The Essentials of Wireless SecurityWritten by Daniel Robson
Continued from page 1
Of course this is a very worst-case example, and as such very unlikely. Even in today’s climate of moral decrepitude this sort of occurrence would, we hope, be extraordinarily rare. But hopefully it will help drive home point that securing your network should be taken very seriously indeed. But what can you do to protect yourself? I would recommend that all wireless networks should make use of WEP (Wired Equivalent Privacy) encryption option which comes as standard with almost all routers and base stations. Although turned off by default this feature is absolutely essential. Utilising either 64-bit encryption, which creates a 64bit encryption based on a 40-bit key with a 24-bit initialisation vector, or 128-bit encryption which makes use of a 104-bit key with a 24-bit initialisation vector, a secure password is created. This password should only be given to known and trusted wireless devices, blocking access to any interloper. This, although not secure against dedicated crackers, provides a more than adequate protection to dissuade nosy or vast majority of war-drivers. Too few people enable this basic protection, or are even aware it exists. However in some regards protecting your network can be as essential as your childhood inoculation against tetanus. So please, take just a few minutes of your time to configure your WEP encryption, and to help protect yourself. For a more in-depth technical overview of points covered in this article you can visit http://www.iss.net/wireless/WLAN_FAQ.php, a very useful, if slightly esoteric, overview of various security concerns over standard 802.11 wireless specification.

Daniel Robson runs www.shock-therapy.org where among other things he hands out his freeware, other peoples freeware, and his views on a myriad of different topics.
| | Computer Security - What Exactly Is It?Written by Ciontescu Molie
Continued from page 1
In addition to these technical aspects, concept of computer security is very large. Computer security's roots are drawn from disciplines like ethics and risk analysis and major topics that are concerning it are computer crime (tries to prevent, detect and remedy attacks) and identity/anonymity in cyberspace. Although confidentiality, integrity and authenticity are most important things when it comes to computer security in general, for everyday internet users, privacy is most important one, because many people think that they have nothing to hide or information they give doesn't seem sensitive when they register with an internet service/site. But remember that, on internet, information is very easily shared among companies and small pieces of related information from different sources can be linked together to form something alot more complex about a person. Because of this, nowadays, ability to maintain control over what information is collected about them, who may use it and how it can be used is extremely important.

For information and resources on network, computer security, hackers, vulnerabilities, patches, advisories, and more visit http://www.itfreaks.com
|