Mailbag: How Safe Is Wi-Fi?, IE 8, More
On Tuesday, Fred
posed a question
to fellow Redmond Report readers -- what should he do to
keep his home WEP Wi-Fi connection secure? Here are your responses:
Regarding Fred's question on wireless: WEP is commonly defeated in under
10 minutes, so if someone decides to target your network, any available resource
will be open to them. I'd worry less about the man next door than I would
about the boy next door, who might try to break into your network just for
the 'fun' of doing so. Another worry with WEP is having a stranger gain Internet
access through your network and then use it for criminal activity, which would
trace back to your IP address.
If you don't share anything on your computer, including hidden shares,
a hacker can get access to the Internet only. The harm here is that they can
capture your Internet traffic, but this would be very unlikely in a home environment.
Even if they do capture Internet traffic, https sites are safe because of
encryption. For example, your username and password for most Web-based e-mail
is safe because it is encrypted; the log in page is usually https://something.
However, the e-mail packets themselves are probably not encrypted and can
be captured. You can configure Firefox to encrypt all Gmail traffic, but this
is an exception. If you use e-mail handlers like Outlook or Thunderbird, your
SMTP port is 25 and your POP port is 110, your mail transmissions can be easily
captured. Hackers can also use peer-to-peer file transfers and slow down your
Internet connection (the odds against this happening are astronomical).
I can hack 128-bit WEP encryption in 10 minutes if I am close enough
to the access point, usually within 100 feet. The farther away, the more time-consuming
the hack. Right now, the average hacker would not bother with any WPA because
WEP is easy and plentiful. Almost all wireless routers and network cards can
be configured with WPA. If you really want to be safe, use WPA-2 with AES
and more than 20 characters in the encryption key. Also, keep potential hackers
more than 300 feet away. This is almost as safe as a wired network.
Once again, if you don't have anything shared, including hidden shares,
and you don't have sensitive e-mails, there is not much to worry about from
Have you tried the IE 8 beta? A few of our readers have and their responses
I have used IE 8 on Vista SP1 for four or five months without any issues.
One problem I've had with the IE 8 beta is when I tried to uninstall it,
it completely hosed my system, basically reverting it back to the factory
default programs and settings. I had to use System Restore to restore my system
the way it had been, including the beta version of IE 8. I'm using Window
Vista Ultimate with 4GB RAM and a 2.20 gigahertz Intel Core2 Duo processor.
Joseph thinks the open source business model isn't necessarily "broken,"
analyst said; it might just be suffering from a perception problem:
Making money from 'free' software is not anything new. There are hundreds
of VARs out there that sell products at near-cost to get the implementation
contract. The problem is marketing -- when I had my own consulting business,
I put on a "free" seminar at a local community college and hardly
anyone showed up. I raised the "price" to $99 for the same seminar
and got an overwhelming response from businesses. There is a price-point at
which people perceive "cheap" to be valueless.
And finally, "cloud" might be Microsoft's new buzzword, but Alan
isn't buying into it:
I do not need the cloud, and I do not care about it. It is insecure at
Tell us what you think! Leave a comment below or send an e-mail to firstname.lastname@example.org.
Posted by Doug Barney on December 04, 2008 at 11:53 AM