|
|
About Centralized Computer Systems
Before networking was used in computer systems, copying and printing was treated in varying ways. Many companies place inexpensive printers on each employee’s desk. Talk about using maximum number of resources. As this is quite convenient for...
Cisco Certification: Becoming A Truly Valuable CCNA
I've been active in the Cisco Certification track for four years, working my way from the CCNA to the coveted Cisco Certified Internetwork Expert title, and during that time I've conducted job interviews and casual conversations with hundreds of...
Does your event need to be live?
There are many choices to make when it comes to Webcasting: live vs. on-demand, audio vs. video, and more. So here are some of the questions you’ll need to ask yourself before deciding which way to go. Live versus On-Demand Although...
Internet: a Whole New World (Wide Web) Including Video and Audio
Who hasn't heard about the internet? No one! Unless, of course,
you have been living in a cave for the past decade! The internet
is the crowning achievement of the Information Age (which is
what we call this age we live in). It has...
Top 10 Ways For Web Designers To Find New Clients
TOP 10 WAYS FOR WEB DESIGNERS TO FIND NEW CLIENTS (c) Copyright 2002 by Tom Mulkern Given the “dotcom” bust and the global recession of the past 18 months it can be difficult for Independent Web Designers to put food on the table these days....
|
|
|
|
|
|
|
|
The Perils of Wireless Networking...
In November 2003, Toronto police arrested a man in an upscale residential neighborhood. They noticed his car driving slowly the wrong way down a one-way street. Upon stopping the car, the police discovered the driver naked from the waist down. What was he doing?
He was using his laptop to download and watch "kiddie" porn from the Internet! How? He was connecting to the internet using unprotected wireless systems in the houses near the road!
Here is the problem, if someone were to access the Internet and download illegal material, then disconnect and drive off; it would look like the homeowner did the downloading. How hard would it be to convince the FBI that you were a victim?
This is not the only time this has happened. In a recent interview, attorney Joseph Burton, of Duane Morris Law Firm, said, "Is it possible a home owner can be liable for a lack of security on a wireless network? Yes, if they are negligent in setting up security." (Richard Shim, CNET News.com).
According to research by the World Wide War Drive over 228,537 wireless access points were detected. Over 62% were totally open and unprotected! In San Antonio Texas, the percentage of unprotected networks is slightly higher.
Some wireless access points can extend their coverage over 300 feet from the unit. Sure, the farther away, the slower the connection, but even one mbps is faster than a dialup connection. Add that to being untraceable and you have a pervert's heaven!
Having a wireless network connection is a great thing; the freedom it gives you is priceless. With a few precautions, you can secure your wireless connection and surf the World Wide Web from the comfort of your easy chair, bed or backyard.
Conducting a casual site survey around your home will tell you a lot about your vulnerability. Do you live right up on the road? How far from your home, are your neighbors? How far does your signal carry from the wireless unit?
After answering these questions, you can proceed to securing the wireless network itself.
Unfortunately, consumer routers are shipped wide open. That is they have no preconfigured security. You, the homeowner, will have to configure the security setting yourself.
Your wireless
router and network interface card (NIC) are the parts that actually talk to each other. Each of them has a MAC address. This is a unique number assigned to every NIC made, worldwide.
Using this MAC address, you set the router security to talk only to certain other MAC addresses. Therefore, if you have two laptops in your network, you add both MAC addresses to your router security setup and any other MAC addresses are blocked.
This security setup works well for keeping the average wireless user out of your system, but a competent hacker can bypass it. A technique called spoofing allows the hacker's computer to pretend to be one of your laptops and trick the system into letting him in.
To prevent this you would need to add additional layers of security. Keep in mind though, every additional layer of security adds to the burden of your network. It slows things down.
Litigation seems to be a national past time these days. Protect yourself and your family by taking some of the precautions listed above. If you feel you need the extra protection offered by WEP or another encryption scheme contact your locate computer technician and have him configure it for you.
This is an especially important decision for those who run their own business and use wireless products. How angry would your customer's be if someone stole their information off your network and used it to open accounts in their name?
Identity Theft is only one possible outcome, if your network contains patient data you could be in violation of the Health Insurance Portability and Accountability Act (HIPAA). Then you would be dealing with the federal government!
