|
|
Cisco CCNA / CCNP Home Labs: Developing Troubleshooting Skills
CCNA / CCNP candidates are going to be drilled by Cisco when it comes to troubleshooting questions. You're going to have to be able to analyze configurations to see what the problem is (and if there is a problem in the first place), determine...
Cisco CCNA Certification: Becoming A Truly Valuable CCNA
I've been active in the Cisco Certification track for four
years, working my way from the CCNA to the coveted Cisco
Certified Internetwork Expert title, and during that time I've
conducted job interviews and casual conversations with hundreds
of...
Maybe You Already Have Wireless and Don't Know It?
More and more laptops and desktop computers are coming
pre-equipped with wireless networking devices -- it's so cheap
that they might as well put it in, to have another thing to list
in the system specifications. It is easy to tell if a...
Top 10 Ways For Web Designers To Find New Clients
TOP 10 WAYS FOR WEB DESIGNERS TO FIND NEW CLIENTS (c) Copyright 2002 by Tom Mulkern Given the “dotcom” bust and the global recession of the past 18 months it can be difficult for Independent Web Designers to put food on the table these days....
What Exactly is an Intel Centrino Mobile Notebook?
There has been a lot of confusion over the use of the term Intel
Centrino and what it actually means. An Intel Centrino mobile
notebook is actually a combination of Intel products, including
what is marked as the Intel Centrino mobile laptop...
|
|
|
|
|
|
|
|
YAWNA - Yet Another Wireless Networking Article
You may reprint or publish this article free of charge as long as the bylines are included.
Original URL (The Web version of the article) --------------------------------------------- http://www.defendingthenet.com/NewsLetters/YAWNA–YetAnother WirelessNetworking
Article.htm
Title ----- YAWNA - Yet Another Wireless Networking Article Wireless Network Security ------------------------------------------------------ The consumer-level wireless networking market has exploded over the past few years. Unfortunately, manufacturers have been lax in explaining the potential security risks associated with their products. Typical instructions bundled with consumer products are geared towards getting you up and running as quickly as possible. Only recently has consumer equipment begun shipping with basic security measures enabled. Unfortunately, this effort is flawed by the fact that all devices typically ship with the same default configurations, making the effort wasted.
Do People Really Care About Wireless Security -------------------------- While there are hundreds, if not thousands, of articles currently available on how to secure a wireless home network, they frequently address only the steps involved, ignoring the reasoning behind them. Of course the most obvious reason is to protect the data on your own network. Believe it or not, many people don’t see this as enough incentive. One of my own family members (who has an IT background, no less) once expressed to me that the security of his network wasn’t of concern because he knew his individual machines were safe. He was right with regards to his systems; they were pretty secure. However, his belief that someone intruding on his network was there for his stuff was flawed.
Using Your Wireless Network For Fun & Profit ----------------------------------- Your bandwidth alone is a significant motivator for the less than scrupulous. Your unsecured wireless network can provide the ultimate “anonymizer” for illicit activities. You may be facilitating a glorious “hacker” techno-battle, such as those portrayed in the movies and television. Perhaps an international spy needs to transmit secret data back to her superiors and decides to borrow your network to fulfill the task. While not likely, you never know. Little Johnny Wants A New Toy ---------------------------------------------- Here’s a more realistic scenario:
Little Johnny has a stolen credit card number. We don’t know how he got it, it doesn’t really matter. What does matter is that Johnny now wants to take advantage of his prize and knows exactly how. His reward will be one of those new handheld video games that are flying off the shelves. Johnny isn’t foolish enough to walk into a store and use his stolen credit card, he knows a better way. Johnny lives across the street from you and your unsecured wireless network
So
here’s what Johnny does. First he configures his computer to use your wireless network instead of his own, taking an extra minute to make sure that he spoofs any information that may uniquely identify his computer. Next, he searches the web a bit for the perfect online vendor to acquire his product. He avoids the biggest and the smallest vendors. The largest vendors tend to be very thorough in credit card validation as they have solid resources at their disposal. The smallest vendors are often quite thorough as well as loss due to fraudulent transactions impacts them dramatically. He searches for a middle of the road vendor, one with a reputation for lousy customer service, in the hopes they won’t bother verifying that the shipping address is valid for the credit card being used.
Once he locates a suitable vendor he places the order and has it shipped to your next door neighbor. Why there? Well, he doesn’t actually know that the wireless network he is using is yours and doesn’t really care. What he does know is your next-door neighbor leaves the house every morning promptly at 7:30 and doesn’t return until at least 6:00 in the evening. This leaves opportunity to safely retrieve the “tried to deliver while you were out” slip that will be left behind by the parcel delivery driver. The following morning he will reattach the delivery slip to the door, with instructions to leave the package on the doorstep. A few hours later he picks up his package, leaving no trail leading back to him.
