if you have two devices connected on the same AP then one can not send information to the other.
That would seem to utterly defeat 50% of the reason for having a home network in the first place, so we can share files, music, etc, along with sharing the internet connection. Or maybe I'm not really understanding what you mean, since my grasp of networking is far from even "middling" -- I had to get a book called "Home Networking for Dummies" before I could even manage to get them speaking to each other, and sometimes they still don't, though I've figured out that unplugging/resetting the router generally clears that up.
Then turn off its WiFi features entirely. No need to have a potential entry point if it serves no useful purpose.
On reflection, I remembered that our DirectTV (satellite TV) box is using the wireless feature to pull programming info from the net -- so I kinda need that functionality, or I lose some of the most valuable functionality of having DirectTV -- which is rather expensive (our son got us into a 2 yr contract that we can't break or face crippling penalties), so I like keeping as much functionality as possible.
The hackers I've met were skinny, did get dates (albeit not the kind of girls I'd like to be associated with) and almost chronic insomniacs. It seems that they were spending too much time perfecting their craft, at the cost of sleep deprivation.
ROFL! That sounds a great deal like ME, back in 1999 when I first got on the internet and was struggling madly to learn HTML/CSS -- but for purposes of trying to acquire a new revenue source, not digital breaking-and-entering. I guess the main thing I have that they don't is an understanding of ethics, and karma -- I have sufficient bad karma already without actually TRYING to make more.
At least you'll know that a perfect guess of such a password means that you have a malware-infected PC or a man in the middle attack.
Well, as I said in the email I sent you, after a 16 1/2 hr scan of over 660,000 files, no real problems showed up -- some old trojans in attachments, which I had never opened (I never do!), and one that caused me a slight concern but has since been dealt with, and no, it hadn't really infected my PC, it was just present -- it's not anymore, and I've ascertained that it's not hiding in my registry, so it doesn't resurrect when I reboot -- it's gone. But what is a "main in the middle" attack? I've never heard of that one. Apparently I need a PhD in hacking just to defend myself from the lowlifes.
This is as much use against a hacker as a firecracker against an armed burglar.
Oh, I know... but it's aggravating as hell, and I'd dearly love to aggravate this bastard with more than just changed passwords, IPs, and secret words. I'd REALLY love to aggravate him with a jail cell and a wife named Bruno. :)
Andria