-thorshammer88
What Eniregnat said. Though I prefer Apple's Airport as both wired and unwired router for the following reason:
Security
No, you Mac isn't the real risk of hacking here, someone sitting on your network, stealing bandwidth, and maybe doing something illegal with your wires, is the risk.
So as soon as you set yourself up and get everything working, lock that router down.
1. WEP well, fairly cracked anymore - I don't even bother
2. WPS, if your router supports it, do it if you can.
3. Access Control List, definitely! Access Control is a list your router has in it's memory of every wireless network device that is allowed to access it. Every network device has a MAC address and it can look like this 0e:58:f2:00:12:34 (depending on your router, those colons could be dashes "-")
4. Closed, or invisible network - o in propellerhead-speak No SSID. The SSID is the name of the router that the router broadcasts. A router can't be hacked if it can't be found
.
One further note on this: when I would get evil, and do a little wardriving, I'd come across a router who's SSID was 'linksys' or "d-link', these are default SSID's that these routers come with and is a big green flag to me that I can probably not only get on the network, but get into the admin consol of the device, and really ruin their day by locking them out of their own toy.
Why Apple's hardware? Unlike LinkSys, D-Link, or NetGear to name a few, Apple's Admin consol exists not on the device itself, but on your
computer. And when you update a setting, an encrypted burst transmission is sent to the router. Very very hard to hack - wardrivers will get confused ('cause
everybody's got linksys') and move on.