Conclusion ---------- More than likely this single incident will disappear without further involving you or Johnny. The owner of the credit card will dispute the charge, and the credit card company or vendor will end up eating the loss and the story ends. Of course, there’s always the chance that some motivated investigator will follow the trail back through your internet provider and ultimately to you. You may not be going to jail over it, but you’ll likely be having a few uncomfortable discussions with some gentlemen wearing badges.
The fact is this isn’t an original scenario. This type of scam has been run over and over again and dates back decades before the internet explosion. It has dozens of variations and permutations. What is important is that this time around you have become part of the equation. By ignorance or by apathy you are in the middle of something bad that you never imagined could have happened.
About the Author
About The Author ---------------- Erich currently specializes in providing network and security solutions for small to medium businesses that frequently have to resolve the conflict of need versus budget. His commitment to precision and excellence is eclipsed only by his fascination with gadgets, particularly ones that are shiny, or that blink, or that beep. If you would like to contact Erich you can e-mail him at erich.heintz@gmail.com.
|
|
|
|
|
Computer networking - Wikipedia, the free encyclopedia |
Network cards such as this one can transmit data at high rates over Ethernet cables. ... Computer networking is sometimes considered a sub-discipline of ... |
en.wikipedia.org |
  |
Social network - Wikipedia, the free encyclopedia |
Social network analysis (related to network theory) has emerged as a key ... Social networking also refers to a category of Internet applications to help ... |
en.wikipedia.org |
  |
Networking on the Network |
Here, then, are some of the fundamentals of professional networking. ... Asking advice from the people in your network is part of the process. ... |
polaris.gseis.ucla.edu |
  |
Computer Networking - Wireless Networks - Home and Wireless ... |
Site offers coverage of computer network technology in basic networks, VPN, Web servers, Intranets and Extranets, tutorials, and troubleshooting. |
compnetworking.about.com |
  |
ITtoolbox Networking Knowledge Base |
A networking community for IT professionals. Focusing on connectivity, network management, network operating systems, security, and other aspects of ... |
networking.ittoolbox.com |
  |
Howstuffworks "How Home Networking Works" |
How home networking works and the different methods to create a home network. |
www.howstuffworks.com |
  |
SmallNetBuilder |
SmallNetBuilder provides networking and IT news, reviews, help and information for professional and "prosumer" SOHO and SMB users. |
www.smallnetbuilder.com |
  |
Network Computing - Computer Networking, Network Security and ... |
Network Computing - Computer Networking, Network Security & Management news. Enterprise product reviews, comparisons and analysis built by IT professionals ... |
www.networkcomputing.com |
  |
CareerJournal | Career Networking - Professional Network ... |
Professional Network - Career networking news and advice from The Wall Street ... Networking tips that will help you advance your job search or career. |
www.careerjournal.com |
  |
Trail: Custom Networking (The Java™ Tutorials) |
The first describes the networking capabilities of the Java platform that you ... The second provides a brief overview of networking to familiarize you with ... |
java.sun.com |
  |
Windows Server 2003, Longhorn Server & Vista Networking Articles |
Features a wealth of tutorials on various Windows networking related topics such as setting up Windows NT/XP/2000/2003 networks, troubleshooting, ... |
www.windowsnetworking.com |
  |
IBM Networking | IBM Networking |
The era of e-business on demand requires superlative networking capability. ... IBM Networking Services provides e-business solutions anywhere in the ... |
www.networking.ibm.com |
  |
Computerworld - Networking - Voip - Bluetooth - Firewall - Wireless |
Computerworld, the 'Voice of IT Management' is your information source for computer networking. Access up to date information on LAN/WAN, hardware/devices, ... |
www.computerworld.com |
  |
HP Networking products and solutions |
HP ProLiant networking products provide high-powered, simple solutions for enterprise, business, or home networking environments, including ProLiant and ... |
www.hp.com |
  |
Monster: Networking |
Networking Networking Timeline. Networking Timeline · Making New Contacts · How to Set Up and Run an Informational Interview · Nurturing and Keeping ... |
content.monster.com |
  |
Access | CNET News.com |
Phone company shrugs off competition concerns over Verizon's Fios network, saying existing copper is doing the bandwidth trick. ... |
news.com.com |
  |
Network Management: Covering today's Network topics |
Find the latest information on Network Management, Network Security, Network Design and more. |
searchnetworking.techtarget.com |
  |
cisco networking academy program |
cisco.netacad.net/ - 1k - Cached - Similar pages |
|
  |
Networking and Your Job Search: The Riley Guide |
Networking starts long before a job search, and you probably don't even realize you are doing it. ... In Terms of a Job Search, Networking is the way to Go! ... |
www.rileyguide.com |
  |
NetworkWorld.com |
Networking news, reviews, opinions and forums from the Leader in Network Knowledge. |
www.networkworld.com |
  |
|