3/8/13


How to Secure Your Wireless Network


Almost all of us have jumped onto someone else's unsecured Wi-Fi network. There's little harm in that if you're just an honest soul looking for an Internet connection.
But if you're the owner of an unsecured network, you should be aware that the world's not made up entirely of honest souls--and it's not hard for the dishonest ones to see exactly what you're doing on your network. Sound scary? Here's how to fix the problem.

Q. What are WEP and WPA encryption, and which should I use?

A. The first line of defense for your Wi-Fi network is encryption, which encodes the data transmitted between your PC and your wireless router. Unfortunately, most routers ship with encryption turned off, and many users don't turn it on, leaving themselves completely exposed. If you haven't already, enable your router's encryption, and use the strongest form supported by your network. The Wireless Protected Access (WPA) protocol and more recent WPA2 have supplanted the older and less-secure Wireless Encryption Protocol (WEP).
Go with WPA or WPA2 if at all possible, since WEP is relatively easy to crack. (You have to use the same form on all devices on your network; you can't mix WEP and WPA.) The keys used by WPA and WPA2 change dynamically, which make them nearly impossible to hack. Use a strong password for your encryption key, such as a combination of letters and numbers of 14 characters or more.
If you have an older router that supports WEP only, you'll be safest if you use 128-bit WEP keys--but also check the manufacturer's Web site for a firmware update that will add WPA support. If it doesn't look like an update is likely, consider replacing old adapters and routers with newer models that support WPA. Look for a router that supports the hybrid WPA + WPA2 mode, which lets you use the stronger WPA2 encryption with adapters that support it, while still maintaining compatibility with WPA adapters.
Make sure you change the default network name and password on your router. Doing so will make it much more difficult for hackers to break into your router and commandeer its settings.

Q. If my router has a firewall, why do I need these added security measures?

A. The firewall built into your router prevents hackers on the Internet from getting access to your PC. But it does nothing to stop people in range of your Wi-Fi signal from getting onto your network--and with the latest high-performance equipment, your Wi-Fi signal could reach clear down the block. Without encryption and other protective measures, anyone can use readily available tools to see all your Wi-Fi traffic.
For extra protection, you should run software firewalls on the individual PCs on your network. Some good options are Zone Labs' ZoneAlarm, available as a free download or in the ZoneAlarm Internet Security Suite 2006, and Agnitum's Outpost Firewall Free.

Q. How can I secure my notebook at public Wi-Fi hotspots?

A. Since public hotspots generally don't use encryption, you should assume that anyone can see your Internet traffic unless you take precautions.
  • Make sure it's a legitimate hotspot: Nefarious types have been known to set up pirate routers with familiar SSID names like "wayport" or "t-mobile," and then use them to capture unsuspecting users' log-on information and other private data.
  • Verify that your PC's software firewall is turned on, and that Windows' file-sharing feature is off; it's off by default in Windows XP with Service Pack 2. To check this setting, open Control Panel and choose Windows Firewall (you may have to clickSecurity Center first in XP or Security in Vista). In XP, select the Exceptions tab, and look in the Programs and Services to make sure "File and Printer Sharing" is unchecked. In Vista, click Change settings, then select the Exceptions tab and follow the instructions for XP.
  • Never send bank passwords, credit card numbers, confidential e-mail, or other sensitive data unless you're sure you're on a secure site: Look for the lock icon in the bottom-right corner of your browser, as well as a URL in the address bar that begins with https. Such sites build in their own encryption.
  • Always turn your Wi-Fi radio off when you're not at a hotspot: Hackers can use it to create peer-to-peer Wi-Fi connections with your computer and access it directly.
  • For better security, consider signing up for a paid subscription to a hotspot network such as Boingo or T-Mobile. Both companies provide connection software that encrypts your sessions automatically.

11/5/09

How to Have Computer Security?

Computers are being employed in all fields of life. As the use of internet has become very important in the present times, there is much more demand of computers today than there was in the past. Almost everyone is using computer and internet for various purposes including getting information on various subjects, for business, research, communicate, make money, play games, listen to songs, watch movies and much more. However, there are some threats to your systems when you set out to do all these tasks. No matter if you are a student or a business man, a house wife or a retired person, it is essential to ensure your computer security if you are making use of these machines.

Firewalls Are Your First Line of Defense When it Comes to Computer Security

The worst things to over look each and every time in this competitive age is about your PC Computer Security and if you are not careful with that nasty piece of codes are not going to show any mercy at all and rather thrash you towards any short of crisis once they took a front seat on your computing system.
But taking some of these steps can minimize your risk from virus, malwares, spywares, ad wares, Trojans, worms and from each and every form of infection your computer system can have. They are just viral kind of things once you got them they can give you sleepless nights.

7 Tips For Computer Security and Virus Protection

Computer security is a vital issue for anyone who surfs the net on his or her PC. Any computer that is connected to the Internet is exposed to thousands of malicious, viruses, spyware, hackers, and other nasty Malware that can ruin a system, cost lots of money for repairs and lose important data, files and folders.

Here are some hands-on steps that you can take to protect your computer, data and private information from the hackers, Malware, viruses, spyware and thieves and ensure the best in computer security.

Internet and Computer Security Should Be a Part of Every Home Security Solution

These days it seems as if you can either find a security expert or a computer security expert, but seldom both. The security expert is knowledgeable about physical security systems, alarm systems, and camera systems but knows little about networks, computer viruses, or internet attacks. The reverse is also true, as most internet security people do not know a thing about physical security. To me, security is security and protecting my property, whether it be stored in my living room or on my computer, is very important. Why then, do we all tend to separate physical security and computer security instead of considering both together?

Tips For Computer Security While on Vacation

Finally, a break! Make sure your vacation is memorable because of the great time you had, not because something happened to your computer. Read on for a complete checklist of things to do to make sure your computer and the data on it is ready to jet with you.
Back-up your data and clean-up your computer.
Copy important or valuable items - documents, photos, presentations, email records - on to an external hard drive, USB flash drive, or an online service and store it in a lockable location at your office or at home. This will ensure you have a back-up of everything vital should your computer become lost or damaged while traveling.

Computer Security Programs Are Most Effective When Used Properly

Protecting you information with computer security programs will keep your personal information safe.
Intruders try to target credit card numbers, bank account information, or any other type of information that they can use in order to steal your identity.
Identity theft is now one of the top criminal activities in the United States.
The identities of many people have been exploited and credit ratings have been ruined by thieves who get information from unsecured systems, or bypass computer security programs for illegal gains.