Username: Save?
Password:
Home Forum Links Search Login Register*
    News: Welcome to the TechnoWorldInc! Community!
Recent Updates
[April 24, 2024, 11:48:22 AM]

[April 24, 2024, 11:48:22 AM]

[April 24, 2024, 11:48:22 AM]

[April 24, 2024, 11:48:22 AM]

[April 03, 2024, 06:11:00 PM]

[April 03, 2024, 06:11:00 PM]

[April 03, 2024, 06:11:00 PM]

[April 03, 2024, 06:11:00 PM]

[March 06, 2024, 02:45:27 PM]

[March 06, 2024, 02:45:27 PM]

[March 06, 2024, 02:45:27 PM]

[March 06, 2024, 02:45:27 PM]

[February 14, 2024, 02:00:39 PM]
Subscriptions
Get Latest Tech Updates For Free!
Resources
   Travelikers
   Funistan
   PrettyGalz
   Techlap
   FreeThemes
   Videsta
   Glamistan
   BachatMela
   GlamGalz
   Techzug
   Vidsage
   Funzug
   WorldHostInc
   Funfani
   FilmyMama
   Uploaded.Tech
   MegaPixelShop
   Netens
   Funotic
   FreeJobsInc
   FilesPark
Participate in the fastest growing Technical Encyclopedia! This website is 100% Free. Please register or login using the login box above if you have already registered. You will need to be logged in to reply, make new topics and to access all the areas. Registration is free! Click Here To Register.
+ Techno World Inc - The Best Technical Encyclopedia Online! » Forum » THE TECHNO CLUB [ TECHNOWORLDINC.COM ] » Techno Articles » Mobile Computing
  The Perils of Wireless Networking
Pages: [1]   Go Down
  Print  
Author Topic: The Perils of Wireless Networking  (Read 1248 times)
Daniel Franklin
TWI Hero
**********


Karma: 3
Offline Offline

Posts: 16647


View Profile Email
The Perils of Wireless Networking
« Posted: October 24, 2007, 10:23:47 AM »


In November 2003, Toronto police arrested a man in an upscale residential neighborhood. They noticed his car driving slowly the wrong way down a one-way street. Upon stopping the car, the police discovered the driver naked from the waist down. What was he doing?

He was using his laptop to download and watch “kiddie” porn from the Internet! How? He was connecting to the internet using unprotected wireless systems in the houses near the road!

Here is the problem, if someone were to access the Internet and download illegal material, then disconnect and drive off; it would look like the homeowner did the downloading. How hard would it be to convince the FBI that you were a victim?

This is not the only time this has happened. In a recent interview, attorney Joseph Burton, of Duane Morris Law Firm, said, “Is it possible a home owner can be liable for a lack of security on a wireless network? Yes, if they are negligent in setting up security.” (Richard Shim, CNET News.com).

According to research by the World Wide War Drive over 228,537 wireless access points were detected. Over 62% were totally open and unprotected! In San Antonio Texas, the percentage of unprotected networks is slightly higher.

Some wireless access points can extend their coverage over 300 feet from the unit. Sure, the farther away, the slower the connection, but even one mbps is faster than a dialup connection. Add that to being untraceable and you have a pervert’s heaven!

Having a wireless network connection is a great thing; the freedom it gives you is priceless. With a few precautions, you can secure your wireless connection and surf the World Wide Web from the comfort of your easy chair, bed or backyard.

Conducting a casual site survey around your home will tell you a lot about your vulnerability. Do you live right up on the road? How far from your home, are your neighbors? How far does your signal carry from the wireless unit?

After answering these questions, you can proceed to securing the wireless network itself.

Unfortunately, consumer routers are shipped wide open. That is they have no preconfigured security. You, the homeowner, will have to configure the security setting yourself.

Your wireless router and network interface card (NIC) are the parts that actually talk to each other. Each of them has a MAC address. This is a unique number assigned to every NIC made, worldwide.

Using this MAC address, you set the router security to talk only to certain other MAC addresses. Therefore, if you have two laptops in your network, you add both MAC addresses to your router security setup and any other MAC addresses are blocked.

This security setup works well for keeping the average wireless user out of your system, but a competent hacker can bypass it. A technique called spoofing allows the hacker’s computer to pretend to be one of your laptops and trick the system into letting him in.

To prevent this you would need to add additional layers of security. Keep in mind though, every additional layer of security adds to the burden of your network. It slows things down. Litigation seems to be a national past time these days. Protect yourself and your family by taking some of the precautions listed above. If you feel you need the extra protection offered by WEP or another encryption scheme contact your locate computer technician and have him configure it for you.

This is an especially important decision for those who run their own business and use wireless products. How angry would your customer’s be if someone stole their information off your network and used it to open accounts in their name?

Identity Theft is only one possible outcome, if your network contains patient data you could be in violation of the Health Insurance Portability and Accountability Act (HIPAA). Then you would be dealing with the federal government!

Take the time to protect yourself and your family. Security does take a little time, but it could save you many problems down the road.

Parrott Writing Services, a San Antonio Texas company specializing in web content, ghostwriting, website optimization, online/offline ad copy and technical writing to small businesses.

http://www.rickparrott.com

Send an email to: [email protected] for a FREE electronic copy of my eBook on Computer Security!

Article Source: http://EzineArticles.com/?expert=Rick_Parrott

Logged

Pages: [1]   Go Up
  Print  
 
Jump to:  

Copyright 2006-2023 TechnoWorldInc.com. All Rights Reserved. Privacy Policy | Disclaimer
Page created in 0.162 seconds with 24 queries.