The best encryption is WPA version 2 or WPA2 for short. When people refer to WPA encryption, they really are referring to TKIP encryption, the two terms are used interchangeably even though, technically, they refer to different things. The terminology here is confusing however. WPA is not the best, but it's probably good enough. In November 2010, I tried to make this case when I asked Is Verizon guilty of malpractice? In fact, a case might be made that installing a new router with WEP enabled is malpractice. There are three types of wireless network security, WEP, WPA and WPA2. I covered this back in September 2009, (see The Best Security for Wireless Networks), so I'll be brief here. The most important lesson from this story has to do with Wi-Fi encryption. If you've been reading this blog, you'll know that I'm repeating myself, but it bears repeating. The defense here is to never believe the FROM address of an email message.
#Wep vs wpa no end to end encryption full#
Even if you already have accounts with your full name, a bad guy can make a minor modification, such as adding a year at the end. There is nothing you can do about someone opening an email account in your name. A better hacker would have used a clean system when doing mischief. This is most likely what happened on Ardolf's computer. Many email programs are configured to periodically check for new messages. The critical break in the case came when the logs showed that a threatening email message had been sent from the same computer that was used to check Ardolf's email. Still, had Ardolf been better at hacking, he might have gotten away with it. How many of you work for a company that would do that for you?įortunately for the Kostolniks, Ardolf continued his attacks after this logging had been enabled. The investigating firm hired a computer nerd who set up detailed activity logging on the Kostolniks' home network. Kostolnik's law firm hired another law firm to investigate. When the FBI raided Ardolf's house, they found he was working on still another email, this one to be sent to Bethany Kostolnik's boss, claiming inappropriate behavior by Mrs. He goes out at night but he isnt alwasy doing what you think hes doing. I dont blame him for asking me to have an abortion.
I know your husband Matt and Im going to get him! Hes going to pay for getting me pregnant. Yet another falsely-created email account was used to send this note: In one instance she was sent an email from Ardolf through her employers website. Kostolnik at his workplace.īethany Kostolnik, the mother who initially complained to the police, was also harassed. No surprise then that the Secret Service eventually visited Mr. All told, Ardolf threatened public officials three times. The Vice President of the United States was also sent threatening emails from yet another fraudulent email address with the Kostolniks names in it. Kostolnik when he sent death threats, again from the Kostolnik residence, to the Governor of Minnesota and one of their Senators. Instead, Ardolf hacked into yet another neighbor's wireless network.Īrdolf also impersonated Mr. The wrinkle here is that these scam messages were not sent from either the Kostolnik home nor Ardolf's home. Kostolnik's law firm complaining that Kostolnik "made sexual advances and grabbed at my breasts." Posing as her, he emailed two managers at Mr.
From the same email account Ardolf made it seem as if Kostolnik, a lawyer, was flirting with some of the women he worked with.Īrdolf then seems to have picked the name of a woman out of the phone book and created another scam email account in that womans name.