GeneralThis forum is for non-technical general discussion which can include both Linux and non-Linux topics. Have fun!
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Introduction to Linux - A Hands on Guide
This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter.
For more advanced trainees it can be a desktop reference, and a collection of the base knowledge needed to proceed with system and network administration. This book contains many real life examples derived from the author's experience as a Linux system and network administrator, trainer and consultant. They hope these examples will help you to get a better understanding of the Linux system and that you feel encouraged to try out things on your own.
Click Here to receive this Complete Guide absolutely free.
PLEASE NOTE: All LQ Rules apply to the General forum. Flame wars, personal attacks, hostility, insults and behavior of that nature will not be tolerated. Differing opinions are one of the things that make this site great, but to benefit from differing opinions the discourse must happen respectfully and thoughtfully... without insult and personal attack. Members who are unable or unwilling to participate in General under those parameters will not be permitted to do so. If you see behavior of this nature please report it.
Hmmm... There is a small problem with it. Most of people don't use WEP, because it is well known, that it is not that secure. Nowdays people use WPA or WPA2 instead of WEP. Here is something from wikipedia: "WPA was created in response to several serious weaknesses researchers had found in the previous system, Wired Equivalent Privacy (WEP)" Here is the article on wikipedia.
Yeah, an unencrypted wireless network is really unsafe, just like a wired one is if somebody gets connected to it. A WEP-encrypted network is nowadays almost as unsafe, it takes just minutes to break the encryption and there it goes..WPA (TKIP/AES, whatever - there are several kinds of WPA encryption methods) is more secure, and at the moment considered somewhat 'secure', but I'm fairly sure it'll be breached in the future just like WEP was, and we'll have to move on to new encryption methods to be safe for a moment. It's bad for the old hardware, since unless you can upgrade your routers or other wireless devices, they're either garbage or hackers-welcome-site, but that's just how it goes.
I had to use WEP for a moment for my wireless network before I figured out how wpa_supplicant actually works for my card - after that I got WPA/AES encryption on, and feel a bit more secure for now. Not that I'd think it's really secure - but works for now, and in the end I don't have any sensitive material available on my pc (not to mention transferring it wirelessly) so it's ok. Sensitive material should never be placed on a machine that's accessible from outside your own fingers..not for long, anyway.
All you can do to secure your wireless network is to:
1: don't send the ESSID
2. turn on WPA encryption
3. use the router's MAC address filter function
(4. use a different transmission channel?)
That's all you can do to secure your wireless network.
Also, consider just how determined your opponent is actually likely to be.
A person who breaks in to a wireless link is probably just an opportunist: he's probably looking for one that is unsecure, and those are (of course) very easy indeed to find. In my experience, even good ol' WEP is more-than-enough to keep those casual interlopers out.
I don't run wireless either. It's just so much easier to have a ethernet cable lying at the front of my desk for my laptop.
If I were to go wireless I don't think I would rely on wireless encryption techniques. I would have an open unencrypted network with no router therefore isolated from other networks. I would then put a box on it with the only services listening on the wireless side a vpn daemon like openvpn and dhcpd. For the wireless network to be any use you would have to log in to the vpn. Could also use an open-ended ssh tunnel and configure apps to use it as a socks proxy to avoid setting up a vpn
Don't who your Internet provider is, but on free, there is a possibility to get WPA as an option on their site.
I dont know what you mean, actually, I am newbie.
I have a ethernet cable that I can plug to the wireless router. This ethernet cable will give internet to the wireless router. I do not know how to configure the wireless router so that the wpa is enabled.
then, that ll also be trick, next step, even more tricky to make it work with linux receiver box of wireless. I will have to install the wireless modules in the kernels ... uggr ... that wont be lot of fun.
I'd say that any wireless router that you can buy today at any office supply store will certainly support WPA2 encryption. And most Linux distros make it quite easy to configure and use it.
The essential improvement that WPA introduces is, of course, in the keying system: the hardware's encryption capabilities do not change (because one of the design directives for WPA was that it must run on existing hardware), but the cipher key will change fairly constantly, and it will be chosen randomly. It largely achieves its purpose of strengthening the system's resistance to ordinary attacks without requiring the purchase of new hardware.