|
Desktop Security Software Risks - Part 1
This is the second in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions.
Reason #2: the Desktop Security Software Risks
The risks of placing software on the desktop are such that I...
Finally... An Understandable Introduction To Computers
When you mention the word "technology," most people think about computers. Virtually every facet of our lives has some computerized component. The appliances in our homes have microprocessors built into them, as do our televisions. Even our cars...
iSCSI vs. FC for Meeting Mission Critical Requirements
Introduction
Mission
Critical Data is just what its name says: critical to the
core functioning of an enterprise. Mission critical data must be
available 24x7 and fully backed up for immediate recovery in the
event of disaster....
Passwords or Pass Phrase? Protecting your Intellectual Property
Passwords or Pass Phrase? Protecting your Intellectual Property Much has been said on the theory of password protection for files, computer login, and other network access. In the past we used a combination of letters, special characters, and other...
Which Web Host Should I Choose To Host My Business Site?
Which Web Host Should I Choose To Host My Business Site? By Jonathan Caputo This article focuses on the differences between various business hosting services, and helps the reader identify some important criteria in choosing a hosting provider for...
|
|
|
|
|
|
|
|
Wireless Network Security
Working from home has its advantages, including no commute, a more flexible work schedule and fresh coffee and home-cooked meals whenever you want.
But working from home while using a wireless local area network (WLAN) may lead to theft of sensitive information and hacker or virus infiltration unless proper measures are taken. As WLANs send information over radio waves, someone with a receiver in your area could be picking up the transmission, thus gaining access to your computer.
They could load viruses on to your laptop which could be transferred to the company's network when you go back to work.
Up to 75 per cent of WLAN users do not have standard security features installed, while 20 per cent are left completely open as default configurations are not secured, but made for the users to have their network up and running ASAP.
It is recommended that wireless router/access point setup be always done though a wired client.
Change default administrative password on wireless router/access point to a secured password.
Enable at least 128-bit WEP encryption on both card and access point. Change your WEP keys periodically. If equipment does not support at least 128-bit WEP encryption, consider replacing it.
Although there are security issues with WEP, it represents minimum level of security, and it should be enabled.
Change the default SSID on your router/access point to a hard to guess name. Setup your computer device to connect to this SSID by default.
Setup router/access point not to broadcast the SSID. The same SSID needs to be setup on the client side manually. This feature may not be available on all equipment.
Block anonymous Internet requests or pings.
On each computer having wireless
network card, network connection properties should be configured to allow connection to Access Point Networks Only. Computer to Computer (peer to peer) Connection should not be allowed.
Enable MAC filtering. Deny association to wireless network for unspecified MAC addresses. Mac or Physical addresses are available through your computer device network connection setup and they are physically written on network cards. When adding new wireless cards / computer to the network, their MAC addresses should be registered with the router /access point.
Network router should have firewall features enabled and demilitarized zone (DMZ) feature disabled.
You can test your hardware and personal firewalls using Shields Up test available at http://www.grc.com
All computers should have a properly configured personal firewall in addition to a hardware firewall.
Update router/access point firmware when new versions become available.
Locate router/access point away from strangers so they cannot reset the router/access point to default settings.
Locate router/access point in the middle of the building rather than near windows to limit signal coverage outside the building.
While none of the measure suggested above provides full protection as counter measures exist, a collection of suggested measures will act as a deterrent against attacker when other insecure networks represent easier targets.
About the Author
The author of this article ia a software developer, consultant and author of numerous books. Visit his site for more infomation about the Top Spyware Removal Software.
|
|
|
|
|
Tom's Hardware |
: Tom's Hardware Guide is the Internet's premiere resource for hardware news and reviews. |
www.tomshardware.com |
  |
HardwareCentral - Your source for in-depth computer hardware info. |
HardwareCentral is the #1 Hardware Information Resource on the 'Net. Featuring over 600 pages of Hardware information, including advice on System ... |
www.hardwarecentral.com |
  |
Apple - Hardware |
Find your favorite Mac, iPod and other Apple accessories. |
www.apple.com |
  |
Ace Hardware |
Nationwide (United States) hardware and home improvement retailer. Includes products, dealer locator and corporate information. |
www.acehardware.com |
  |
Computer hardware - Wikipedia, the free encyclopedia |
The hardware of a computer is infrequently changed, in comparison with software and ... Personal computers, the computer hardware familiar to most people, ... |
en.wikipedia.org |
  |
Hardware - Wikipedia, the free encyclopedia |
Hardware is the general term that is used to describe physical artifacts of a technology. ... In a looser sense, hardware can be major military equipment, ... |
en.wikipedia.org |
  |
Open Directory - Computers: Hardware |
Hardware Central - Computing-centric community providing vital information, support, tools and interaction facilities for power computer users and ... |
dmoz.org |
  |
Microsoft Hardware – Home Page |
Learn about Microsoft mice, keyboards, desktop sets, webcams, media center peripherals, gaming products, fingerprint readers and presentation tools. |
www.microsoft.com |
  |
AnandTech: your source for hardware analysis and news |
Independent hands-on reviews of computer hardware such as motherboards, graphic cards, and CPUs. |
www.anandtech.com |
  |
hardware.com - Routers, switches, firewalls, servers, memory ... |
Supplier of new and refurbished networking hardware and approved and compatible network accessories. Located in the United Kingdom. |
www.hardware.com |
  |
Slashdot: News for nerds, stuff that matters |
From the article: "Although the news caused barely a ripple of reaction in the audience of software and hardware engineers, there are industry analysts who ... |
hardware.slashdot.org |
  |
InformationWeek HardwareTech Center |
Our hardware coverage ranges from mobile computers and PDAs to servers and supercomputers, and the infrastructure issues enterprises deal with every day. ... |
www.informationweek.com |
  |
What is hardware? - A Word Definition From the Webopedia Computer ... |
This page describes the term hardware and lists other pages on the Web where you can find additional information. |
www.webopedia.com |
  |
Google Directory - Computers > Hardware |
Hardware Central - http://www.hardwarecentral.com/ Computing-centric community providing vital information, support, tools and interaction facilities for ... |
www.google.com |
  |
Gifts: Unique Gifts & Gift Ideas at Restoration Hardware |
At Restoration Hardware, you'll explore an exceptional world of high quality unique gifts. Browse our products to find gift ideas & more at Restoration ... |
www.restorationhardware.com |
  |
HwB: The Hardware Book |
HwB provides you with circuits, pinouts, cable/adapter descriptions and other technical information. |
www.hardwarebook.net |
  |
Reg Hardware: Product News and Gadget Reviews from The Register |
More Gadgets Stuff. 5th December 2006 12:09 GMT. Author: Reg Hardware ... 27th November 2006 15:31 GMT. Author: The Hardware Widow ... |
www.reghardware.co.uk |
  |
red hat hardware compatibility lists |
hardware.redhat.com/ - Similar pages |
|
  |
TrueValue.com |
Here's our tip to hang strands of lights with ease. Jeanenne & Jim Tucker Plantation True Value Hardware Richmond, TX ... |
www.truevalue.com |
  |
A complete illustrated Guide to the PC Hardware |
A complete illustrated Guide to the PC Hardware, Logic and Architecture. 500 easy-read articles about the modern PC. Understand the basic architecture of ... |
www.karbosguide.com |
  |