Review of my home broadband router logs (suspicious activity?)

Well, out of the box is not going to do what you want.

However the WNDR3400v2 does support DMZ configuration. There's loads of netgear, web site and youtube resources to help you do this.

But you must worry about other things. Are you sure letting a child play some of these (mostly violent) video games is a sensible introduction to becoming an adult?

Reply to
Adrian Caspersz
Loading thread data ...

DMZ = "De-Militarized Zone" it is the name given to a port on your router that can be configured to be completely OPEN to the internet, no firewall, no port blocking, nothing. This may be advantageous for someone running a particular type of server on their home network - an FTP server or Web Server or something that they want to expose to the internet so that it can be accessed from the outside. In such configurations that device usually will have a software type firewall installed to prevent hackers from gaining access.

Most routers I have seen include this feature and it has is uses, but it must be used with extreme caution!

S Sinzig.

Reply to
ssinzig

Okay, I understand that explanation. Now please tell me how my iPad or laptop broadcasting my home SSID willy nilly at the Starbucks or the passenger terminal at SFO or PHX is going to compromise my home network?

Not saying it couldn't be done but... Talk about freakin' remote...

I don't bother to hide my SSID at home. Anyone who cares to clone a MAC address to by-pass the MAC filter and decrypt a 26 alpha-numeric pass phrase can have it. Good luck with that

Reply to
Unquestionably Confused

In short, yes. Your game console or computer or whatever needs to "talk" to another computer on the internet, in this case is uses Port

9000. The router opens Port 9000 and the packets get through to that other computer out there on the internet. To reply, that other computer only knows your static public IP, ie. "1.2.3.4" and sends its packets back to you at that IP on the same port, 9000. Your router receives these packets, and does NAT (Network address translation) translating the packets from 1.2.3.4:9000 (Your public IP) to 192.168.1.5:9000 your private home network IP and sending them there. This happens all time when you are accessing the web, either through HTTP, FTP, SSL, whatever. They all use their own specific ports, (ie HTTP is usually port 80, FTP 20 or 21, etc.)

S Sinzig.

Reply to
ssinzig

There are several conflated issues. When it comes to security, it's hard to tease out a *single* issue/exploit without considering other vulnerabilities that may be related.

First, if your home SSID is "1313MockingbirdLane", you've now (likely) leaked some information about yourself. "Hmmm... *he's* here so the house is possibly unoccupied!"

Given how naive folks are about choosing their passwords, SSID's, etc. it's likely some idiot out there has an SSID of "3Jan1980" -- chosen to be something memorable! (his date of birth!)

Second, you are effectively advertising those networks to which you are

*willing* to connect! I can have a piece of software running on my laptop that sniffs your broadcasts and then decides to *impersonate* those networks -- especially if you "trust" any of them and don't have good/any credentials set up for them!

Cloning a MAC address is trivial. The software that snoops the WiFi can do that for you automatically! :>

Reply to
Don Y
[snip]

The last one on my list is semifree. A browser is required and you have to register, and I think they give new users 100MB free.

Ignore the following if you don't like it:

10 buy beer 20 buy cheese 30 wash clothes 40 walk dogs 50 if not dead goto 10
Reply to
Mark Lloyd

I have no experience with DSL (I use cable internet), but I'd much rather have SEPARATE modem and router. The router is a part of MY network, and I want to be in control of it. One reason being I'm free to replace it (or just replace the firmware). No involving the ISP in my network. If they're combined, one failing would affect both. Also, the ISP could have back doors into your network.

If you do use a combination, at least be sure to CHANGE the password.

The transformer in one of those power adapters has a fuse in the primary. This is not a replaceable part, so the power adapter becomes useless after an overload. If the equipment doesn't come on at all, it's always a good idea to consider that.

Reply to
Mark Lloyd
[snip]

Not much, but not none either. Consider that most people won't know there's a network there.

I've never had a combination, but agree that it would be less secure.

I had DOCSIS II until June, when my ISP increased the speed to 50Mbps which is too fast for a single channel so I had to get a new modem. I needed a new router too, but that (thankfully) was a completely separate thing.

