|
|
Increasing the Range of your Wireless Access Points
How far can wireless go? Well, really, the answer is as far as
you want it to, or as far as you can afford. You see, even
though each wireless transmitter has a range limit, you can
install things called wireless extension points, often...
My Space Is Your Space: Myspace.com
This article has an accompanying comic strip that can be found at: http://www.m6.net/articles/images/myspace.jpg
You know, I've been writing articles on the Internet for over 2 years now and it never seems to amaze me how slow I am to pick up...
Protection for your computer system - Painless and free !
Painless (and FREE) P.C. Protection
Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet is a veritable minefield of things that can invade your PC and affect it’s Security and Performance.
You can do something...
Webcams: Science-Fiction Becomes Reality
One of the most incredible inventions I’ve ever come across is the web cam and its process of video conferencing. This is just so futuristic I can’t believe they really exist and are readily available to anyone with the Internet, speakers, and...
What Is Wireless Networking?
Wireless networking is just what it sounds like -- a way of creating networks without any wires! If this sounds exciting to you, then read on.
With a wireless network, you can create radio connections between computers that let them communicate...
|
|
|
|
|
|
|
|
The Perils of Wireless Networking...
In November 2003, Toronto police arrested a man in an upscale residential neighborhood. They noticed his car driving slowly the wrong way down a one-way street. Upon stopping the car, the police discovered the driver naked from the waist down. What was he doing?
He was using his laptop to download and watch "kiddie" porn from the Internet! How? He was connecting to the internet using unprotected wireless systems in the houses near the road!
Here is the problem, if someone were to access the Internet and download illegal material, then disconnect and drive off; it would look like the homeowner did the downloading. How hard would it be to convince the FBI that you were a victim?
This is not the only time this has happened. In a recent interview, attorney Joseph Burton, of Duane Morris Law Firm, said, "Is it possible a home owner can be liable for a lack of security on a wireless network? Yes, if they are negligent in setting up security." (Richard Shim, CNET News.com).
According to research by the World Wide War Drive over 228,537 wireless access points were detected. Over 62% were totally open and unprotected! In San Antonio Texas, the percentage of unprotected networks is slightly higher.
Some wireless access points can extend their coverage over 300 feet from the unit. Sure, the farther away, the slower the connection, but even one mbps is faster than a dialup connection. Add that to being untraceable and you have a pervert's heaven!
Having a wireless network connection is a great thing; the freedom it gives you is priceless. With a few precautions, you can secure your wireless connection and surf the World Wide Web from the comfort of your easy chair, bed or backyard.
Conducting a casual site survey around your home will tell you a lot about your vulnerability. Do you live right up on the road? How far from your home, are your neighbors? How far does your signal carry from the wireless unit?
After answering these questions, you can proceed to securing the wireless network itself.
Unfortunately, consumer routers are shipped wide open. That is they have no preconfigured security. You, the homeowner, will have to configure the security setting yourself.
Your wireless
router and network interface card (NIC) are the parts that actually talk to each other. Each of them has a MAC address. This is a unique number assigned to every NIC made, worldwide.
Using this MAC address, you set the router security to talk only to certain other MAC addresses. Therefore, if you have two laptops in your network, you add both MAC addresses to your router security setup and any other MAC addresses are blocked.
This security setup works well for keeping the average wireless user out of your system, but a competent hacker can bypass it. A technique called spoofing allows the hacker's computer to pretend to be one of your laptops and trick the system into letting him in.
To prevent this you would need to add additional layers of security. Keep in mind though, every additional layer of security adds to the burden of your network. It slows things down.
Litigation seems to be a national past time these days. Protect yourself and your family by taking some of the precautions listed above. If you feel you need the extra protection offered by WEP or another encryption scheme contact your locate computer technician and have him configure it for you.
This is an especially important decision for those who run their own business and use wireless products. How angry would your customer's be if someone stole their information off your network and used it to open accounts in their name?
Identity Theft is only one possible outcome, if your network contains patient data you could be in violation of the Health Insurance Portability and Accountability Act (HIPAA). Then you would be dealing with the federal government!
