |
MAC address filtering. A bit of a pain when setting up new devices on the wiffy but well worth the security
I'll take 911 RS for $5000
> JGrabowMSt
03/06/2015 at 22:53 | 0 |
Oh, I understand. I'm just saying that even a whitelist doesn't really provide that much security.
orcim
> Anon
03/07/2015 at 04:11 | 0 |
Some of the suggestions here are good. What's your access to the router? Can you hardwire initially? IE: plugin, turn on the wifi while home, when done, turn it off, then hardwire to turn it on again. Hidden SSID and WPA2 coupled with that, and we're tralkin' bingo nation.
Another option: most routers now allow you to determine wireless power levels. I have one that I don't want reaching another building so turned the power down from 271 mv to 20... it can only be picked up within 30 feet of source. Maybe yours can do that too? Unless you are in my structure physically, it's hard to get a signal.
brianbrannon
> Anon
03/07/2015 at 15:11 | 0 |
Certain routers are vulnerable to an internal pin built in to the firmware. No amount of password security will help. Only getting a new router will help. I have cracked Lynksis and Belkin routers this way.
gamefreak32
> Anon
03/07/2015 at 22:16 | 0 |
If they have the software, nothing will keep them out. WPA2 can be cracked in about 6-8 hours with a $600 software and a $300 graphics card.
CB
> Anon
03/09/2015 at 21:50 | 0 |
Really really long password that is random words thrown together. Ours is 53 characters long. Should make it harder to brute force.