WEP is easily hacked
WEP keys are usually stored in a text file on the router and are not encrypted. This means the key can be extracted with little effort, making it possible to crack WEP encryption with a very short amount of time. [ So what? why should we care ? ]
WEP keys are usually stored in a text file on the router and are not encrypted. This means the key can be extracted with little effort, making it possible to crack WEP encryption with a very short amount of time. [ So what? why should we care ? ] The most common WEP attack is called brute-force, which means attempting all possible keys one by one until the correct key is found. This is a very time-consuming attack but it can be sped up by using distributed.net, or using custom hardware like the AirCrack (for Windows). [ So what? not much can you do about it once your key is broken. ]

It can be difficult to configure correctly
It is difficult to configure the software correctly, and most users will use the default settings. This can lead to poor security by sending unencrypted data to undesired locations. [ So what? why should we care ? ]
This can then cause a number of other issues. Firstly, the encryption key must be manually entered into the access point and then into a computer connecting wirelessly to it. There is normally a limited number of keys available, providing only short term protection against unauthorised access. [ Why? ]
Also, if there are many users then each user’s computer will have a separate key and hence there is more need for security in order to prevent more individuals from connecting than are authorised. [ Why? ]
