Jump to content
xisto Community

JohnDoe

Members
  • Content Count

    6
  • Joined

  • Last visited

  1. Hello,

    My name is Rita, i saw your profile today and became interested in you,i will also like to know you more,and i want you to send email to my email address so i can give you my picture for you to know whom i am and tell you more about myself, here is my email (ritaandrew023@yahoo.com) address i believe we can move from here .I am waiting Thanks Rita.

  2. Nice. I could have done something similar at my most recent residence, but alas, the apartment complex was filled with trolls and rejects who felt that 16 clients torrenting over my Comcast Business Class was just being neighborly. My connection frequently exploded, and eventually I just said screw it and secured the whole shebang. So in essence, yes, in some environments it is possible to provide a free and open access point for random passerby, but in densely populated, somewhat malignant locations, a bit of strategy is required, even though you kind of went over the top to create a bulletproof rural wireless network. Anyhow, see you all tomorrow. -JD
  3. WPA (and WPA2) Keys should always be generated and retardedly difficult to remember. You only need to configure the network once, add computers sometimes, etc. Most Linksys routers and many other routers I've seen allow you to access the key through administration (which should only be accessible from a physically connected computer, check your settings), so you could retrieve it in the case of a new computer on the network, or a similar occasion. WPA2 with a PSK encrypted via AES has only two attack vectors: * Intercepting the handshake (nearly friggin impossible [so much so that it's essentially only theoretical]). and * Dictionary attacking the PSK. Regardless, you should always use the absolute strongest key you can, such as one from https://www.grc.com/passwords.htm or a similar generator site. You then configure all of your computers, add AP Isolation if you don't plan to use file/printer sharing, and MAC Address Filtering for a final layer of security. After all of this, you disable SSID Broadcast (make sure to use a complicated SSID as well, it factors into overall security, though I'm a huge fan of 'BDSM Image Host' just to freak out the snoops), use a spectrum analyzer to verify that you are on the channel with the lowest average amount of traffic, and Ta-da, you now have the most secure network you can manage without implementing a RADIUS key-exchange system. This is one of those moments where one could say, "And that's how it's done." -JD
  4. The point I was getting at was relevant to this specific user's needs, not to some extraneous storyline. If you're punching through nothing but a single wall, with no intervening microwaves, refrigerators or nuclear holocausts, it won't ratchet the speed down at all. That means at 54Mbps with >90% efficiency you're probably getting 1-3ms pings to the router, if not <1ms. Your average ISP will give you anywhere from 768k Up to 18Mbps upload with pings ranging from 20ms to 130ms. Thus that 1ms leads to 1/60th of your lag, which is tiny by any standards and almost can't be beaten by a hard line. The variance in ISP quality, services, and speed make is a major deciding factor in this particular situation, while the 1ms additional ping for being wireless is most likely not causing a huge issue for him. Also, even though most routers have on-chip encryption cores for WPA2, it does tend to slow things down a minuscule amount. So does MAC Filtering. So if you're all for 'balls-to-the-wall' speed, I'd leave both disabled and stop broadcasting your SSID, as that generates no overhead, considering it's mainly used to initiate the connection. In regards to the original poster, is your machine multi-core? Is apache running on all cores? That speeds up retrieval a smidgen. Other than that, I was asking about your ISP because with DSL, since it's dedicated bandwidth, another line will double your upload, and with cable, you would have to pay for a hosting rate, probably a business package or some noise. -JD
  5. Thank you. I hope to be as useful as possible.
  6. I've had situations wherein I wander around with a PSP, periodically searching for open networks, especially those running SAMBA with file-sharing all over the place. I later return with my netbook, secure it, change their background to the new, secure information, (a .jpg made with paint), and go on my way.I've probably done this exact operation 20-30 times since I got my netbook.I like to think that I've made some good in the world for insecure people who lack the motivation or knowledge to perform the tasks themselves.
  7. What ISP are you using (Company/Type/Speed)? Also, at >90% efficiency on your Wireless G, you're already surpassing the speed of most domestic ISP connections, making the lag between the router and server nearly non-existent. Because of this, you're unlikely to see any noticable gains after adding a cord, unless you have a microwave or a fridge in between the two. -JD
  8. I'm a lot less concerned about the death of innovation and imagination when it comes to Google. They've done some silly things in the past, but they have a ridiculously good track record for pouring money into any pursuit that seems even remotely inspiring. Microsoft, on the other hand, seems much more interested in the profitability of potential projects, though they have been known to break this mold from time to time. I honestly think that the rampant profitability of Google, Inc. is doing more good than harm. -JD
  9. Uhm. JD is an anonymity junkie. John Doe, an name used since Medieval England to represent an unknown, seemed a fitting choice of moniker to represent my pseudonymity.That's about it.-JD
  10. Good afternoon everyone, I'm JD.I'm new to this region of the internet, so I'd like to take a moment to wave at all of you. :wave:I'm a self-proclaimed anonymity nut from Washington, USA, seeking nothing but knowledge, and always striving to disseminate rational thought and free thinking.Feel free to ask me things. -JD
×
×
  • Create New...

Important Information

Terms of Use | Privacy Policy | Guidelines | We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.