Solved

wireless security for both Mac and PC's in a house

Posted on 2011-02-27
5
399 Views
Last Modified: 2012-05-11
I have an old Linkysis wireless G router. I'm currently running 2 PC's on it, but 2 MAC's as well. We need to put security on the wireless but someone at the MAC Store said we couldn't use WEP... that it had to be something else to work with the MAC's. What is that, and will it also work with the PC's? Any special problems to look out for? Any assistance is appreciated. Thank you!
0
Comment
Question by:spinsouth
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
5 Comments
 
LVL 6

Accepted Solution

by:
mrcannon earned 500 total points
ID: 34994265
This knoledge base article from Apples site references the use of both WEP and WPA in Mac OS X 10.3 and later.  Mac OS X 10.3 is 2008.  Are any of your Apple's earlier than 2008?
0
 

Author Comment

by:spinsouth
ID: 34994330
No, everything is under a year old. Thanks for the article link!
0
 
LVL 6

Expert Comment

by:mrcannon
ID: 34994338
Sorry missed the link here it is
http://support.apple.com/kb/TA21448
0
 

Author Comment

by:spinsouth
ID: 34994344
Thank you so much!! Going to read it now.
0
 

Author Closing Comment

by:spinsouth
ID: 35363755
Thanks. That article helped me handle everything!
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

MAC Filtering: MAC filtering is like handing a list of names to a doorman. If someone comes to the door and mentions a name, this name is checked by the doorman on his list and granted or denied access by this. This means that if someone menti…
Coaxial cable bending There are several factors that govern the selection of coaxial cable for your Machine to Machine (M2M) application: the location of cable runs, either indoor or outdoor, inside or outside an enclosure, maximum bending and the…
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question