Thursday, October 30, 2008

Wireless Encryption Methods

What's the difference between the various wireless security methods, and which one should i choose?

There are three possible answers to this question: None, WEP, and WPA. Which one do you choose? It depends.

None - you don't have to use encryption. If you don't have any encryption on your wireless network, people who want to connect don't have to provide a password or key to connect. This can be acceptible, if you don't mind people next door or driving by to gain access to your network and use your internet bandwidth. However, this method can be secured farily easily.
Think of your wireless network as a night club and your router as a bouncer. By not enforcing any encryption, your bouncer speaks english and will listen to anyone's petition to get in. You can tell your bouncer to only let certain people in. The bouncer then checks everyone's drivers license and only let's the permitted people in.
This is like having no encryption but restricting access to certain MAC addresses. Look on wikipedia to find out what a MAC address is. Think of it as a unique unforgeable identification number. (Well, it could be forged, but people who could do that will break in no matter what.) The data between the router and the user is not encrypted, which means that anyone listening can understand the data going between the user and the router. This could be a problem if you're logging onto your bank's website. Not a problem, though. Ever notice how sometimes the web address starts with https:// instead of http://? That means that your data is actually scrambled before it leaves your computer and unscrambled after it's received by the server. This is actually more secure than the encryption you could put on your wireless network. Of course, if you put security on your wireless network, you'll scramble the data again when it gets transmitted into the air.

WEP - WEP is simple encryption. Remember the bouncer? Well, this bouncer will let anyone in as long as they have one of the passwords. The passwords are HEX numbers. In other words, the password consists of only numbers and the letters A-G. The advantage of WEP is that it's very simple. The passwords are restricted to characters that the router can understand very easily, so he's not going to spend any time at all trying to figure out if the passwords match. Also, when data is sent between the router and the user's computer, the data is scrambled, so that only those who have the password can understand it.

WPA - WPA is more difficult to hack than WEP. The reason for this is the complexity of the passwords. It's much like WEP just that the passwords can be much more elaborate. Again the data between the router and user is encrypted. Since things are a little more complex, the bouncer may take a little longer to verify the password, normally not noticeable.

My recommendation? Unless you have problems with it, use WPA. It has the strongest security while allowing you to use plain old passwords.

If you can't use WPA because it's giving you problems, use WEP. If not that, then go without security but remember to filter by MAC.

Wednesday, October 22, 2008

Cable vs. DSL

Recent events have prompted me to officially publicize my opinion about the different advantages of Cable and DSL "high-speed" internet access.

Both DSL and Cable will require a modem. The modem is a separate small piece of hardware that translates between you and the internet. Each requires its own special modem, they can't be interchanged. Usually your internet provider will try to sell you a modem when you sign up for the service. I've seen the best deals with DSL. DSL modems tend to come with a rebate for the whole price of the modem, so it ends up yours for free. Most cable providers will lease you a modem for a small fee every month, usually $5. This is fine as long as you don't plan to have it for more than a few months. Eventually, you'll have paid enough every month for it to have been cheaper to just buy one from Best Buy or Fry's.

The modem will have two main ports on it: one to connect to the cable or phone line. The other is an ethernet port that you will connect to something on your end. If you have only one computer, the other end will be your computer. If you will be using a wireless router, then the other end will be the Internet or WAN port on the router. The router splits the signal so that multiple computers can access the same modem.

So the main difference between DSL and cable is speed. Cable is normally faster than DSL. However, DSL has a guaranteed speed. Cable access speeds can vary depending on how many people in the neighborhood are using it at one time. Sometimes cable is faster than DSL, sometimes it is slower. If you're willing to put up with the variations, go with Cable because you'll get an average higher speed.

My vote has been with DSL because i like the guaranteed speed. Which one is better will depend on your needs.

Tuesday, October 14, 2008

Chain Mail

So, occasionally I receive chain mail from people who have my email address. Unfortunately, they don't know how much it irritates me that they've attached my name to one of these things that will get circulated around the internet.

Don't know what I mean? Ever gotten one of those emails that claims something tremendous will happen if you forward it to 10 people in the next five minutes? Or one of my favorites is the one that claims that Microsoft or aol will give you 5 cents for every person you forward the money making email to? Those. Bane of society, I tell you.

