Home Pc Repair

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Monday, 14 July 2008

Steps to a Secure Wireless Network

Posted on 10:33 by Unknown
Wireless networks are great, and very convenient for multiple computers at home or office, BUT can be very dangerous at the "home" level, and even more dangerous, risky at your business.

- Control your broadcast area. Many wireless APs (access points) let you adjust the signal strength; some even let you adjust signal direction. Begin by placing your APs as far away from exterior walls and windows as possible, then play around with signal strength so you can just barely get connections near exterior walls. This isn't enough, though. Sensitive snooping equipment can pick up wireless signals from an AP at distances of several hundred feet or more. So even with optimal AP placement, the signal may leak. Keep reading.

- Lock each Access Point. Your router that is... A lot of people don't bother changing the defaults on their APs, and maintaining the default administrator password (like admin for Linksys products) makes your system a good target. Use a strong password to protect each Access Point. Don't use easily guessed passwords like "111111" or "abc123". A hacker can easily gain access to your wireless router, all router manufactures have VERY well known default admin passwords, if you don't change that default passwords, someone else can and lock you out of your own router, AND BLOCK your own internet connection.

- Ban Rogue Access Points. If an AP is connected to your home or office network, make sure you or the network administrator put it there. Bob in Accounting isn't likely to secure his rogue AP before he connects it. Free software like NetStumbler (netstumbler.com) lets you sweep for unauthorized APs.

- Use WPA, Not WEP. Passively cracking the WEP (Wired Equivalent Privacy) security protocol is merely a nuisance to a skilled hacker using Linux freeware like "AirSnort". Weak passwords, and "WEP" evcrytion can be fairly easily cracked with 60 seconds or less. Use WPA to encrypt your wireless network, and avoid buying or using any device that forces you to use WEP to accommodate it.

- Use SSIDS wisely. Change the default Service Set Identifiers (SSIDs) for your APs, and don't use anything obvious like your address or company name. For corporate setups, buy APs that let you disable broadcast SSID. Intruders can use programs such as "Kismet" to sniff out SSIDs anyway (by observing 802.11x management frames when users associate with APs), but again, every bit of inconvenience helps.

- Limit Access Rights. Chances are, not everyone in your building needs a wireless card. Once you determine who should take to the airwaves, set your APs to allow access by wireless cards with authorized MAC addresses only. Turn On MAC Filtering. Enterprising individuals can spoof MAC addresses, however, which brings us to the next tip.

- Limit the number of user addresses. If you don't have too many users, consider limiting the maximum number of DHCP addresses the network can assign, allowing just enough to cover the users you have. Then if everyone in the group tries to connect but some can't, you know there are unauthorized log-ons.

- Authenticate users. Install a firewall that supports VPN connectivity, and require users to log on as if they were dialing in remotely. The Linksys BEFSX41 router is a great choice for this. Tweak the settings to allow only the types of permissions that wireless users need.

- Make Sure your DMZ is Turned Off. The router's DMZ feature is usually turned off by default, but users sometimes enable it for troubleshooting reasons and then forget to deactivate it again afterward. Since the DMZ is an IP address (or address range) left open to the Internet, any system inadvertently placed there is completely exposed and at risk.

- Turn Off Ping Response. This setting allows your router to respond to ping commands issued from the Internet. It's usually turned off by default, but you should verify that it is because it can betray the existence of your network to potential hackers, which in turn is an open invitation to probe further.

- Avoid Using Remote Management. Most routers have this feature, which allows you to log in and manage the device from outside your network. There aren't too many situations where this is useful, so you should avoid using it unless absolutely necessary.

- Monitor Your Routers Security Log Reports. Even with all the security enabled above, periodically check, monitor, your routers security log reports for any strange unidentified IP connection addesses.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Mapquest Interactive Gas Price Map
    Mapquest launched a new interactive map service today called Mapquest Gas Prices. Mapquest Interactive Gas Price Map
  • GuerrillaMail.com
    "This website provides you with disposable e-mail addresses which expire after 15 Minutes. You can read and reply to e-mails that are s...
  • 3 Ways to access 'Must Sign Up to View' Sites
    "This happens many times to me: I search on Google for a problem I'm having with my computer, click on a search result, reach the s...
  • Avoiding Bittorrent Blocking and Throttling
    "Many Internet service providers (ISPs) cause trouble for BitTorrent clients. There are, fortunately, ways to combat traffic shaping an...
  • 150 Funniest Resume Mistakes, Bloopers and Blunders
    "People write the strangest things on their resumes, sometimes downright hysterical. Why should only recruiting managers get to laugh a...
  • 20 Tips for More Efficient Google Searches
    "For millions of people, Google is an indispensable search tool that they use every day, in all facets of their lives. From work or sch...
  • Pictures From The Sky..........
    Pictures From The Sky.......... Coool!
  • Make your GMail Signature For Free
    "This Script Will Allow you to Create your Gmail ID image for Forums and sites. Creating this image will Help you save your ID`s from S...
  • Case mods and PC Modding Supplies
    MNPCTech offers a wide variety of products and services, from modified cases to bolt on accessories. They even do custom builds. MNPCTech is...
  • Welcome to Malwarebytes.Org
    "Malwarebytes is a site dedicated to fighting malware. Malwarebytes has developed a variety of tools that can identify and remove malic...

Blog Archive

  • ►  2013 (1)
    • ►  September (1)
  • ►  2012 (1)
    • ►  December (1)
  • ►  2010 (5)
    • ►  November (1)
    • ►  October (1)
    • ►  September (2)
    • ►  August (1)
  • ▼  2008 (73)
    • ▼  July (12)
      • Why we don't call Geek Squad - Ever!
      • Lightspeeds Computer Repair's Squidoo Page
      • Intel price cuts, effective now!
      • How To Boot Into Safe Mode
      • Malware Silently Alters Wireless Router Settings
      • Steps to a Secure Wireless Network
      • Gametrailers.com - The Source For Video Game Media
      • 2007: Best of Brett Favre
      • KartOO visual meta search engine
      • Mirrors - International teaser trailer for "Mirrors"
      • McDonnell Douglas F-15E Strike Eagle Aircraft
      • Sign Generator Widgets & Image Generators
    • ►  June (44)
    • ►  May (17)
  • ►  2007 (6)
    • ►  November (6)
Powered by Blogger.

About Me

Unknown
View my complete profile