|
|
6 Essential Steps to Protect Your Computer On the Internet For Free
Recently one of my friends asked me to check out if his computer was infected by virus. He suspected because occasionally the computer was shut down automatically when connected to internet. My first thought was the Sasser worm 60 seconds auto...
Computers and Web Cams are Taking Communication to Levels Only Imagined in Sci-Fi Novels
One of the most incredible inventions I’ve ever come across is the web cam and its process of video conferencing. This is just so futuristic I can’t believe they really exist and are readily available to anyone with the Internet,...
Freedom and responsibility on the Internet
As this year draws to a close, it also brings down the curtain
on what we could effectively call the first Internet decade.
While the Internet has been around for much longer than a
decade, in many ways 1995 was the year when many of...
The Advantages of Becoming A Master Networker!
Building Your Network Online Without Building Relationships? *The Advantages of Becoming A Master Networker! Revised July 2001 Copyright © 2001 by Sue Seward. All Rights Reserved. (***You may copy this article using the attached bio below) ...
What Is Wireless Networking?
Wireless networking is just what it sounds like -- a way of creating networks without any wires! If this sounds exciting to you, then read on.
With a wireless network, you can create radio connections between computers that let them communicate...
|
|
|
|
|
|
|
|
The Perils of Wireless Networking...
In November 2003, Toronto police arrested a man in an upscale residential neighborhood. They noticed his car driving slowly the wrong way down a one-way street. Upon stopping the car, the police discovered the driver naked from the waist down. What was he doing?
He was using his laptop to download and watch "kiddie" porn from the Internet! How? He was connecting to the internet using unprotected wireless systems in the houses near the road!
Here is the problem, if someone were to access the Internet and download illegal material, then disconnect and drive off; it would look like the homeowner did the downloading. How hard would it be to convince the FBI that you were a victim?
This is not the only time this has happened. In a recent interview, attorney Joseph Burton, of Duane Morris Law Firm, said, "Is it possible a home owner can be liable for a lack of security on a wireless network? Yes, if they are negligent in setting up security." (Richard Shim, CNET News.com).
According to research by the World Wide War Drive over 228,537 wireless access points were detected. Over 62% were totally open and unprotected! In San Antonio Texas, the percentage of unprotected networks is slightly higher.
Some wireless access points can extend their coverage over 300 feet from the unit. Sure, the farther away, the slower the connection, but even one mbps is faster than a dialup connection. Add that to being untraceable and you have a pervert's heaven!
Having a wireless network connection is a great thing; the freedom it gives you is priceless. With a few precautions, you can secure your wireless connection and surf the World Wide Web from the comfort of your easy chair, bed or backyard.
Conducting a casual site survey around your home will tell you a lot about your vulnerability. Do you live right up on the road? How far from your home, are your neighbors? How far does your signal carry from the wireless unit?
After answering these questions, you can proceed to securing the wireless network itself.
Unfortunately, consumer routers are shipped wide open. That is they have no preconfigured security. You, the homeowner, will have to configure the security setting yourself.
Your wireless
router and network interface card (NIC) are the parts that actually talk to each other. Each of them has a MAC address. This is a unique number assigned to every NIC made, worldwide.
Using this MAC address, you set the router security to talk only to certain other MAC addresses. Therefore, if you have two laptops in your network, you add both MAC addresses to your router security setup and any other MAC addresses are blocked.
This security setup works well for keeping the average wireless user out of your system, but a competent hacker can bypass it. A technique called spoofing allows the hacker's computer to pretend to be one of your laptops and trick the system into letting him in.
To prevent this you would need to add additional layers of security. Keep in mind though, every additional layer of security adds to the burden of your network. It slows things down.
Litigation seems to be a national past time these days. Protect yourself and your family by taking some of the precautions listed above. If you feel you need the extra protection offered by WEP or another encryption scheme contact your locate computer technician and have him configure it for you.
This is an especially important decision for those who run their own business and use wireless products. How angry would your customer's be if someone stole their information off your network and used it to open accounts in their name?
Identity Theft is only one possible outcome, if your network contains patient data you could be in violation of the Health Insurance Portability and Accountability Act (HIPAA). Then you would be dealing with the federal government!