Reply to
Mark Lloyd

And some will (ONLY check for accessible DOORS).

There's a difference between some security (lock only doors), better security (lock doors and windows), and perfect security (impossible).

Reply to
Sam E

I appear to have passed *that* test, *this* time! :>

(sigh) The beer I drink isn't available, here.

(grumble) Nor is the cheese that I eat/use!

Definitely NOT on my list of ways to spend ANY day! :> OTOH, I did towels last night...

They left ~10 years ago. Won't be back until February...

Error: Missing END.

Reply to
Don Y
[snip]

If your router is broadcasting the SSID, EVERY wireless device in range will receive it and most will show it to the user.

Compare this to what happens when your device is broadcasting it. Will others even see that?

Reply to
Mark Lloyd

Security is a thousand good practices, just like grammar is, or cleanliness or politeness or class. They're all a thousand little things.

SSID good practices are what we're talking about here.

There are a few problems with the scenario you proposed, but I have to manually *insert* an attacker who cares, in order for it to matter.

For example, let's say you're cheating on your wife, and, let's say, you connected to your girlfriend's SSID, called "GIRLFRIEND" and, let's say, for now, she's *not* hiding her SSID. Guess what?

Your laptop (or phone) *still* has a record of that connection, which, if your wife cared to snoop, can see by looking at your laptop or phone.

Now, let's say, for argument's sake, that your wife doesn't have physical access to your laptop or phone, but, your girlfriend told her router to not broadcast her SSID, but that you connected to her SSID.

Guess what?

When you're at home, your laptop or phone first shouts out "Hey GIRLFRIEND, are you there?" and only when the router doesn't respond to that request, does your laptop or phone bother to go down the list of other stored or located SSIDs.

It's actually easier than that *if* you use an existing SSID and password since the rainbow tables will already have the hash value stored.

I'm not saying "I" care to to that, but someone might. As always, security is a thousand little things done right.

Reply to
Paul M. Cook

This is a great idea!

Reply to
Paul M. Cook

Fair enough point.

Security is a thousand little things, all put together.

Reply to
Paul M. Cook

Uncle Monster posted for all of us...

What would that be? Hmm, Marry?

Reply to
Tekkie®

Depends on what you mean by "good" passphrase because you don't need

*any* passphrase to break into WPA2/PSK encryption because the "salt" is known (it's the SSID!) and if you use an *existing* passphrase, you're already doomed.

formatting link

So, you have to substitute *unique* for "good", and only then the rainbow table hack won't work to break into your router.

Reply to
Paul M. Cook

Just remember that there are negative security ramifications at Starbucks when you decide not to broadcast your SSID at home.

If you're OK with that tradeoff, then you're fine.

If you're unaware of that tradoff - then - you need to understand it.

Reply to
Paul M. Cook

Then head over to:

Gee, how many attackers CAN'T afford $99?

Reply to
Don Y

Every boy (practically) in the USA plays those violent games.

Reply to
Paul M. Cook

Many years ago, I bought a copy of Doom to test a sound card (GUS MAX) -- on the advice of a friend.

In the late 70's, I was involved in the (arcade) video gaming industry. My idea of "video game violence" was pretty naive. I was caught completely off guard by Doom's! :-/

Some months later, I was in a department store waiting in line to checkout. Woman in front of me had a copy of Doom (or one of the sequels) that she was buying for her grandson. I just frowned and shook my head.

Later, felt like I'd been too judgemental -- who am *I* to say what's appropriate for *her* grandkid? OTOH, the fact that she'd asked my opinion meant I was, at least, *entitled* to give voice to it!

The more interesting thing re: *my* experience (with Doom et al.) was how *quickly* I became desensitized to the *gore* (and violence). I think back to what was considered offensive when I was growing up -- and what is now commonplace!

I can remember an *intervening* time when all the "splat" scenes in the Roadrunner cartoons were elided "to reduce violence in children's programming".

[IMO, Roadrunner is the most clever cartoon series out there -- second only to some of the operatic Bugs Bunny's/Daffy Duck's!]
Reply to
Don Y

HomeOwnersHub website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.