A good way to eliminate dead zones in your house where wifi doesn’t work is to add one or two wireless access points to your setup.
Access points, thankfully, are no longer stupid expensive–they used to cost twice as much as a router in spite of being nothing more than a cut-down router–but almost every access point I’ve looked at has one or more compromises built in. That said, if you want something you can plug in and configure by filling out three or four things, you might be willing to live with those compromises.
David Farquhar is a computer security professional, entrepreneur, and author. He has written professionally about computers since 1991, so he was writing about retro computers when they were still new. He has been working in IT professionally since 1994 and has specialized in vulnerability management since 2013. He holds Security+ and CISSP certifications. Today he blogs five times a week, mostly about retro computers and retro gaming covering the time period from 1975 to 2000.
David Farquhar is a computer security professional, entrepreneur, and author. He has written professionally about computers since 1991, so he was writing about retro computers when they were still new. He has been working in IT professionally since 1994 and has specialized in vulnerability management since 2013. He holds Security+ and CISSP certifications. Today he blogs five times a week, mostly about retro computers and retro gaming covering the time period from 1975 to 2000.
In 2003, Dan Geer called the combination of Microsoft’s market dominance and the flimsy security of its products a threat to national security.
Today, he’s calling the security holes in consumer routers a threat to critical infrastructure.
These two things are related in more ways than being utterances from the same person. These routers were designed to protect flimsy PCs from the horrors lurking on the Internet. In 2003, they were arguably adequate. But since 2003, Microsoft operating systems have improved dramatically from a security standpoint while routers have stood still. Many of them are still running on the same outdated Linux kernels and userspaces, just on newer, faster hardware. These routers are now less secure than the computers they are supposed to protect. This isn’t a knock on Linux; Linux has improved in the last 11 years too, but router makers generally haven’t incorporated those improvements. So these routers are easy to attack, easy to use to build botnets, and the user will never be the wiser since they keep the devices until they break. The only good news here is that many of them break after a year or two, and that’s supposed to be bad news.
David Farquhar is a computer security professional, entrepreneur, and author. He has written professionally about computers since 1991, so he was writing about retro computers when they were still new. He has been working in IT professionally since 1994 and has specialized in vulnerability management since 2013. He holds Security+ and CISSP certifications. Today he blogs five times a week, mostly about retro computers and retro gaming covering the time period from 1975 to 2000.
I’ve said before how to eliminate wifi dead spots, but perhaps I didn’t give it the focus it deserves. I think almost everyone has wifi dead spots in their house that they would like to eliminate. It turns out you can do it, and it doesn’t have to cost a fortune either.
The idea is to supplement your existing router with one or two additional access points. Read more
David Farquhar is a computer security professional, entrepreneur, and author. He has written professionally about computers since 1991, so he was writing about retro computers when they were still new. He has been working in IT professionally since 1994 and has specialized in vulnerability management since 2013. He holds Security+ and CISSP certifications. Today he blogs five times a week, mostly about retro computers and retro gaming covering the time period from 1975 to 2000.
Today I found an article in PC World that gives a somber assessment of the state of consumer routers, like the device that probably sits between you and the Internet.
I’m glad this is getting attention. There’s a lot more to it than what’s in the PC World article, but I’ve droned enough about what’s bad about consumer routers. It’s bad now, and it’s going to get worse before it gets better. Kudos to PC World for providing a bit of an action plan.
What if you want to go beyond what PC World is talking about? I’m glad both of you asked. Read more
David Farquhar is a computer security professional, entrepreneur, and author. He has written professionally about computers since 1991, so he was writing about retro computers when they were still new. He has been working in IT professionally since 1994 and has specialized in vulnerability management since 2013. He holds Security+ and CISSP certifications. Today he blogs five times a week, mostly about retro computers and retro gaming covering the time period from 1975 to 2000.
If you’ve ever upgraded a LogLogic universal collector and had it fail to work, it’s very disconcerting to see the error message when you try to reinstall the previous version: Downgrades aren’t supported. But there is a solution if you need to downgrade a Log Logic universal collector. Read more
David Farquhar is a computer security professional, entrepreneur, and author. He has written professionally about computers since 1991, so he was writing about retro computers when they were still new. He has been working in IT professionally since 1994 and has specialized in vulnerability management since 2013. He holds Security+ and CISSP certifications. Today he blogs five times a week, mostly about retro computers and retro gaming covering the time period from 1975 to 2000.
The TP-Link TL-WR841N (and the similar TL-WR841ND) is a lower-mid range router that routinely sells in the $20-$25 range. Although many people consider it an off-brand, TP-Link has had a following in the enthusiast community for a couple of years. I’ve been prone to recommend them because they have a better track record than many of the bigger-name brands of continuing to release firmware upgrades that fix security vulnerabilities. If you’re going to buy a router and leave it stock, you’re better off with a TP-Link than anything else.
