Username: Save?
Password:
Home Forum Links Search Login Register*
    News: Welcome to the TechnoWorldInc! Community!
Recent Updates
[August 11, 2025, 02:03:44 PM]

[August 11, 2025, 02:03:44 PM]

[August 11, 2025, 02:03:44 PM]

[August 11, 2025, 02:03:44 PM]

[May 13, 2025, 02:04:25 PM]

[May 13, 2025, 02:04:25 PM]

[May 13, 2025, 02:04:25 PM]

[April 12, 2025, 01:54:20 PM]

[April 12, 2025, 01:54:20 PM]

[April 12, 2025, 01:54:20 PM]

[April 12, 2025, 01:54:20 PM]

[March 12, 2025, 03:05:30 PM]

[March 12, 2025, 03:05:30 PM]
Subscriptions
Get Latest Tech Updates For Free!
Resources
   Travelikers
   Funistan
   PrettyGalz
   Techlap
   FreeThemes
   Videsta
   Glamistan
   BachatMela
   GlamGalz
   Techzug
   Vidsage
   Funzug
   WorldHostInc
   Funfani
   FilmyMama
   Uploaded.Tech
   Netens
   Funotic
   FreeJobsInc
   FilesPark
Participate in the fastest growing Technical Encyclopedia! This website is 100% Free. Please register or login using the login box above if you have already registered. You will need to be logged in to reply, make new topics and to access all the areas. Registration is free! Click Here To Register.
+ Techno World Inc - The Best Technical Encyclopedia Online! » Forum » THE TECHNO CLUB [ TECHNOWORLDINC.COM ] » Computer / Technical Issues » Hardware
  Wireless Hot Spot Security
Pages: [1]   Go Down
  Print  
Author Topic: Wireless Hot Spot Security  (Read 802 times)
Daniel Franklin
TWI Hero
**********


Karma: 3
Offline Offline

Posts: 16647


View Profile Email
Wireless Hot Spot Security
« Posted: October 15, 2007, 02:32:35 PM »


Physical Security


1 Cable Locks – The majority of laptops are equipped with a Universal Security Slot (USS). This is like a bike lock for a laptop. One end connects to the computer and the other end will be secured to an unmovable / indestructible object. Cable locks will not stop a thief with bolt cutters but will prevent a grab and run type theft.

2. Use a Docking Station – Docking stations will lock down your laptop when in the office where the majority of thefts happen. Cleaning staff, outside contractors, customers and fellow employees can all be tempted to perform a crime of opportunity. As the old saying goes locks are meant to keep honest people honest.

3. Metal Asset Tags- Engraving – Thieves are often caught with equipment that the police know are stolen property. The problem is that it can’t be returned due to lack of information. Engraving and asset tags will provide proof that it is stolen and possibly get your laptop returned to you. Also, Write down your serial number and register the laptop with the manufacture.

4. Use a Back Pack – Don’t use a laptop carrying case, use a back pack to carry your laptop. Laptop carrying cases might as well scream steal me to a thief. Professional theft rings make their living stealing from passengers in airports, bus stations and trains. One common scenario is one female thief will start talking to you, and while you are distracted another thief will steal your laptop. If you use a back pack then it’s less obvious what you are carrying.

5. Lock up your PCMICA card - A PCMICA card is even easier to steal then a laptop. PCMICA cards can be very expensive and easily sold on EBAY.

6. Use Tracking Software – Tracking software is set to automatically call a specific service at set times. If the laptop is stolen then the tracking software will report back with an IP address which will give the tracking service an address.

7. Double Lock System – If you must store your laptop in a room use the double lock theory. Lock the laptop in a cabinet / safe then lock the door. Thieves will often have access to the room but not enough time to get through a second lock.

Operating System Security

1. Use a Firewall – If you don’t have a firewall on, you are just asking for problems. Cheap Personal firewalls are available that will make your computer invisible to hackers. Norton Personal firewall, Zone Alarm, Black Ice are commercial firewalls some even have free versions. Windows XP SP2 comes with a built in firewall just click control panel – firewall – and turn the firewall on.

2. Disable your guest account- This will prevent anyone from logging on as guest

3. Disable Remote Desktop Sharing

4. Change the Administrator Accounts Name

5. Enable a BIOS Password - Disable booting from the CD Drive or floppy

6. Log Off- Simple Enough

7. Screen Saver Password – Enable a screen saver password on resume and have a short time out period for the screen saver

8. Back up Using Ghost – Before you go on a trip make a complete image of your operating system and a separate back up for your files. If your laptop is stolen all the information will still be available.

Rogue Access Points – Don’t connect to a rogue access point. A rogue access point will simulate a pay as you go wireless service like Boingo Wireless. A mobile user will connect to the access point, when they try to surf the internet they will be asked for a credit card number and other personal information. Other rogue access points are meant to infect your computer with Trojan Horse viruses so the hacker can remotely control your computer.

VPN - Use a VPN to connect to you work network. VPN's will encrypt all your network traffic while you are connected to the hotspot. If you don't use a VPN another hotspot user can watch all your web surfing and emails with a network sniffer.

Email – Check with your ISP to insure that your email traffic is secure. Many POP3 email accounts are not encrypted which means all emails are sent in plain text.

Eric Robert Meyer is an expert in wireless networking. You can sign up for the wireless ninja newletter at http://www.wirelessninja.com and receive the latest information on the world of wireless technology.

Logged

Pages: [1]   Go Up
  Print  
 
Jump to:  

Copyright © 2006-2023 TechnoWorldInc.com. All Rights Reserved. Privacy Policy | Disclaimer
Page created in 0.059 seconds with 24 queries.