If this is your first visit, be sure to
check out the FAQ. You will have to register
before you can post. To start viewing messages,
select the forum that you want to visit from the selection below.
Please do not use the CODE tag when pasting content that contains formatting (colored, bold, underline, italic, etc).
The CODE tag displays all content as plain text, including the formatting tags, making it difficult to read.
There are typically 2-5 wireless networks in my neighborhood, i.e., that I can 'see' from my computers. So it's not really crowded--at least not right now. Plus, if I have problems with the new router I can send it back (although I'm really bad about doing that). Keep in mind that I have not had any problems with my old WRT54G...well, unless you consider it DYING being a problem...so, hopefully, the new one will be fine.
Xenix/UNIX user since 1985 | Linux user since 1991 | Was registered Linux user #163544
...Moving away from locally-installed software and transitioning to an online (dare I say, in the cloud?) system is a really smart idea for situations like these. By keeping data off the local compuers, you're definitely reducing overall risk. One of your earlier messages indicated that all data in transit is encrypted, so interception risks are mitigated, too.
This makes me feel a little better as my biggest concern was local data. Full disk encryption works great if your laptop is stolen but is completely ineffective against access across the network. I'd be happier still if all IP traffic was tunnelled back to the IRS but SSL works, I guess.
I'm a federal geek - I head up tier 1 and 2 desktop support for a fair-sized agency under DoD.
And yeah - deleting the keys won't work. If IRS works anything like DoD does he has to certify the drives have been wiped. Big government agencies change slowly
we see things not as they are, but as we are. -- anais nin
...I had to install the tax program on every computer, and we used Truecrypt to set up an encrypted drive for this.
Interesting. DoD isn't allowed to use Truecrypt as it doesn't have a FIPS 140-2 certificate.
My parent agency made an enterprise purchase of Pointsec - which frankly, sucks mightily. When Nokia bought Pointsec there were only about three people on the planet who knew how Pointsec worked and all of them are working ridiculous hours providing support. I'm lucky if I can get onsite support once a year, and then only by having my higher threaten to cancel their contract.
we see things not as they are, but as we are. -- anais nin
This makes me feel a little better as my biggest concern was local data. Full disk encryption works great if your laptop is stolen but is completely ineffective against access across the network. I'd be happier still if all IP traffic was tunnelled back to the IRS but SSL works, I guess.
Yup, that's why I always look for encryption at rest and encryption in transit. Both are necessary to fully protect data. Also, for transit protection, SSL is equivalent to a VPN. Most VPNs use IPsec, which have similar key exchange mechanisms and use the same symmetric encryption algorithm.
Originally posted by wizard10000
I'm a federal geek - I head up tier 1 and 2 desktop support for a fair-sized agency under DoD... Big government agencies change slowly
We should talk sometime! I've done some security advisory work for the DoD. Nothing major, and nothing requiring clearances... more along the lines of policy stuff.
Originally posted by wizard10000
Interesting. DoD isn't allowed to use Truecrypt as it doesn't have a FIPS 140-2 certificate.
If you have to use Windows, get your agencies upgraded to Win 7! BitLocker is fully FIPS compliant
Yup, that's why I always look for encryption at rest and encryption in transit. Both are necessary to fully protect data. Also, for transit protection, SSL is equivalent to a VPN. Most VPNs use IPsec, which have similar key exchange mechanisms and use the same symmetric encryption algorithm.
I'd still feel better if they were tunnelling all IP traffic
Originally posted by SteveRiley
If you have to use Windows, get your agencies upgraded to Win 7! BitLocker is fully FIPS compliant
We still need a third party solution, though - as BitLocker doesn't do optical media >
We can kick this stuff around sometime
we see things not as they are, but as we are. -- anais nin
To get this thread sort of back on track... I received my ASUS RT-N16 router, and am completely stumped.
I first connected my laptop to it via cable, as its 'Quick Start' guide suggests. I connected to its setup page at 192.168.1.1...and from there it went downhill. It's not auto-detecting anything (IP address, etc.). It's not generating keys (I've tried WPA-2 and WEP). It's not receiving a response from Earthlink (although I'm definitely entering the correct username and password). In other words, I'm screwed. On the router's setup page, it correctly identifies the two computers currently connected to it via cable.
Meanwhile, my laptop sees the new wireless network, called ASUS by default. It shows that I'm connected to it. It also shows that I'm connected via Ethernet. But I can't *DO* anything. There is no Internet connectivity at all.
(I'm typing this after plugging the Ethernet cable back into my DSL modem.)
I don't know what else to try. I tried manually entering my IP address and subnet mask, but got stuck when it asked for other info that I don't know, so I couldn't continue. My previous router picked up all that stuff automatically.
Its Quick Start guide makes several references to the CD included with the unit, but since its instructions (in the guide) are windoze specific, I'm assuming the CD is, too.
Xenix/UNIX user since 1985 | Linux user since 1991 | Was registered Linux user #163544
Comment