Securing Your Wireless Home Network

Securing Your Wireless Home Network

by: Rick Rouse

Do you have a wireless network installed in your home? Chances are that you do. If so, did you know that hackers might be using your Internet connection without your knowledge or consent?

Itกs called กDriveBy Clickingก and it is becoming more and more popular all the time. Here is how it works:

A hacker drives through a residential neighborhood with a laptop computer equipped with a wireless network adapter. If a wireless router isn’t configured for secure communications the hackerกs laptop can detect the signal, stop his car, and access the Internet using the unsuspecting homeownerกs Internet connection.

He can send spam emails (potentially getting the homeowner in trouble) and even access sensitive information on the hostกs computer. Scary stuff, huh?

If you have a wireless router you can protect yourself with these tips:

Place your wireless router in a location that is as far away from the street or the closest neighborกs house as possible.

Change your routerกs password from the factory default (which most กcompetentก hackers are familiar with) to a new one.

If you have file sharing enabled on your PC be surer to activate password protection.

Enable encryption (WEP) in your routerกs configuration settings.

Be alert for clues that someone else is using your Internet Connection or home network. These include excessive Internet traffic through your cable or DSL modem (the data lights will flash more than usual) and a sluggish PC with lots of unsual hard drive activity.

Taking the time to secure your wireless network from cyberintruders could save you lots of headaches and losses (monetary and otherwise) in the future.

About The Author

Rick Rouse is the owner of RLROUSE Directory & Informational Resources (http://www.rlrouse.com). Submit your URL to RLROUSE Directory and all of our partner sites for only 29.95!

This article was posted on January 06

by Rick Rouse

Wireless Networking Basics

Wireless Networking Basics

by: Lana Hampton

Wireless networking is simple in theory: just install a wireless network adapter in each computer and forget about drilling holes and running cable. When you deal with equipment based on the 802.11b (or WiFi) standard, unfortunately, the reality often falls short of claimed specifications. Your wireless network will have a limited range youกve probably experienced a decrease in speed at a certain distance from an access point. Thatกs why you must adjust the location and configuration of your wireless setup to obtain the best possible performance, range, and reliability. Follow expert advice and your connection will be faster across longer distancesand youกll have fewer dropped connections.
Pick the best location: The farther your wireless networked computer is from a wireless access pointand the greater the number of solid objects that stand in the waythe slower your connection will be. To optimize your networkกs speed and range, position your wireless access point at least a few feet above the floor and away from metal objects, particularly large appliances like refrigerators. Though most manuals for networking products tell you to position the access point in the middle of the coverage area, itกs often better to identify the locations where you expect to use a computer and put the access point where it will be in a direct line of sight (or close to it) to as many of those places as possible.
Don’t waste time worrying about กdead spotsก if no one is likely to use a computer there. Once your wireless network is up and running, even slight changes in your wireless network cardกs position (say, a shift in the orientation of your laptop as you recline on the couch) may dramatically improve throughput or even restore a dropped connection.
For larger areasor areas with many obstructionsyour only option may be to shell out the cash for multiple access points. If you go this route, youกll find that wireless setup is easy: Simply make sure that the access points have identical settings. Virtually all wireless network adapters support กroamingก: In areas where access point coverage overlaps, the adapter will latch on to the strongest signal.

About The Author

Lana Hampton makes it easy to find the right wireless product for your needs. Visit http://www.yowswireless.com today for the latest wireless information.

This article was posted on August 02

by Lana Hampton

Setting Up a Network Wired or Wireless?

Setting Up a Network Wired or Wireless?

by: Deryck Richards

To Wire or Not to Wire

Wireless networks are en vogue, but your installation won’t be successful unless you chose the right type of network and set it up properly. Wired networks require that each computer be connected via a wire to a central location, called a switch or hub. This often involves installing cables through walls and ceilings and can present a challenge for anyone.

If the computers in your home or office are all within 500 feet of each other, a wireless network might be for you. A wireless network has no cables. It can connect computers on different floors of a building or even across the street. Aside from the obvious benefit of not having wires, wireless networks are more convenient since the setup, configuration, and reconfiguration can often be done within minutes, without extensive planning.

Wireless networks, however, are not as fast as wired networks. If you play computer games or want to view streaming video or other highspeed multimedia, a wireless network might not have enough capacity. But, if you just want to check email and view web pages, a wireless network is a good choice. To install a wireless network, you need a Wireless Access Point and a wireless network card for each computer. You will need to buy a wireless network card for each desktop computer, although most newer laptops come equipped with one.

Security is not a large concern in a wired network, since someone would have to physically connect to a wired network to break in. In wireless networks, a car parked outside with a laptop could easily connect to your network if you don’t have proper security in place. To prevent this from happening, encrypt your wireless network connections, or set a password to access the network, or do both.

Do It Yourself or Call a Professional?

If you decide to use a wired network, consider whether you will install it yourself or hire a professional. If you have a small number of computers that are all situated very close to one another, you may be able to buy preassembled network cables and connect them yourself. If you need to wire multiple floors and lay wire through ceilings and walls, you need a professional installation. If you go this route, it is best to begin with a floor plan of your office or home, determine what your current needs are, and consider how the network design can be adapted to future needs. A professional installer should be familiar with EIA/TIA standards, local wiring and electrical codes, and making custom cables. Network cabling professionals are often judged by the neatness of their work, because sloppy cabling is more apt to deteriorate over time, harder to manage, and poses more of a fire risk.

Having a wireless network or a wired network is not mutually exclusive. Many small offices have a wired network in addition to one or more wireless networks, depending on their needs. Wireless networks are continuing to get faster, more secure, and less expensive. Wired networks will continue to coexist with wireless networks, often in the same homes and offices.

About The Author

Deryck Richards is the founder and managing partner of Desktronix. With an extensive educational background in computer information systems, Deryck currently manages hosting and data center operations for Desktronix. He also provides system administration and technical support directly to small businesses as he has since 2000. His areas of expertise include networking, Windows, Linux, and Macintosh systems and he is the author of The Guide to Technology for Small Business. For more information on Desktronix, visit www.desktronix.com.

This article was posted on September 13, 2004

by Deryck Richards

What Is Wardriving And How Can You Prevent It

What Is Wardriving And How Can You Prevent It

by: Zackary Anderson

Imagine a car equipped with nothing more than a laptop computer, a portable GPS receiver, and a wireless network card slowly strolls through your neighborhood. Unknown to any onlookers, this is no ordinary vehicle; rather, it is a wardriving machine. As the car strolls past homes and businesses, a wireless network card (available at any electronics store for as low as $25) scans for any wireless access points. Anyone with a wireless network (and there are many out there) is vulnerable. The computer is looking for what is called an SSID. An SSID is your wireless network name and it is being constantly transmitted by your access point, letting computers know of its presence. The wardriver uses software such as Netstumbler (for windows) or Cismet (for linux) to scan the airwaves for SSIDs. The program can track various access points at once and monitor the signal strength. These programs can also check to see if the network is encrypted. The wardriver will generally configure his or her software to log any strong unencrypted signals. Using the GPS receiver, the coordinates of the strong signal will be recorded. After this preliminary drive, the wardriver can return to the locations that were recorded, and connect to the access point. Once connected to an unencrypted network, the wardriver can use the victim’s internet access, and can also explore computers on the network. If files are being shared within someone’s private network, all of that information is susceptible to a wardriver. Furthermore, once in the network, a wardriver can sniff network traffic and can view any information such as passwords and credit card numbers you send out to the internet – even SSL secured data. Wireless network vulnerability is a major problem, and as more and more households purchase wireless technology, the problem of insecure networks increases. Sound scary? Well this happens every day, and it doesn’t take an expert to pull off. It doesn’t take an expert to protect against either, however.

Steps you can take to protect against wardrivers:

There are a number of very simple steps you can take to protect your wireless network. For many of these, you will have to access your router configuration utility (check your manual on how to do this, you will generally need to type an IP address into your browser such as 192.168.0.1 or 192.168.1.1).

Don’t broadcast your SSID. If you are broadcasting your SSID, this is the first thing a program will pickup and recognize. If you configure your router to not broadcast your SSID, it will be difficult to detect (but not impossible, for some software can sniff wireless communication, so if you are using your wireless network, the SSID can be revealed). If you are not broadcasting your SSID, but it can be guessed (such as if you are using a default SSID), cloaking is pointless. Due to this, remember to change your SSID from the factory default. This is not a 100 percent effective method to secure your network, but it is a good first line of defense.

Change the default password. When you buy a router, a factory password is stored. People experienced in working with routers know the default passwords for different routers (and the make of the router can be seen by wardriver software such as netstumbler). It is important that you secure your router with a good password.

Encrypt your wireless communication. I can’t stress the importance of encrypting your wireless communication enough. Enable encryption and enter a key. Most routers are only capable of WEP encryption, but if they permit, use EAP encryption, it’s more secure than WEP. Like cloaking your SSID, encryption is not 100 percent secure. Given enough time and determination, if someone wants to target you and access your network, WEP encryption can be bypassed using software such as AirSnort.

Filter the MAC addresses that are allowed to connect to your router. This would require that you enter your router configuration and input the MAC address of each wireless card you have. This will restrict access so that only your computers can connect to the router. You will need to obtain the MAC address (which is the individual identification address of a network card in the form a 12 digit hexadecimal number). If someone sniffs traffic and detects the MAC address of a computer wirelessly using your network, the wardriver could emulate that address and connect to the router, but this takes time.

If you configure file sharing on your computers, make sure it is password protected. You should not share files on your networked computers unless it requires an authenticated user to access. Set up the same user accounts on your machines so that your computers can share files.

With these relatively simple steps, wireless network users can secure their networks from wardrivers. Wireless networks are inherently insecure, and these tips will merely help you greater secure your network. If someone is really determined to gain access to your network, given enough time, a good hacker can get access. These tips will deter the average wardriver from gaining access to your network, however. Although these methods are not definite security measures, they will change your network from being something that can be hacked in a matter of seconds, to something that will take a determined hacker days if not weeks of work, all of which will have to be done while in close proximity to your network.

About The Author

Zackary Anderson is a network security veteran, and CEO of Andertec Enterprises http://www.andertec.com, which specializes in onsite custom computer services for the Los Angeles area. Andertec also sells custom madetoorder computer systems, and has a line of revolutionary products at incredibly low prices including the bestselling CyberHome Complete home automation package.

This article was posted on August 16, 2004

by Zackary Anderson