On Thu, 2007-08-02 at 11:07 +0100, Andy Green wrote: > Somebody in the thread at some point said: > > > so far, so good? i just want to verify that that's the right firmware > > file before going any further. i'm paranoid that way. :-) > > I'm sorry I don't have that device, I don't know. But it is the case > that "firmware" is a bit of a misnomer for the wireless devices I have > met, in fact this file is getting loaded into SRAM on the device, not > flash or anything. So any problems caused by the wrong firmware should > not live through a powerdown of the device. > > WEP is completely unsafe though, aircrack and related tools can crack it > with relative ease. Unless you live in the wilderness WPA is a > necessity (and I use ssh tunnmenteels for everything, including all web > traffic proxied through one, inside that in addition). > > -Andy > This seems my day to be difficult. This statement that WEP is easy to crack must be taken with a grain of salt. One has to visualize crackers driving down my street and cracking my WEP passphrase or strange people , probably with speakers in their ears and raincoats, wandering through the office. It could happen but on my street which goes nowhere they would stand out. Although, if they want to do that let them. My communication with other machines is all encrypted (e.g, mail is ssl encrypted) so I am not sure what they would find out. -- ======================================================================= A violent man will die a violent death. -- Lao Tsu ======================================================================= Aaron Konstam telephone: (210) 656-0355 e-mail: akonstam@xxxxxxxxxxxxx