I did 1, 2, 3 and 4. Did not do 5 and 6 yet, as you can sniff mac addresses and duplicate them - but that type of person would get in anyway - so I'll probably do 5 and 6. Right now my proxy server is in transparent mode to force usage for all clients. Unfortunately, transparent proxies do not use authentication. I can get around that, but it makes things a little cludgy. I'm thinking of statically assigning addresses and blocking access for everything that is not statically defined. Either that, or hack together a captive portal. Now - back to your regularly scheduled AMC content! I gotta remove a head and exhaust manifold this weekend, cool! On Fri, Jul 18, 2008 at 9:24 AM, Sandwich Maker <adh@xxxxxxxxxxxxxxxxx> wrote: > " From: "Bruce Griffis" <bruce.griffis@xxxxxxxxx> > " > " [] > " > " Still, I enabled security and am considering supressing > " ssid broadcast. > > what do you mean by 'enabling security'? in my book, this would > involve: > 1. disabling ssid broadcast > 2. changing ssid from default > 3. enabling link encryption, with a shared passphrase > 4. set notebooks to talk only with wireless access points > ['infrastructure']. > 5. putting your family notebook mac addresses on the pass list > 6. blocking everything else > 7. some wireless routers allow you to block clients from talking > directly to each other - eg. notebook 1 snooping files on notebook > 2. > _______________________________________________ Amc-list mailing list Amc-list@xxxxxxxxxxxx http://splatter.wps.com/cgi-bin/mailman/listinfo/amc-list