Just your daily reminder to secure your router and WiFi.
>Change the default administrator username and password of your router. Use a strong password consisting of random upper/lower case letters, numbers, special characters and spaces e.g. z1HG b$%FV6% *O9 !n. If you fear you'll never remember such a password, at least create a password consisting of spaces and upper/lower case characters e.g. Cal I Co Red > >Check your routers settings to see if ‘Allow Incoming ICMP Echo Requests" is enabled. If it is, then disable it. Keep in mind to turn this back on should you need ISP tech support so they can find your router for testing. > >Disable UPnP access. That is, of course, only disable it if you have no need to use UPnP. UPnP is a huge security risk. Some ISP’s actually hide this setting in their router, such as Verizon FiOS. If you're a FiOS subscriber and use their Actiontec router you have to access the UPnP setting from a separate URL, which is listed on this web page... tumblr.theanomaly.net/post/57676730768/verizon-fios-actiontec-hidden-upnp-and-igmp-menus > >Use WPA2 for your WiFi security encryption. Again, use a secure password for your WiFi. > >If your router offers Wi-FI Protected Setup (WPS) see if you can disable it, since that is also a known vulnerability. However, this feature may not have an option to disable depending on the router manufacture and model. > >If you use a router issued by your ISP, check it's settings from time to time to ensure any automatic firmware updates didn’t change your secure settings. > >Change your passwords from time to time, and check your routers log to ensure only known devices are attaching to your network. > >You can test some of your routers security, such as UPnP and open ports at grc.com/shieldsup
i didnt fall off the turnip truck yesterday. remember the thing with the stockings or something. i have tested you thoroughly and this place is beyond a shadow of a doubt wired up.
Cameron Long
>>Change the default administrator username and password of your router. Use a strong password consisting of random upper/lower case letters, numbers, special characters and spaces e.g. z1HG b$%FV6% *O9 !n. If you fear you'll never remember such a password, at least create a password consisting of spaces and upper/lower case characters e.g. Cal I Co Red meh. i have my ap/switch management on a separate vlan with forwards blocked except from my pc/phone ip. my router has inputs blocked from inside/outside except from specific internal ips
Benjamin Richardson
My WiFi password is "correct horse battery staple". Router password is "admin". Why would I change anything?
Jason Reyes
>not living inawoods where nobody is physically close enough to get your WiFi connection
Nicholas Bell
>A Venezuelan techie apparently has set a new record for longest WiFi link. Networking guru Ermanno Pietrosemoli established a wireless connection between a PC in El Aguila, Venezuela, and one in Platillon Mountain, a distance of about 237 miles, mostly using off-the-shelf equipment and a few hacked parts.
cool
story
bro
Levi Long
>implying 2.4ghz can travel more than half a mile in the real world >implying a really strong transmitter on one end of a connection is all you need >implying you have any idea what your talking abkut >implying implications
Asher Allen
Why the fuck would you allow remote login to your router in the first place?
Jacob Bennett
>ssid broadcast disabled >only allowed macs can connect >router ui only available over https I don't even need to use a password for my WiFi or router.
Noah Murphy
I ssh into my router as a gateway in front of my other systems instead of exposing them all. It's a lot easier and less of a pain in the ass strictly securing one machine than all of them.
Ian Myers
>Use WPA2 for your WiFi security encryption.
How about just denying access based on device ID? If a device doesn't have a whitelisted MAC address, it can't establish a connection to your router.
Jordan Morales
mac addresses can be easily sniffed an spoofed. MAC authentication is absolutely worthless from a security standpoint.
Hudson Williams
>thinks MAC address filtering does fuck all You done triggered me good user.
Nathaniel Cox
Yeah if anyone wants to hide in the woods behind my house and fight off coyotes while browsing my internet the honestly I think they earned it.
Nicholas Johnson
well keked friend
pic related
Jackson Reed
why would you assume people can disable that on their shitty proprietary router software?
SSID broadcast is placebo MAC is placebo HTTPS is.. unrelated? I mean not bad for protecting your router password after someone spoofing a mac address breaks into your hidden wifi.
Angel Baker
>mac addresses can be easily sniffed an spoofed.
I can't see any of my neighbors being capable of sniffing out the MAC addresses of all of my respective wireless devices, much less even knowing how to change the MAC addresses on their own computers.
