Register

If this is your first visit, please click the Sign Up now button to begin the process of creating your account so you can begin posting on our forums! The Sign Up process will only take up about a minute of two of your time.

Page 2 of 6 FirstFirst 1 2 3 4 ... LastLast
Results 11 to 20 of 58

Thread: Secure wireless

  1. #11
    Senior Member
    Join Date
    Dec 2003
    Posts
    1,274
    Member #
    4362
    You can't do that then. How is going the Access point going to encrypt the data that he sends to you (incoming) and de-encrypt the data you send to him (outgoing) if he doesn't know how?

    If this is possible, it goes beyond my knowledge... Sorry

  2.  

  3. #12
    Senior Member filburt1's Avatar
    Join Date
    Jul 2002
    Location
    Maryland, US
    Posts
    11,774
    Member #
    3
    Liked
    21 times
    A public/private key scheme?
    filburt1, Web Design Forums.net founder
    Site of the Month contest: submit your site or vote for the winner!

  4. #13
    WDF Staff Wired's Avatar
    Join Date
    Apr 2003
    Posts
    7,656
    Member #
    1234
    Liked
    137 times
    You can encrypt it, but the receiver will need to know how to decrypt it. Are you talking about all data to the WAP, or just certain things, i.e. IM and e-mail to a specific person?
    The Rules
    Was another WDF member's post helpful? Click the like button below the post.

    Admin at houseofhelp.com

  5. #14
    Senior Member filburt1's Avatar
    Join Date
    Jul 2002
    Location
    Maryland, US
    Posts
    11,774
    Member #
    3
    Liked
    21 times
    All web traffic, which includes e-mail, browsing, and IM...I'd prefer a global solution rather than a solution to each protocol, though.
    filburt1, Web Design Forums.net founder
    Site of the Month contest: submit your site or vote for the winner!

  6. #15
    WDF Staff Wired's Avatar
    Join Date
    Apr 2003
    Posts
    7,656
    Member #
    1234
    Liked
    137 times
    Ultimately, the receiver needs to know how to decrypt it. Therefore, there's no real way to accomplish that. There are ways to encrypt them separately, but an all encompassing way, without the WAP or the receiver knowing how to decode them? Nope.
    The Rules
    Was another WDF member's post helpful? Click the like button below the post.

    Admin at houseofhelp.com

  7. #16
    Senior Member filburt1's Avatar
    Join Date
    Jul 2002
    Location
    Maryland, US
    Posts
    11,774
    Member #
    3
    Liked
    21 times
    Is there a way to port this over, then? http://www.macosxhints.com/article.p...30721022245232

    Each protocol would be painful, but by ports it shouldn't be a problem. Mainly HTTP, POP3, IMAP, Y!M, and OSCAR.
    filburt1, Web Design Forums.net founder
    Site of the Month contest: submit your site or vote for the winner!

  8. #17
    Senior Member
    Join Date
    Dec 2003
    Posts
    1,274
    Member #
    4362
    Yes. There is a way to do that. I'll post it later.

  9. #18
    Senior Member
    Join Date
    Dec 2003
    Posts
    1,274
    Member #
    4362
    It seems that you can only that for things you login on and has SSH support. This are things like email and FTP. You can configure a SSH client to forward a certains port trough a tunnel, but the requisite is that the other server (I.e.: your mail SMTP or POP server) has SSH login support, otherwise you have nothing to do.

    See this for more info: http://www.oreillynet.com/pub/a/wire...02/23/wep.html

  10. #19
    Senior Member filburt1's Avatar
    Join Date
    Jul 2002
    Location
    Maryland, US
    Posts
    11,774
    Member #
    3
    Liked
    21 times
    That's good, but the majority of stuff that I want encrypted is normal HTTP traffic...
    filburt1, Web Design Forums.net founder
    Site of the Month contest: submit your site or vote for the winner!

  11. #20
    Senior Member
    Join Date
    Dec 2003
    Posts
    1,274
    Member #
    4362
    Yes... but... How?
    It can't be protected with SSH because when you request something trough the HTTP port it doesn't login, it just gets the data, and if there isn't login, there isn't SSH.

    I can only say that you should use that laptop the less possible and that WEP 128 bit encryption is better than nothing. I've read somewhere that to crack a 8 bit WEP you take about 50 hours, so to crack a 128 bit one, it will take a bunch of time.
    And if you don't are all the day using that connection, it will be very difficult. And a very good idea would be to change the password every week or so...


Page 2 of 6 FirstFirst 1 2 3 4 ... LastLast

Remove Ads

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
All times are GMT -6. The time now is 05:21 PM.
Powered by vBulletin® Version 4.2.3
Copyright © 2019 vBulletin Solutions, Inc. All rights reserved.
vBulletin Skin By: PurevB.com