On 2014-06-16 23:06, DMakowecky wrote:
>
> Hello again.
>
> I am using a wired keyboard and mouse for security.
Good.
> Also, I have
> disabled the wireless functionality of my router and installed a hosts
> file - so far so good (1 day).
Ok…
> The thing is, I didn’t broadcast the SSID
> of the network,
That one is mostly irrelevant for an interested hacker.
> I used psk2 encryption with a long (50+) char password.
psk2? What is that? Ah, ok, understood, different parlance. It is the
same as wpa2.
http://community.linksys.com/t5/Access-Points/Is-PSK-PSK2-the-same-things-as-WPA-WPA2/td-p/269522
http://www.aota.net/forums/showthread.php?t=21245
http://www.linksysinfo.org/index.php?threads/psk2-and-wpa2.8558/
> There is an armed forces signal corp cadet corp in town and I am
> really, really hoping it is them. Otherwise a serious, serious, serious
> problem.
What do you mean, that they train hacking your system? Weird.
Maybe you can find something here:
http://en.wikipedia.org/wiki/Wireless_security
http://en.wikipedia.org/wiki/Wireless_Intrusion_Prevention_System
> But so far the numlock key has stayed off and no echoes on ssh logins.
>
> I will keep you informed. Thanks for your help.
Ok.
Meanwhile, you probably should rotate your wifi password periodically.
Maybe add MAC verification, which is not in itself enough security, but
it adds to it.
And add strong local user passwords, too.
Ah, in your Linux machine, configure the firewall to protect from the
internal network, or consider the local network as “external”, not
“internal”. It also makes life more difficult for you, of course.
Do you have a CUPS server, accessed from another machine? The CUPS
protocol is a security problem, because it sends passwords in clear,
when it needs to. You can read about it the CUPS pages in the openSUSE wiki.
–
Cheers / Saludos,
Carlos E. R.
(from 13.1 x86_64 “Bottle” at Telcontar)