From: "J R FOX" Received: from [192.168.100.201] (HELO mail.2rosenthals.com) by 2rosenthals.com (CommuniGate Pro SMTP 5.1.16) with ESMTP id 2189365 for os2-wireless_users@2rosenthals.com; Sun, 07 Feb 2010 11:54:34 -0500 Received: from secmgr-va.2rosenthals.com ([162.83.95.194] helo=mail2.2rosenthals.com) by secmgr-ny.randr with esmtps (TLSv1:AES256-SHA:256) (Exim 4.43) id 1NeAP0-0005VA-KD for os2-wireless_users@2rosenthals.com; Sun, 07 Feb 2010 11:54:33 -0500 Received: from web81402.mail.mud.yahoo.com ([68.142.199.130]:31527) by mail2.2rosenthals.com with smtp (Exim 4.69) (envelope-from ) id 1NeAOp-0004gy-2x for os2-wireless_users@2rosenthals.com; Sun, 07 Feb 2010 11:54:20 -0500 Received: (qmail 1760 invoked by uid 60001); 7 Feb 2010 16:47:37 -0000 X-CTCH-RefID: str=0001.0A020208.4B6EF03C.0037,ss=1,fgs=0 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=pacbell.net; s=s1024; t=1265561257; bh=HVockPM3f/yBXwf3I18ywzC9Lz/CwbfggEpfZpcqYKE=; h=Message-ID:X-YMail-OSG:Received:X-Mailer:Date:From:Subject:To:In-Reply-To:MIME-Version:Content-Type; b=CCuKyWgt9u9dcNmehN/tZYds6SCR9sDHsiJwObjVjyoCinnQ5CI2Q9epvPmSvii2jbAtkDTu9/a7s5p4+9o6y1YlY//4HJAtaMoPpW0A8ks5RKIEdMmT3jKQdsFE9Bvsw7yOdos1NsRkonkgqJelNZmxeJYy2pkugwx+5MUX7R0= DomainKey-Signature:a=rsa-sha1; q=dns; c=nofws; s=s1024; d=pacbell.net; h=Message-ID:X-YMail-OSG:Received:X-Mailer:Date:From:Subject:To:In-Reply-To:MIME-Version:Content-Type; b=UZvkZlIPmP2RUpTQmqTV4A2efFyYOb7axS6VgrcVC+sXWiOJaoYbRMILi5KnELH8P2aMdF2PXXaUFtEaBGiAqI/ZJ2fba7Pk9rQU6QeFLPREkkHOiZz58Nakzw0M1ZmYFBB70epBhWJx9dHkJ/fiiTZ4sSSOWn6rtci+cVVV038=; Message-ID: <813776.1295.qm@web81402.mail.mud.yahoo.com> X-YMail-OSG: TG2bG.YVM1nHo012Uw3uAkJeVzAvdJcp2oer.o7qRxEs3R6kONVAKKGbetRulLI9HGgGMInPztCU2dHdAcSpWviYzE7BAFN32IVyKfBd4tVBzGOzfOB4oocvobyLmxcQoIzxfcYTDIjd8dnoUuyw3TN6A_hQ4bFgOOXizZXDnvkmbA_iu2y9GyYlNQS0V5LO6NZZ7gVdfansBZvYDmRpfFHMJ_SYRy8FKyBMDL2g2jQB_QsQDanuU6a3.ESVowSUayP595oJNa.KT921j.IYTQEpmKVqVrQYz_46KILUZqGDZ4CrfhiuV78dSYzDDb8AQjOBj3hM.mdvzF0eZCsD.39TKWA7DlUtK9ZonjdnM5WQstjq2OzifIKQxNJdfmI.nLXTQ5k0QCCK9nDiwizlmtnbpdlfkZ4K60HvqpcF7FXmq0PF9xebWG9qoKrmNbT4gbQRT2B2iusnhNI140QpxaDfl5eInvNoy_2g0V2g5flZZPduyZlwJDdIv0ECz.LUENNsiP2u6T2KYjRipQiTU_s- Received: from [72.130.141.223] by web81402.mail.mud.yahoo.com via HTTP; Sun, 07 Feb 2010 08:47:37 PST X-Mailer: YahooMailClassic/9.1.10 YahooMailWebService/0.8.100.260964 Date: Sun, 7 Feb 2010 08:47:37 -0800 (PST) Subject: eCS install of a new NIC To: OS/2 Wireless Users Mailing List In-Reply-To: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-Spam-Score: 0.0 (/) X-Spam-Report: _SUMMARY_ From the SCOUG List: --- On Sat, 2/6/10, Ray Davison wrote: > So what NIC is it? I have a couple on-board RTL 81XX > that are not 8139 that work with the 8139 files. This is what I just bought: http://en.ecomstation.ru/hardware.php?action=item&id=1621 But in the case of some recent model laptop or desktop, where the wireless NIC is some chip on the MB, who knows what it may be. (Hopefully the PCI utility will be able to i.d. it.) Standard eCS support is not a given. Genmac improves the odds, in many cases. > >> And why do you want to know the MAC address of a > NIC. I have never known the address of any of mine. > > > > If you're using WPA or WPA-2 (I will be) to connect > wirelessly, you'd need this to tell the router *which* > devices have permission to connect. The Mac address > will be on a sticker on physical cards, NIC-sticks, and > Access Points like the Asus, but won't be so labeled if it > is just a chip on the MB. > > The only device that is "allowed" to connect wirelessly to > my router is the one in which I entered the password. > I didn't tell the router who to let in, I told my laptop how > to get in. I thought our routers were similar. Well, I have before me the example of how my brother (who understands this stuff far better than I do) set up another relative's wireless router -- which is how he always does it. It is set up for WPA2-AES. Entered into a table in the router is a list of about 15 MAC addresses, belonging to the NICs of various household or guest computers. If YOUR device is not on that list, you get an *immediate reject* when trying to reach the router -- I don't think you even get as far as the Password phase. That is supposed to be the best security you can set up with standard, consumer-grade hardware. (Or maybe my brother he's just paranoid.) He also turns OFF the broadcast of SSID, but Lewis told me that this is a rather iffy proposition, with WPA-2. (Is that just for OS/2 ? It seems to have worked out fine on the other routers my brother sets up, which are Dark Side only.) Ray, I know you live in a more remote area, where security is maybe not as much of a concern, but I gotta tell you 'That is NOT the norm.' Take a look at this excerpt from a user review of another adapter, from NewEgg: "Cons: Range could be better, but that's why the antenna is removable! I plugged in a high-gain antenna and that eliminated the issue." "Other Thoughts: I bought this for the sole purpose of wardriving because of its compatibility with Linux, specifically BackTrack (RALINK chipset). It works very well. Injection is flawless on most modes, and I can usually break WEP in 15 minutes. Excellent device, especially for the price." At least he was unusually candid about his intentions. I may take this to the wireless list for additional response. Jordan