When you support small offices, home offices, and remote offices, you often run across older wireless equipment. Equipment that's likely secured with MAC filtering and perhaps a hidden SSID and WEP encryption.
I think most techs would agree that MAC filtering alone isn't going to secure a wireless network and that even WEP and a hidden SSID aren't much better. But, does MAC filtering at least keep out the lazy hackers? In this IT Dojo video, I show you just how easy it is to spoof a MAC address.
After watching the video, you can read the original tip in Chad Perrin's article, "How to spoof a MAC address". For more wireless security tips, check out the following TechRepublic Resources:
- Tips for small businesses who don't want to skip security
- Wi-Fi thief's tale reminds IT to enforce home office security
- 10 technologies that cybercriminals love to exploit
- 10 things you should know about securing wireless connections
- 10 Wi-Fi security tips for road warriors
- 10 ways to prepare for a wireless rollout
- 10 things you should do to protect your network against wireless devices
- A secure wireless LAN hotspot for anonymous users
- Why VPN can't replace Wi-Fi security
- Debrief and Defend: Why our organization should not deploy wireless
- Debrief and Defend: Wired vs. wireless LANs
- TechRepublic's ultimate guide to enterprise wireless LAN security
- Secure your Bluetooth wireless networks and protect your data
- TechRepublic's Wireless Communications Policy
- Wireless Networking Survival Guide
- Strengthen your wireless security by avoiding these missteps
Bill Detwiler has nothing to disclose. He doesn't hold investments in the technology companies he covers.
Bill Detwiler is Managing Editor of TechRepublic and Tech Pro Research and the host of Cracking Open, CNET and TechRepublic's popular online show. Prior to joining TechRepublic in 2000, Bill was an IT manager, database administrator, and desktop support specialist in the social research and energy industries. He has bachelor's and master's degrees from the University of Louisville, where he has also lectured on computer crime and crime prevention.