March 5, 2011 at 11:28 pm #29112
In today's day and age we all need to be aware of the threats to your home network. Wireless Connection Threat #1: Unencrypted ConnectionsUnencrypted connections are greatâ€”theyâ€™re easy to set up on your wireless router and all of your devices connect automatically. But because theyâ€™re unencrypted, hackers can eavesdrop on all of your wireless traffic. Well, almost all of your wireless trafficâ€”anything that uses Secure Socket Layer (SSL) encryption like websites starting with HTTPS will be encrypted.Wireless Connection Threat #2: WEPThe Wired Equivilance Privacy (WEP) system was part of the original specification for wireless Internet, but within a few years of being released, hackers figured out how to break it. WEP has been officially replaced by Wifi Protected Access (WPA), but many old routers only support WEP. If you have an option to use WPA, please use it. If you donâ€™t have support for WEP on your router and youâ€™re concerned about security.Wireless Connection Threat #3: Weak PasswordsWPA lets you secure your wireless connection using a password, but this password can be hacked like any other weak password. Because this password helps keep all of your other passwords secure, you should put some extra thought into making it very secure. Besides, youâ€™ll only have to type it once on each computer, so it wonâ€™t be much of a hassle to make it extra hard to guess.Wireless Connection Threat #4: Snooping UsersNo matter how secure you make your wireless network using WPA and strong passwords, you still must trust every user you let onto your network. Once users have access to your network, they can snoop on every packet sent on your wireless connection.For example, if youâ€™re at a hotel which uses WPA and you log into Facebook, any hacker whoâ€™s in a nearby room can also use his WPA-protected connection to snoop on your packets. At an office, employees can snoop on the bossâ€™s WPA connection to get access to confidental information.Wireless Connection Threat #5: Traffic AnalysisOne of the most advanced hacker techniques which is probably not used much in the real world is called traffic analysis. It lets hackers snoop on certain communication even when itâ€™s encrypted.For example, researchers from John Hopkins University in Maryland, US, were able to decode encrypted voice-over-IP (VoIP) phone calls by looking at the size of the encrypted packets. The sound â€œcâ€ produced small packets, but the sound â€œowâ€ produced a big packet, so a small packet followed immediately by a large packet might mean someone said, â€œcowâ€.Having inadequate network security can cause problems with home networks. Please also see more useful Networking tips.Read the entire post here:5 threats to your home network connectionOctober 1, 2011 at 4:19 pm #33206
Having security on your wireless connection should be a top priority as we are using the Internet to access our financial accounts and private or business e-mails.What if I told you that someone could be looking at your files right now while you are on the Internet? Would you then think that security for your wireless connection was important?June 23, 2012 at 5:39 am #33207
To make the internet work with both Windows clients, andAugust 28, 2012 at 7:06 am #33208
Very informative post..Thanks for sharing..February 1, 2013 at 8:18 am #33209
The set of information presented with the medium of this post is quite informative as it has explained every word in detail manner
You must be logged in to reply to this topic.