I manage a router for my family since we all live nearby, but they're frankly not computer literate enough to deal with the router having any form of wireless security. They somehow always manage to lose the password, then I have to go right back to their houses and "troubleshoot" for them. I've found it's easier just to restrict access to the router based on device ID.
Bentley Perez
Do you use static NAT entries instead of UPnP?
To be honest I can't really be bothered. As long as UPnP is isn't configurable via my WAN, I don't mind.
Jack Young
You literally listed all the weakest security features in router technology. Well done user.
Samuel Lewis
>I can't see any of my neighbors being capable of sniffing out the MAC addresses of all of my respective wireless devices
WARDRIVING motherfucker, look it up.
Fuck, I cant stand idiots who claim "my neighbors are too dumb to hack". You know all your neighbors within a couple mile radius?
Jayden Clark
>237 miles
Adrian Taylor
Wow, you are a goddamn fucking idiot. Anyone can see all your traffic in plaintext, you nimrod.
Anthony Morgan
u so mad at a pepepost
Julian Hill
>use WEP >make password less than 8 characters >Windows computers literally refuse to connect
Am I doing security right?
Cooper Perry
See
Anthony Ramirez
My router is so secure i can't get to it even with correct name and password
Jace Murphy
kek
Daniel Nguyen
>daily reminder
I must've missed yesterday's.
Daniel Cook
2.4ghz is physically incapable of traveling more than half a mile in the real world. Half a mile would be line of sight mostly. The tests like the one you quote use a different frequency, somewhere around 900mhz. Even 900mhz is only capable of going a few miles in real world scenarios.
Josiah Edwards
>couple mile
Are you retarded by any chance?
Lincoln Clark
Here is a very basic primer on the subject. Anyone who claims that 2.4ghz is capable of anywhere near a mile is a moron.
>doing all this to secure your wifi >someone just taps directly into your cable
Brayden Diaz
>m
Xavier Kelly
>not shitposting while shitting
Brody Green
Of course. How many ports do you honestly need exposed to the world?
Leo Stewart
that was done with big ass antennas, and probably some kind of signal amplification
wifi will works ok at 1000 feet at most, unless you use directional antennas
Thomas Mitchell
>shittingposting
Owen Rogers
the longest link on the wikipedia page about long range wifi is 304KM /unamplified/
of course these kinds of setups will require good, directional antennas that aren't surrounded by walls and 5 feet off the ground
funnily enough, this 304KM link is 5.765GHz (802.11ac)
Noah Young
shit/posting, or as i've recently taken to calling it, shit + posting
Ryan Johnson
It's light, it doesn't stop travelling at any point. Why is it so hard to believe this is possible when femtophotography is also possible?
Nicholas Perez
>radiowaves are light
Adam Jenkins
radiowaves are light
You are a faggot. Sure it doesn't stop traveling, but trees will attenuate the signal so severely, you're gonna need a goddamn Arecibo to practically extract any data. Although someone could just fly above innawood's property and get much less attenuation
No, you're a faggot. Guess what the Voyager space probe uses for comms? S-band specifically 2.3 GHz to earth and 2.1 GHz from earth. Voyager is 135 AU from earth right now.
Hunter Harris
>>Check your routers settings to see if ‘Allow Incoming ICMP Echo Requests" is enabled. If it is, then disable it. Keep in mind to turn this back on should you need ISP tech support so they can find your router for testing. Hah. I remember turning that off. In response, my ISP turned off my internet. I also filter MAC addresses and only permit only the ones I know.
Michael Hill
>Hah. I remember turning that off. In response, my ISP turned off my internet. wtf to ISP that shitty even exist?
Charles Lee
Considering it also provides cable TV and is ISP's property, I can see why. It's also noted in the agreement which I signed. Security in general is just placebo. It's only a matter of time before it gets broken and all your CP funneled to the internet. I do agree that you still have to take precautions, but all that seems to be mundane once you realize that you're the weakest link in security.
Christian Garcia
I used to connect to their wireless and print to their printer a page that would tell them how to secure their wireless and how the next guy may not be as nice as I am.
But sometimes I'd just print a lot of black pages.
Depends on the mood.
Lincoln Wilson
Fuck off faggot were not stupid.
Liam Williams
Radiowaves aren't light, just when you go to high frequencies they do behave like light, for example any object can create a shadow for the signal