I only used the stock firmware to load DD-WRT on it though, so about all I can say is that the TL-WR841N runs DD-WRT really well. Read more
David Farquhar is a computer security professional, entrepreneur, and author. He has written professionally about computers since 1991, so he was writing about retro computers when they were still new. He has been working in IT professionally since 1994 and has specialized in vulnerability management since 2013. He holds Security+ and CISSP certifications. Today he blogs five times a week, mostly about retro computers and retro gaming covering the time period from 1975 to 2000.
I found a couple of old Linksys WRT54G routers and decided to load DD-WRT on them. The first one, an abandoned-by-Linksys WRT54GS model, gave me some trouble, which led me to buying a TP-Link unit to run DD-WRT on. The second unit, which was a vanilla WRT54G, still had firmware available on Linksys’ site, so the upgrade was somewhat straightforward–it went by the book, at least. I installed the latest Linksys firmware, then installed the DD-WRT mini build, then upgraded to the full build.
This Linksys WRT54G was one of the best pieces of computer hardware of its day. I can’t recommend it as a router anymore but it can still help you out as an access point.
After getting DD-WRT running on it, I configured it to behave as an access point on channel 6. I was surprised at how strong the signal was. Years ago, I ran a pair of WRT54G routers, and they struggled to cover the house. It’s possible that was due to age, or perhaps I was getting too much interference from my neighbors since we were probably all running our wireless on the default channel in those days because none of us knew better.
As for my WRT54GS, when I tried to upgrade it, I got a nice message stating, “Upgrade are failed!” Nice. Too bad it didn’t add “All your base are belong to us.” That’s when I learned you need to install the last Linksys upgrade first, then upgrade from that. So I downloaded that from some forum, tried flashing that, and received the same message. So I set it aside, figuring I bricked the unit. A few days later, after getting the WRT54G running, I fired up the GS, visited its configuration page, and… found DD-WRT running on it! Upgrade are failed? More like all your upgrade are belong to ME.
In all honesty, I probably got lucky. It’s always best to go by the book on things like this. Including the 30-30-30 reset.
The WRT54G is limited, of course, to 802.11b and 802.11g (54 megabits max) but as a complement to a more modern router, it still has a few tricks left. If you have one laying around, it won’t cost anything aside from about 30 minutes’ worth of effort to load DD-WRT on it and see what it can still do for you.
And if you don’t happen to have one laying around, it’s not hard to find a used WRT54G. I find them at estate sales, garage sales, and rummage sales pretty frequently because a lot of people set them aside when they either buy newer, faster routers or their ISP forces them into an all-in-one unit. Don’t pay too much for it, because it’s aging technology, but I’d say they’re worth grabbing for $5 or less.
David Farquhar is a computer security professional, entrepreneur, and author. He has written professionally about computers since 1991, so he was writing about retro computers when they were still new. He has been working in IT professionally since 1994 and has specialized in vulnerability management since 2013. He holds Security+ and CISSP certifications. Today he blogs five times a week, mostly about retro computers and retro gaming covering the time period from 1975 to 2000.
There’s an addition on the back of our house, probably added in the 1970s or 80s, where the wi-fi reception is exceptionally poor. Something about the walls makes it tricky, and I also suspect we get some interference from the neighbors behind us. I solved the problem with a cheap router running DD-WRT as an access point. Read more
David Farquhar is a computer security professional, entrepreneur, and author. He has written professionally about computers since 1991, so he was writing about retro computers when they were still new. He has been working in IT professionally since 1994 and has specialized in vulnerability management since 2013. He holds Security+ and CISSP certifications. Today he blogs five times a week, mostly about retro computers and retro gaming covering the time period from 1975 to 2000.
If you want a nice router or access point, you can do a lot worse than upgrading a TP-Link TL-WR841N to DD-WRT. The TL-WR841N is inexpensive and reliable, and DD-WRT runs well on it once you get the right build.
You can configure it to be a router, an access point, or a repeater, based on what you need. It usually costs $25 and sometimes you can find one on sale for $20 or even $15, so it’s a huge bargain. Even if you want 802.11ac speeds, a TL-WR841N makes a fantastic secondary access point to improve your connectivity.
Let’s get on with the upgrade. In the case of the TP-Link TL-WR841N (or TL-WR841ND, which uses the same build), it’s really easy–10 steps. Read more
David Farquhar is a computer security professional, entrepreneur, and author. He has written professionally about computers since 1991, so he was writing about retro computers when they were still new. He has been working in IT professionally since 1994 and has specialized in vulnerability management since 2013. He holds Security+ and CISSP certifications. Today he blogs five times a week, mostly about retro computers and retro gaming covering the time period from 1975 to 2000.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.