Help NYC wireless

rambo_nyc

New Member
Joined
Oct 4, 2006
Messages
2
Reaction score
0
I am in a shelter and am allowed to have a laptop and a computer.I dont have a router.I am trying to sign on to networks. Most of the ones that I go on, DOES NOT have a wep key. But it still comes up "Page cannot be displayed"
I released and renewed the ip address and still the same message.
I also got these 2 error messages also

1: An error occured while renewing interface wireles network connection unable to contact your dhcp server.

2: media state....media disconnected

Can someone call me and walk me thru it or email me...PLEASE

rambonyc@aol.com
 
Last edited:
Are you sure they have wifi available in the area you're at? Many wifi routers are password-protected to prevent people from stealing their Internet bandwidth. If it is password-protected you will not be able to grab the
IP address from the wifi router.

What does it show for SSID? I would double-check to make sure the 'hotspot' you are at can be accessible to the public.

On a Dell laptop, sometimes holding down Fn and pressing the F2 button to turn on/off the wireless card forces it to re-connect.

-Christopher
 
My Opinion that Los Angeles and New York and Chicago etc... Should has free Wi-Fi in each Hotel.. I went to New York before and I couldn't get in any Wifi because all of them have WEP enable and I notice they have a lot of Wireless Service but with WEP!
 
Response

There are "hotspots", But I dont connect to the ones with wep. I only go to the unsecured ones. So I dont know why I am still having this problem
 
Since its protected, you need to find out through the system administrator and see if they will provide you the password to gain access to the wirless router to allow you to browse the Internet.

WEP is considered very old and WPA is far more secured.

Regards,
Christopher
 
Since its protected, you need to find out through the system administrator and see if they will provide you the password to gain access to the wirless router to allow you to browse the Internet.

WEP is considered very old and WPA is far more secured.

Regards,
Christopher

Oh, Can you explain to me what Different between WPA and WEP? because I have WPA set on my DI-624
 
WEP:

Wired Equivalent Privacy. Originally intended to give you the same or similar level of security as on a wired network, but it didn’t quite work out that way.

In basic layman’s terms, WEP works by using secret keys, or codes to encrypt data. The Access Point and the client must know the codes in order for it to function. It uses either 64 bit or 128 bit keys, though the added security from the larger number isn’t as much as you would think.

The actual user keys (codes) are 40 bits and 104 bits, with the extra 24 bits used by something called the Intialization Vector (IV).

The encryption is created by taking the IV and randomizing it for each packet, while keeping the secret code the same. The AP and the client decrypt and retrieve the message/data and all is right in the world, in theory.


Problems:

There is no limit on using the same IV value more than once. This makes the encryption vulnerable to collision-based attacks.
Because the IV is only 24 bits, there are only ~16.7 million possible variations. Sounds like a lot, but it’s quite small in the cryptography world.
Master keys are used directly, when they should instead be used to generate other temporary keys.
Users don’t change their keys very often on most networks, giving attackers ample time to try various techniques.
If you have nothing else, WEP is better than nothing of course, but I wouldn’t trust extremely sensitive data with it.

WPA:

Wifi Protected Access. It bridges the gap between WEP and the upcoming 802.11i standard, and is implementable via firmware upgrades in older hardware. WPA uses Temporal Key Integrity Protocol (or TKIP), which is designed to alow WEP to be upgraded through corrective measures that address the existing security problems.

Advantages over WEP:

IV length has increased to 48 bits from 24 bits, which allows WPA to achieve over 500 trillion possible key combinations.
IVs are now better protected through the use of the TSC, or TKIP sequence counter, helping to prevent the re-use of IV keys.
Master keys are never directly used.
Better key management
Impressive message integrity checking
I have not gone into the Enterprise level of WPA, which is actually intended to be used with something called a RADIUS server for access control. Most home users use what is called WPA-PSK, which is for use on smaller networks that need good security without the extra cost and configuration. WPA and WPA-PSK use the same encryption methods, however.

-Christopher
 
WEP:

Wired Equivalent Privacy. Originally intended to give you the same or similar level of security as on a wired network, but it didn’t quite work out that way.

In basic layman’s terms, WEP works by using secret keys, or codes to encrypt data. The Access Point and the client must know the codes in order for it to function. It uses either 64 bit or 128 bit keys, though the added security from the larger number isn’t as much as you would think.

The actual user keys (codes) are 40 bits and 104 bits, with the extra 24 bits used by something called the Intialization Vector (IV).

The encryption is created by taking the IV and randomizing it for each packet, while keeping the secret code the same. The AP and the client decrypt and retrieve the message/data and all is right in the world, in theory.


Problems:

There is no limit on using the same IV value more than once. This makes the encryption vulnerable to collision-based attacks.
Because the IV is only 24 bits, there are only ~16.7 million possible variations. Sounds like a lot, but it’s quite small in the cryptography world.
Master keys are used directly, when they should instead be used to generate other temporary keys.
Users don’t change their keys very often on most networks, giving attackers ample time to try various techniques.
If you have nothing else, WEP is better than nothing of course, but I wouldn’t trust extremely sensitive data with it.

WPA:

Wifi Protected Access. It bridges the gap between WEP and the upcoming 802.11i standard, and is implementable via firmware upgrades in older hardware. WPA uses Temporal Key Integrity Protocol (or TKIP), which is designed to alow WEP to be upgraded through corrective measures that address the existing security problems.

Advantages over WEP:

IV length has increased to 48 bits from 24 bits, which allows WPA to achieve over 500 trillion possible key combinations.
IVs are now better protected through the use of the TSC, or TKIP sequence counter, helping to prevent the re-use of IV keys.
Master keys are never directly used.
Better key management
Impressive message integrity checking
I have not gone into the Enterprise level of WPA, which is actually intended to be used with something called a RADIUS server for access control. Most home users use what is called WPA-PSK, which is for use on smaller networks that need good security without the extra cost and configuration. WPA and WPA-PSK use the same encryption methods, however.

-Christopher

HMMM!! I will switch to WPA! Also, I will change Name on my router!
 
Back
Top