Posted 19 May 2010 - 08:08 AM
Thank you for your suggestion and I will try to educate myself further on this.
As is probably obvious, I am not very computer experienced, but I do hear a lot about sniffers and keyloggers (which if I do understand correctly, the latter will make the encrypted nature of a SSL connection meaningless as one's login and password keystrokes can be recorded).
I have great respect for the damage that malcreants can do to one's financial security and that is the reason for my "overly" paranoid concerns. Where my retirement security is at risk of being impacted, I am happy to be characterized as paranoid, even "overly" paranoid. While I might well be paranoid, if I can just use the two routers (one a Wifi for Group 1, the other wired only for Groups 2 & 3) and the two switches I have to minimize risk, I want to do this.
Instead of DMZ, I probably should have said "a less secure area" where whatever my guests get up to on the Wifi might be isolated from our home lan, the TIVO can update itself, etc. I have no idea how easy it might be to hack a Tivo or an Aluratek Internet Radio compared to a PC, but certainly would not be surprised to learn that they are much easier to get into and I doubt if they operate in a tunneled mode.
I am aware that once a SSL connection is established, the communication between the Apple and the bank will be more secure than almost anyone wants to try to capture and penetrate, but what I don't know is:
-when establishing a SSL connection, are the login and passwords also encrypted or are they sent before the SSL is estabished?
-if before, could not one of the other PC's sniff this info if they are also on the lan?
-in any case a key logger on the Apple could capture the keystrokes, no?
I hope that I have better explained my concerns and clarified what I want to accomplish. Any further assistance anyone can give will be most appreciated.