Take the time to protect yourself and your family. Security does take a little time, but it could save you many problems down the road. About the Author
SA Secure, a San Antonio Texas company specializing in desktop support and help desk services for small to medium businesses. Our goal is to provide an alternative to maintaining an expensive in-house IT staff or relying on many different individual computer repair technicians. Our services allow you to obtain an expert level of cost effective technical support without the need to maintain technicians on-site.
|
|
|
|
|
Computer networking - Wikipedia, the free encyclopedia |
Network cards such as this one can transmit data at high rates over Ethernet cables. ... Computer networking is sometimes considered a sub-discipline of ... |
en.wikipedia.org |
  |
Social network - Wikipedia, the free encyclopedia |
Social network analysis (related to network theory) has emerged as a key ... Social networking also refers to a category of Internet applications to help ... |
en.wikipedia.org |
  |
Networking on the Network |
Here, then, are some of the fundamentals of professional networking. ... Asking advice from the people in your network is part of the process. ... |
polaris.gseis.ucla.edu |
  |
Computer Networking - Wireless Networks - Home and Wireless ... |
Site offers coverage of computer network technology in basic networks, VPN, Web servers, Intranets and Extranets, tutorials, and troubleshooting. |
compnetworking.about.com |
  |
ITtoolbox Networking Knowledge Base |
A networking community for IT professionals. Focusing on connectivity, network management, network operating systems, security, and other aspects of ... |
networking.ittoolbox.com |
  |
Howstuffworks "How Home Networking Works" |
How home networking works and the different methods to create a home network. |
www.howstuffworks.com |
  |
SmallNetBuilder |
SmallNetBuilder provides networking and IT news, reviews, help and information for professional and "prosumer" SOHO and SMB users. |
www.smallnetbuilder.com |
  |
Network Computing - Computer Networking, Network Security and ... |
Network Computing - Computer Networking, Network Security & Management news. Enterprise product reviews, comparisons and analysis built by IT professionals ... |
www.networkcomputing.com |
  |
CareerJournal | Career Networking - Professional Network ... |
Professional Network - Career networking news and advice from The Wall Street ... Networking tips that will help you advance your job search or career. |
www.careerjournal.com |
  |
Trail: Custom Networking (The Java™ Tutorials) |
The first describes the networking capabilities of the Java platform that you ... The second provides a brief overview of networking to familiarize you with ... |
java.sun.com |
  |
Windows Server 2003, Longhorn Server & Vista Networking Articles |
Features a wealth of tutorials on various Windows networking related topics such as setting up Windows NT/XP/2000/2003 networks, troubleshooting, ... |
www.windowsnetworking.com |
  |
IBM Networking | IBM Networking |
The era of e-business on demand requires superlative networking capability. ... IBM Networking Services provides e-business solutions anywhere in the ... |
www.networking.ibm.com |
  |
Computerworld - Networking - Voip - Bluetooth - Firewall - Wireless |
Computerworld, the 'Voice of IT Management' is your information source for computer networking. Access up to date information on LAN/WAN, hardware/devices, ... |
www.computerworld.com |
  |
HP Networking products and solutions |
HP ProLiant networking products provide high-powered, simple solutions for enterprise, business, or home networking environments, including ProLiant and ... |
www.hp.com |
  |
Monster: Networking |
Networking Networking Timeline. Networking Timeline · Making New Contacts · How to Set Up and Run an Informational Interview · Nurturing and Keeping ... |
content.monster.com |
  |
Access | CNET News.com |
Phone company shrugs off competition concerns over Verizon's Fios network, saying existing copper is doing the bandwidth trick. ... |
news.com.com |
  |
Network Management: Covering today's Network topics |
Find the latest information on Network Management, Network Security, Network Design and more. |
searchnetworking.techtarget.com |
  |
cisco networking academy program |
cisco.netacad.net/ - 1k - Cached - Similar pages |
|
  |
Networking and Your Job Search: The Riley Guide |
Networking starts long before a job search, and you probably don't even realize you are doing it. ... In Terms of a Job Search, Networking is the way to Go! ... |
www.rileyguide.com |
  |
NetworkWorld.com |
Networking news, reviews, opinions and forums from the Leader in Network Knowledge. |
www.networkworld.com |
  |
|