Posted August 17 2005 - 03:12 PM
Hi again Mark,
SES simply automates the process of setting up a WPA encrypted connection between the client computer and the router. In addition to the router supporting the technology, the wireless card on your computer will need to support it as well. So, you will need to find out if your computer supports SES or can be made to support it with a driver update. This information should be available from the computer manufacturer.
However, if you computer doesn't support SES you can still enable the same security features by connecting to your router's admin page and enabling WPA manually. Of course the catch here is that the wireless card on your notebook has to support WPA (it probably does) and that you will have to configure it yourself (which shouldn't be difficult to do). If your wireless card doesn't support WPA it will probably at least support WEP, which is another encryption scheme. WEP is not as good as WPA but it is better than nothing. Again, WEP is enabled by logging into the router.
A couple of other wireless security tips...
-I assume you changed your admin password on your router already. If you haven't, do so immediately. If you reset your router via the reset button, the password would be set back to factory defaults.
-Turn off SSID broadcasting on the router's admin page. In your other thread you mentioned being able to see and use your neighbor's wireless connection. You were able to see his network because the SSID of the network was being broadcast by his router. By turning this feature off, your neighbors won't easily see your wireless connection.
-Use MAC address filtering to limit wireless access to your notebook only. Each computer has a unique MAC address. If you tell your router to only allow your notebook access by identifying it via its MAC address, all other computers will be locked out. This is also done via the router's admin page.
Now there are ways around everything, but with WPA or WEP encryption, SSID broadcasting turned off, and MAC address filtering you should have a reasonably secure wireless network. Anyone looking to borrow bandwidth will look for an easier target, such as your neighbor's connection.
As far as I'm concerned, it's a damned shame that a field as potentially dynamic and vital as journalism should be overrun with dullards, bums, and hacks, hag-ridden with myopia, apathy, and complacence, and generally stuck in a bog of stagnant mediocrity. - Hunter S. Thompson, 1958, from cover letter he wrote for a newspaper job.