psychic stalker
Enter WPA:
WPA uses a much more secure encryption standard called AES. This algorithm is not (yet) known to have any security flaws, and so is still considered "secure." It's used in a 128-bit mode, which would take current computers more than 100 years to crack a single chunk of data. Combined with TKIP (which changes the encryption key with every packet of data), that makes WPA much, much more secure.
WPA had some flaws, though, due to the limitations of old wireless cards, and so anything that uses the WiFi logo that was also made after 2006 also supports WPA2 (a requirement of using the logo), which fixes those problems.
So long as your passphrase is strong (long and random), WPA2 is considered "unbreakable."
But, some people don't like typing long passwords. So they came up with WPS, which uses a PIN# and a button press to enable the connection. Within a week of that being on the market, it was broken, and it's possible to recover the PIN# and get connected to a WPS-enabled router almost instantly.
You should never enable WPS.
I'd like to correct a bit on this. You don't actually combine TKIP
and AES, you choose one or the other.
The flaws in WPA, and even WPA2 are in the use of TKIP. TKIP is RC4 based, and use of TKIP in either WPA or WPA2
are considered weak wireless encryption at this point.
The only considered-secure configuration currently is the use of CCMP under WPA2 (otherwise known as AES-CCMP or just AES usually in a wireless security configurations page).
So basically Use WPA2 AES/CCMP if possible. Any moderately decent wireless router made in the past 4-5~ years should generally support WPA2 under AES/CCMP.
Funfact too;
Technically speaking 802.11n spec states that you shouldn't even exceed 54Mbit or enable the 20/40Hz mode
unless you run your wireless WPA2 in AES/CCMP mode, but sadly most ignore this.