Take the time to protect yourself and your family. Security does take a little time, but it could save you many problems down the road. About the Author
SA Secure, a San Antonio Texas company specializing in desktop support and help desk services for small to medium businesses. Our goal is to provide an alternative to maintaining an expensive in-house IT staff or relying on many different individual computer repair technicians. Our services allow you to obtain an expert level of cost effective technical support without the need to maintain technicians on-site.
|
|
|
|
|
Computer networking - Wikipedia, the free encyclopedia |
Network cards such as this one can transmit data at high rates over Ethernet cables. ... Computer networking is sometimes considered a sub-discipline of ... |
en.wikipedia.org |
  |
Social network - Wikipedia, the free encyclopedia |
Social network analysis (related to network theory) has emerged as a key ... Social networking also refers to a category of Internet applications to help ... |
en.wikipedia.org |
  |
Networking on the Network |
Here, then, are some of the fundamentals of professional networking. ... Asking advice from the people in your network is part of the process. ... |
polaris.gseis.ucla.edu |
  |
Computer Networking - Wireless Networks - Home and Wireless ... |
Site offers coverage of computer network technology in basic networks, VPN, Web servers, Intranets and Extranets, tutorials, and troubleshooting. |
compnetworking.about.com |
  |
ITtoolbox Networking Knowledge Base |
A networking community for IT professionals. Focusing on connectivity, network management, network operating systems, security, and other aspects of ... |
networking.ittoolbox.com |
  |
Howstuffworks "How Home Networking Works" |
How home networking works and the different methods to create a home network. |
www.howstuffworks.com |
  |
SmallNetBuilder |
SmallNetBuilder provides networking and IT news, reviews, help and information for professional and "prosumer" SOHO and SMB users. |
www.smallnetbuilder.com |
  |
Network Computing - Computer Networking, Network Security and ... |
Network Computing - Computer Networking, Network Security & Management news. Enterprise product reviews, comparisons and analysis built by IT professionals ... |
www.networkcomputing.com |
  |
CareerJournal | Career Networking - Professional Network ... |
Professional Network - Career networking news and advice from The Wall Street ... Networking tips that will help you advance your job search or career. |
www.careerjournal.com |
  |
Trail: Custom Networking (The Java™ Tutorials) |
The first describes the networking capabilities of the Java platform that you ... The second provides a brief overview of networking to familiarize you with ... |
java.sun.com |
  |
Windows Server 2003, Longhorn Server & Vista Networking Articles |
Features a wealth of tutorials on various Windows networking related topics such as setting up Windows NT/XP/2000/2003 networks, troubleshooting, ... |
www.windowsnetworking.com |
  |
IBM Networking | IBM Networking |
The era of e-business on demand requires superlative networking capability. ... IBM Networking Services provides e-business solutions anywhere in the ... |
www.networking.ibm.com |
  |
Computerworld - Networking - Voip - Bluetooth - Firewall - Wireless |
Computerworld, the 'Voice of IT Management' is your information source for computer networking. Access up to date information on LAN/WAN, hardware/devices, ... |
www.computerworld.com |
  |
HP Networking products and solutions |
HP ProLiant networking products provide high-powered, simple solutions for enterprise, business, or home networking environments, including ProLiant and ... |
www.hp.com |
  |
Monster: Networking |
Networking Networking Timeline. Networking Timeline · Making New Contacts · How to Set Up and Run an Informational Interview · Nurturing and Keeping ... |
content.monster.com |
  |
Access | CNET News.com |
Phone company shrugs off competition concerns over Verizon's Fios network, saying existing copper is doing the bandwidth trick. ... |
news.com.com |
  |
Network Management: Covering today's Network topics |
Find the latest information on Network Management, Network Security, Network Design and more. |
searchnetworking.techtarget.com |
  |
cisco networking academy program |
cisco.netacad.net/ - 1k - Cached - Similar pages |
|
  |
Networking and Your Job Search: The Riley Guide |
Networking starts long before a job search, and you probably don't even realize you are doing it. ... In Terms of a Job Search, Networking is the way to Go! ... |
www.rileyguide.com |
  |
NetworkWorld.com |
Networking news, reviews, opinions and forums from the Leader in Network Knowledge. |
www.networkworld.com |
  |
|