t is a service that grants the user access to Internet e-mail or to the World Wide Web, vides wireless networks. Nowadays computers that are on the internet are often bombarded with viruses and malware
How safe is the Wireless Internet
There are quite a few risks associated with wireless internet connections. While the more benign among the spyware and adware programmers monitor the sites that the user visits on the web simply to be able to assess the success of their marketing efforts and identify the web-surfing habits of wire less internet users, there are types of spyware that go beyond these limits. They undermine the user’s wireless internet security, by carefully monitoring the keystrokes and actually capturing passwords and other functions. This surely crosses the line and poses a very definite wireless computer security risk. In order to achieve a secure wireless internet connection, here are A Few Easy Steps That The User Could Learn To Protect Himself From Such Programmes:Be Cautious and Careful While Downloading:
Insidious and unscrupulous programmes usually have their origins in insidious and unscrupulous websites. Far better that the user browses reputable websites for instance like tucows.com or download.com, if he is seeking to download a freeware or a shareware program.Read the EULA or the End User License Agreement:
It is quite an important part of a computer security wireless connection. It is to do with all of the legal and technical jargon that one reads in the box above the radio buttons, dealing with phrases like “No, I do not accept” or like “Yes, I do accept the terms mentioned ,” which many users do not really read, and click “yes” to avoid the nuisance of going through it all. The fact is that the user may have unwittingly entered into a legal agreement - or EULA - with the spy ware vendor, when he clicks on “yes” and he may have just agreed to the installation of a spy ware program that would not be entirely to his liking. Far better to make use of the “No, I do not accept“this option in such cases.Read The Matter Before Clicking
Sometimes, while visiting a website, a pop-up test box may appear on the screen. Just like the EULA, many users may consider this a nuisance and may click just so that the box may vanish from the screen. And the user may have just clicked “yes” or “ok” to the installation of a spy ware program. Agreed, while there may not be a direct request to the user asking for permission to install a spy ware program, there is all the more reason to stop and read all the matter before the user clicks “yes.”Make Sure That The System Is Protected:
The term antivirus software is much misnamed nowadays. Viruses make up only a fraction of the vast malicious code that these programs protect the user’s wireless internet connection from. The term antivirus has now grown and expanded to include vulnerability exploits, worms, spy ware, even ad ware, jokes, hoaxes, and Trojans. The user could contemplate trying a product like Ad Aware Pro, which could protect his system from spy ware/ad ware - in case the antivirus product that he is currently using does not detect and block spy ware programs.Scan the System
Sometimes, even with all the firewalls, and antivirus software, some spy ware or ad ware may break through and reach the user’s system. While a good product like Ad Aware Pro would monitor and protect the system in real time, it also costs money. Lava soft, who are the makers of Ad Aware Pro, also have a product for free personal use. While it does not monitor the system in real time, it can be manually used periodically to scan the system so as to detect and remove any spy ware. Spybot Search & Destroy is another excellent product that is available for free.How Can The Wire Less Internet Be Made More Secure
While wire less internet networking is doubtless a great invention, it brings with it a fair amount of security concerns as well. The basic problem with having a signal broadcast throughout the office and home, is that it is not easy to contain where exactly that signal could travel – it could travel to a neighbor’s living room , or, a hacker seeking insecure wire less internet connections, can get into the system from a car parked outside. Here Are A Few Basic Security Precautions to achieve a secure wireless internet connection:
First, Change The System ID
It is important to note that devices come with a default system ID called SSID or Service Set Identifier, or ESSID or Extended Service Set Identifier. SSID is a configurable identification which allows users to communicate with the appropriate base station. If there is proper configuration, only those user-clients who are configured with the same SSID would be able to communicate with those base stations having the same SSID. From the security standpoint, SSID acts as a very simple, single and shared password between clients and their base station. As each of these base station models come with default SSIDs, attackers make use of these default SSIDs to breach and penetrate those base stations that are still in the default configuration stage. As it is easy for a hacker to guess what the default identifier for each manufacturer of wireless equipment is, the user would have to change it to something else- something that is unique, and not easily guessed.Use A Strong Password
While choosing a password for your wireless internet , remember:- Not to use any personal information
- Not to use any Real words
- Instead, mix different character types
- Create a pass phrase( think of a line from a favorite song for instance, and create a password by using the first letter of each word)
Change the Default Administrator Password
This is routine and good practice for all software and hardware. Make sure that the default password on your wireless route or on your access point is changed to something that is not very easily guessed.Use A Safe Network And Restrict Unnecessary Traffic
Many of the wireless routers have inbuilt firewalls, that are not the most technically advanced, but help add one more line of defense. The user must read carefully the hardware manual to learn to properly configure the router. This can help restrict incoming or outgoing traffic to only those that he has approved.Disable Identifier Broadcasting
The user does not have to broadcast to the world that he has a wireless internet connection - this is a sure invitation for hackers. He would do well to consult his hardware manual to learn how to disable broadcasting.Enable Encryption
Wired Equivalent Privacy or WEP, and Wi-Fi Protected Access or WPA, help to encrypt the user’s data; so that only the intended recipient is able to read it. Of course, as with all security measures, this one can also be got round, but it does help to keep the casual hacker attacks at bay. While WPA does fix the security flaws in WEP, it is still subject to Denial –Of –Service (DOS) attacks. Yet, if possible, use WPA encryption.Filter Mac Addresses
Some Access Points (AP) are equipped with the unique ability to filter trusted and tested MAC addresses. MAC addresses are considered unique addresses on the network. It is difficult to implement in today’s dynamic environment as it is tedious to configure the AP for each trusted client.Patch and Protect the PCs
As something like a final line of defense, the user can install personal firewall software like Zone Alarm Pro, and anti-virus software. This anti-virus software must be updated regularly and at least once a week; as new viruses are being discovered daily. If one is using Microsoft systems, one could try using Windows Update to regularly keep the patches updated for security vulnerabilities.Therefore in today’s dynamic world, where the internet is such an important medium of communication, it is important to achieve maximum wireless internet security and wireless computer security. There are a number of ways for achieving secure wireless internet connections and a secure wireless internet, which if correctly used, can help in protecting the system from hackers and spy ware programs.
0 comments:
Post a Comment