if you didn't already, flash to either one of those standard firmware after you have the initial dd-wrt flash done. the one from the router database is way outdated and full of bugs.
and make sure to do a 30-30-30 reset before and after flashing! very critical to do so.
Well I was hacked again, it is time for plan B. I did explore the router app that came with the router when I reset everything. Even if it takees him half the time it did last time I should be wired by then.
I can turn off the wireless under wireless modes then just use the wires. I disabled wireless access to the modem. ntense69 was right wired is a better route. I may move the router to a more central location. That location will limit the wireless, it is below ground, if I go back to wireless and it is ideal for setting up a radio barrier. It is close to the outside wall where I believe the threat is coming from. I can put a barrier on the basement wall.
I was reading a tech mag and it kinda mentioned a possible hole in WPA security so I tracked it down. WPA is not secure anymore.
Quote:What is the "Hole196" vulnerability?
"Hole196" is a vulnerability in the WPA2 security protocol exposing WPA2-secured Wi-Fi networks to insider attacks. AirTight Networks uncovered a weakness in the WPA2 protocol, which was documented but buried on the last line on page 196 of the 1232-page IEEE802.11 Standard (Revision, 2007). Thus, the moniker "Hole196".
Central to this vulnerability is the group temporal key (GTK) that is shared among all authorized clients in a WPA2 network. In the standard behavior, only an AP is supposed to transmit group-addressed data traffic encrypted using the GTK and clients are supposed to decrypt that traffic using the GTK. However, nothing in the standard stops a malicious authorized client from injecting spoofed GTK-encrypted packets! Exploiting the vulnerability, an insider (authorized user) can sniff and decrypt data from other authorized users as well as scan their Wi-Fi devices for vulnerabilities, install malware and possibly compromise those devices.
In short, this vulnerability means that inter-user data privacy among authorized users is inherently absent over the air in a WPA2-secured network.