1) (easy) Router caches can be poisoned
2) (hard) Firmware can be flashed
3) (hard) Firmware can be hacked
For 1 your host or network has to be compromised.
For 2 your host or network has to be compromised and the hacker must have your model-specific firmware.
For 3 you don't have to be compromised but they need to know vulnerabilities specific to your model.
This is a lot like BIOS viruses. You can run some generic ones and they'll work on a lot of boards but they'll never work on every board - same goes for routers.
Sure glad I changed my modem password when I first got it. I re-call it being roughly 128 characters long and containing upper/lowercase, numbers and symbols in it.
Sure glad I changed my modem password when I first got it. I re-call it being roughly 128 characters long and containing upper/lowercase, numbers and symbols in it.
The password strength on your router should apply to both network access as well as the admin password. Personally I do not allow for remote admin of my router. Both network and local admin passwords are insane. I have also recently updated the firmware on my router. Something Secunia PSI and FileHippo will never tell you is when there is an update to your routers firmware. We all need to be aware and check with your respective venders on a regular basis.
I'm not to impressed with the Microsoft password strength checker. Type in 39 1's and it will give you a score of "Best", really? A bunch of 1's and you think that is a good password? I think the algorithm used to test the so called strength of your password needs to be reevaluated.
I think it rates the password's strength based on how many characters it has.
I'd just use some phone number you can remember or something, besides, I don't think anyone or anything would really guess 39 ones, afaik.