The Essentials of Wireless Security

Written by Daniel Robson

Continued from page 1

Of course this is a very worst-case example, and as such very unlikely. Even in today’s climate of moral decrepitude this sort of occurrence would, we hope, be extraordinarily rare. But hopefully it will help drive homerepparttar point that securing your network should be taken very seriously indeed. But what can you do to protect yourself? I would recommend that all wireless networks should make use ofrepparttar 135826 WEP (Wired Equivalent Privacy) encryption option which comes as standard with almost all routers and base stations. Although turned off by default this feature is absolutely essential. Utilising either 64-bit encryption, which creates a 64bit encryption based on a 40-bit key with a 24-bit initialisation vector, or 128-bit encryption which makes use of a 104-bit key with a 24-bit initialisation vector, a secure password is created. This password should only be given to known and trusted wireless devices, blocking access to any interloper. This, although not secure against dedicated crackers, provides a more than adequate protection to dissuaderepparttar 135827 nosy orrepparttar 135828 vast majority of war-drivers.

Too few people enable this basic protection, or are even aware it exists. However in some regards protecting your network can be as essential as your childhood inoculation against tetanus. So please, take just a few minutes of your time to configure your WEP encryption, and to help protect yourself. For a more in-depth technical overview ofrepparttar 135829 points covered in this article you can visit, a very useful, if slightly esoteric, overview of various security concerns overrepparttar 135830 standard 802.11 wireless specification.

Daniel Robson runs where among other things he hands out his freeware, other peoples freeware, and his views on a myriad of different topics.

Computer Security - What Exactly Is It?

Written by Ciontescu Molie

Continued from page 1

In addition to these technical aspects,repparttar concept of computer security is very large. Computer security's roots are drawn from disciplines like ethics and risk analysis andrepparttar 135735 major topics that are concerning it are computer crime (tries to prevent, detect and remedy attacks) and identity/anonymity in cyberspace.

Although confidentiality, integrity and authenticity arerepparttar 135736 most important things when it comes to computer security in general, for everyday internet users, privacy isrepparttar 135737 most important one, because many people think that they have nothing to hide orrepparttar 135738 information they give doesn't seem sensitive when they register with an internet service/site.

But remember that, onrepparttar 135739 internet, information is very easily shared among companies and small pieces of related information from different sources can be linked together to form something alot more complex about a person. Because of this, nowadays,repparttar 135740 ability to maintain control over what information is collected about them, who may use it and how it can be used is extremely important.

For information and resources on network, computer security, hackers, vulnerabilities, patches, advisories, and more visit

    <Back to Page 1 © 2005
Terms of Use