There's a bajizzilion of other methods of making your network secure appart from encryption. For example you can:
1. Lock down the DHCP server and assing IP's to every appliance in your house, so that the ammount of distributed IP's is a set value ranging from, let's say 10.0.9.2 --> 10.0.9.4, 10.0.9.1 being the Router's adress, 10.0.9.2 being the PC and 10.0.9.3 being the DSi. This way no other appliance will be able to connect. Obviously the number of local IP's is limited and it won't take long before your range is hacked, however it takes valuable time. Next method.
2. You can limit the allowed connections to specific MAC adresses as Krove stated - works basically the same as method 1.
QUOTE said:
Getting and cloning a mac address is even easier.
As far as I know, two identical MAC's cannot access one router at a given time. Even if a MAC is cloned, the router is still secure as long as the "cloned" device is connected.
3. You can disable SSID broadcast - some will say that it can be detected with AirJack or AirMagnet. My answer?
QUOTEIt is undeniably true that there are programs that hackers can use to find out your SSID, but why would they even bother? I went for a simple walk around the block today, and every 10 paces I refreshed the WiFi search on my iPod Touch. I found a total of about 25 wireless signals, 4 of which weren't even secure. No password, no WEP key. Just the SSID. I actually connected to one of them from the street, and I was able to briefly use it for the internet. Now why would a hacker go through all the trouble of decoding your SSID when the majority of wireless connections have a visible SSID that can be picked up from across the road? (...) Although you may not be ENTIRELY safe with a hidden SSID, you're still a hell of a lot less likely to get targeted than anyone else in your street. ~Wi-FiPlanet, post by Penwin
4. You can mix-n-match all of the above.
5. If you're more experianced in programming, you can use a redirection trick by creating a virtual network and asking the router to re-direct all connections comming from mac's that are not included in its list. This way, a hacker will be under a false impression of hacking in, wheras he'll truly be in an empty network, not your own. (often used by companies owning hotspots, theoretically you get connected but once you open a web browser you get to see... their commercial, and methods of paying to get connected X3) It's a difficult task though and for me seems tedious.
Combining a few methods will make hacking your network a long and tiresome task thus making you a less likely target, unless there's someone who likes a challange and has no life living nearby. X3
WEP is not really a problem, even if the password is sniffed, there's still a long way for a hacker to "get in" when he hasn't got an adress assigned or the router doesn't allow his mac to interact with it. It's the Router itself that should have a secure Login and Password.
If you think that WPA or WPA2 lets you sleep comfortably then you're incredibly wrong. There's ALWAYS a way to hack in, even if you stand on your head and clap with your ears.
EDIT: If anyone's REALLY feeling uncomfortable about having WEP, why not simply secure your PC better so nobody does any harm to it? ^^; Firewalls are commonly available, even if someone does hack into a router, you can secure yourself from possible damadge... and in the end of the day, has anyone ever hacked wirelessly any of your computers? It never happened to me, it was always Redtube's fault X3