Looks like the update is back up. Software update offered it to me at 915am PST today and I successfully downloaded and installed it.
So they've pulled the update, but I've already installed it.
That gives me a warm and fuzzy feeling inside...
WEP can be broken into in minutes, so I wouldn't recommend that.
Your information is slightly out of date.WEP - any WEP - can now be broken in seconds.
can anyone confirm if this update runs fine on a macbook pro c2d 2.4 ghz sr on leopard 10.5.2?
reason why i'm cautious and asking first before installing any airport updates:
after major issues with random disconnects during the time between the airport 004 driver update on tiger up until the 10.5.2 leopard update(when it finally and officially got fixed for me), i just want to make sure there's a better chance this, or any airport update, won't mess up my system's stability is all.
thanks in advance.
WEP can be broken into in minutes, so I wouldn't recommend that. Anyone who would take the time to break into your network can break it. It only deters accidental connections, see e.g.:
http://en.wikipedia.org/wiki/Wired_Equivalent_Privacy
Does plain WPA mitigate the drop-out problem with WPA2?
I use Mac Address filtering, far more secure.
on 10.5.0 WPA did not work. On 10.5.1 WPA did work. On 10.5.2 WPA did not work.
FWIW I haven't had problems with WPA on any incarnation of OS X; Leopard or otherwise.
MAC address filtering on a wireless LAN is trivial to get around - more so than WEP even. Seriously.
http://blogs.zdnet.com/Ou/index.php?p=43
First you have to have a user that has enough inclination to filter a known mac address (yes, you can get them via stumbler if you chose). Secondly they actually want to spend the time to do it, all for what? the ability to use your router? whatever.
In other words, for MAC filtering to be a poor security solution, you have to have someone who is interested in breaking your security? You should go into business selling plastic deadbolts.
No, I'm saying in all the time I've ever just ran MAC filtering I've never logged anyone but one of my machines/clients on the connection.
First you have to have a user that has enough inclination to filter a known mac address (yes, you can get them via stumbler if you chose). Secondly they actually want to spend the time to do it, all for what? the ability to use your router? whatever.