One way a hardware router can go seriously wrong and screw you is if
you have any Windows clients on the router that catch a certain class
of virus/trojan/creepware.
Basically there's some of these things that look for routers locally
at 192.168.0.1 and other "usual suspect" IP addresses, try to ID the
make of router and based on that try to log into them with a list of
known default usernames/passwords.
If they get in, they re-jigger them so as to make the world look
screwball for all users connected to that router, be they Linux,
Windows or Mac or whatever. A common trick is to make phishing URLs
look like the real URLs to banks and the like.
As far as I'm aware, doing a router hard reset with a toothpick to the
"hidden button" in the back will flush that sort of idiocy out.
When you set up a router for yourself or somebody else, always change
the default admin password on it, to block this sort of craziness.
Note that this is separate from the WiFi access password (WPA or WEP).
You want to cover that too of course (and use WPA unless you have a
non-WPA-compatible device!).
Jim
---------------------------------------------------
PLUG-discuss mailing list -
PLUG-discuss@lists.plug.phoenix.az.us
To subscribe, unsubscribe, or to change your mail settings:
http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss