Thats true.... on my old Toshiba Protege the Intel app that come with it shows up hidden SSID. :up:
Printable View
i just run WPA on mine
most the people in range of me are old farts, and half the routers in range dont have any pass protection at all, so my network being a target is going to be slim
besides there is slightly less overhead with wpa, over wpa2 on 54G
Yes, granted. Mine is a complete sentence, with punctuation, and not in English. :P the SSID and MAC setups I have aren't inconveniences, takes me 5 minutes (if that), but I understand what you're saying.
Your brute force attack is no match for my prepositions. :D
I guess I forgot to mention I'm not broadcasting on standard frequencies either, before everyone jumped my [banana]. My list wasn't definitive, it was a list of "these are SOME things to run."
There's more, but I'm not tellin...
What? For WPA2 to fail, AES must fail. Unless there is an algorithmic attack against it which has not been found yet, that will not happen (and yes, that is strongly looking like the only way). But is it likely to? Well, to give you some food for thought, the encryption algorithm DES has been studied since about the mid 70s, so over 30 years now, and it has not been cracked. So why you feel that encryption is inherently crackable I do not know. It could very well turn out that it is, but historically it is not true that systems will fail (I think we can say that over 30 years of analysis is pretty damn good).
And again, WPA is not cracked. This is a slim-jim into a particular cipher stream, and by it's very nature certain conditions must be met to be at all effective, and the time it requires in the wild is still almost too high to be useful in any way (cipher streams change over time).