"So, how does it all work? And why is it so bad? The forward button was the best thing invented since blogs!" (I know, history proves that the reply button came first, but that's beside the point)

-Unfortunately, no it isn't. Blue LEDs were, but I’m straying from the point. Chain letters work by purporting something outrageous then promising untold benefits to the actuator. Sound familiar? Yep, that's it: infomercials. How often do those things actually work? Have you ever seen something completely useful on an infomercial? I mean, imagine if you saw an infomercial for a microwave? You'd probably think to yourself, "I need to by a new microwave to replace the perfectly good one I already have. In fact, I need THAT microwave, because it has even more features that I’ll never learn how to use!"

NO! Wrong. You won't think that because since the microwave is completely useful and is a really good thing, you would have been exposed to it in other places, like Wal-mart. I mean, if I really wanted a good microwave, I might go to GE's website and see what they have, but I can probably find the same thing at walmart.com.

Have you ever actually bought anything on an infomercial? If so, I pity you. Although, I pity myself. I've done it, so I’m a little hypocritical.

So that's how they work. It should be pretty easy to recognize that most of the information in them is bogus. There are even websites that specialize in differentiating the true urban legends from the utterly false ones (snopes.com). Some chain emails even refer to the snopes.com article describing how the email is a hoax. <"Bold" he says as he slowly shakes his lowered head>

Why are they bad? How many times have you had to scroll through 45 pages of email addresses to get to the actual message of the chain letter? Those 45 pages are the reason they are so bad. They contain the email addresses (and full names often) of the people the email was sent to. The emails are there even if the person saw the chain letter and immediately discarded it (stirring up the wrath of fate, luck, and other mystical forces bound to the promises in the letter). Since the email has the potential to circle the globe several times, it also has the potential to end up in the hands of unknown malicious persons. Those people (who aren't bound even when there is a law prohibiting it) will sell all 45 pages of email addresses to any number of people who will sell it to others, who will eventually give it to those people who will send YOU emails on how to increase your manhood, or lose weight, or find a morally challenged partner tonight.

Do you like getting those emails? I don't. Even though I have a spam filter, I still get those emails sometimes. And I attribute it to the innumerable chain letters that are circulating through the internet with my email address on it.

I mean, seriously, you wouldn't put your name, home address, and phone number on a billboard in Times Square, would you? Yet, others have no qualms about doing it for you.
I can’t gripe without a possible solution. There is a better way. Actually, there are several better ways. Blog about it. If you’re that concerned that you will lose your hair because an email says so, multiply the methods of distribution by putting it up on a web page. That web page will be searchable by Google and Yahoo! Another option, if you can’t ignore the urge to follow whatever instructions show up in your inbox, is BCC or blind carbon copy. You might be familiar with CC or carbon copy. It allows you to send an email to your friend Julie, while also sending it to Jamie for her information. BCC works the same way and allows you to send a copy to someone without revealing that fact to the original addressee. This means that you can send an email to your friend Julie and also send a secret copy to Jamie. Easy right? Also, if you’re going to forward an email in any form, please delete the 45 pages of email addresses. If you can’t do all of them, at least delete my email address from it!

Of course, the other option is to get a real life and communicate with people instead of spouting back out the same garbage that gets spouted to you. Do research to find out if the email is true.

I know I’m harsh, but I’ve been thinking about it for years and needed to get it off my chest.

Wednesday, October 1, 2008

Trying to keep up a habit

This past weekend, we painted our living room. Christy bit the bullet on her color decisions last week and invited Dad & Betty to come down for the weekend to help. That was a fiasco since Betty fell and kinda broke her thumb in the Houston airport. They landed Friday afternoon and went to the hospital directly. When i got home, Christy and Dad had already started on the walls by moving things. Christy started cutting away and Dad started rolling. When i got there, i took over for dad and we worked the rest of the evening. We painted while dad & betty watched the debate. Don't even get me started on the debate. As soon as it was over, i took the tv off the wall and we painted around it. We finished everything but a section of wall that still needed another coat, behind the tv. The next morning dad & i went to get the cars cleaned and christy and betty went shopping. Christy and I went to a baptism that afternoon, which was very good. That night we all went to Texas roadhouse to enjoy us some cinnamon butter. Dad told the waitress that it was christy's 21st birthday and they brought over a saddle for her to sit on while they sang happy birthday to her. It was hilarious. Christy vowed vengeance. Dad and betty left early sunday morning. I dont' remember much of saturday afternoon because i slept for 5 hours! It was like i was catching up on months of missed sleep. It was great. I'll have to get christy to email me some pictures of the living room so i can post them here.
Heroes was interest monday night, i'm not sure if they're heading down the same road as Lost. I hope not.