Take the time to protect yourself and your family. Security does take a little time, but it could save you many problems down the road. About the Author
SA Secure, a San Antonio Texas company specializing in desktop support and help desk services for small to medium businesses. Our goal is to provide an alternative to maintaining an expensive in-house IT staff or relying on many different individual computer repair technicians. Our services allow you to obtain an expert level of cost effective technical support without the need to maintain technicians on-site.
|
|
|
|
|
Computer networking - Wikipedia, the free encyclopedia |
Network cards such as this one can transmit data at high rates over Ethernet cables. ... Computer networking is sometimes considered a sub-discipline of ... |
en.wikipedia.org |
  |
Social network - Wikipedia, the free encyclopedia |
Social network analysis (related to network theory) has emerged as a key ... Social networking also refers to a category of Internet applications to help ... |
en.wikipedia.org |
  |
Networking on the Network |
Here, then, are some of the fundamentals of professional networking. ... Asking advice from the people in your network is part of the process. ... |
polaris.gseis.ucla.edu |
  |
Computer Networking - Wireless Networks - Home and Wireless ... |
Site offers coverage of computer network technology in basic networks, VPN, Web servers, Intranets and Extranets, tutorials, and troubleshooting. |
compnetworking.about.com |
  |
ITtoolbox Networking Knowledge Base |
A networking community for IT professionals. Focusing on connectivity, network management, network operating systems, security, and other aspects of ... |
networking.ittoolbox.com |
  |
Howstuffworks "How Home Networking Works" |
How home networking works and the different methods to create a home network. |
www.howstuffworks.com |
  |
SmallNetBuilder |
SmallNetBuilder provides networking and IT news, reviews, help and information for professional and "prosumer" SOHO and SMB users. |
www.smallnetbuilder.com |
  |
Network Computing - Computer Networking, Network Security and ... |
Network Computing - Computer Networking, Network Security & Management news. Enterprise product reviews, comparisons and analysis built by IT professionals ... |
www.networkcomputing.com |
  |
CareerJournal | Career Networking - Professional Network ... |
Professional Network - Career networking news and advice from The Wall Street ... Networking tips that will help you advance your job search or career. |
www.careerjournal.com |
  |
Trail: Custom Networking (The Java™ Tutorials) |
The first describes the networking capabilities of the Java platform that you ... The second provides a brief overview of networking to familiarize you with ... |
java.sun.com |
  |
Windows Server 2003, Longhorn Server & Vista Networking Articles |
Features a wealth of tutorials on various Windows networking related topics such as setting up Windows NT/XP/2000/2003 networks, troubleshooting, ... |
www.windowsnetworking.com |
  |
IBM Networking | IBM Networking |
The era of e-business on demand requires superlative networking capability. ... IBM Networking Services provides e-business solutions anywhere in the ... |
www.networking.ibm.com |
  |
Computerworld - Networking - Voip - Bluetooth - Firewall - Wireless |
Computerworld, the 'Voice of IT Management' is your information source for computer networking. Access up to date information on LAN/WAN, hardware/devices, ... |
www.computerworld.com |
  |
HP Networking products and solutions |
HP ProLiant networking products provide high-powered, simple solutions for enterprise, business, or home networking environments, including ProLiant and ... |
www.hp.com |
  |
Monster: Networking |
Networking Networking Timeline. Networking Timeline · Making New Contacts · How to Set Up and Run an Informational Interview · Nurturing and Keeping ... |
content.monster.com |
  |
Access | CNET News.com |
Phone company shrugs off competition concerns over Verizon's Fios network, saying existing copper is doing the bandwidth trick. ... |
news.com.com |
  |
Network Management: Covering today's Network topics |
Find the latest information on Network Management, Network Security, Network Design and more. |
searchnetworking.techtarget.com |
  |
cisco networking academy program |
cisco.netacad.net/ - 1k - Cached - Similar pages |
|
  |
Networking and Your Job Search: The Riley Guide |
Networking starts long before a job search, and you probably don't even realize you are doing it. ... In Terms of a Job Search, Networking is the way to Go! ... |
www.rileyguide.com |
  |
NetworkWorld.com |
Networking news, reviews, opinions and forums from the Leader in Network Knowledge. |
www.networkworld.com |
  |
|