4 tips to Increase your income online part 1

Written by Smiley George


Inrepparttar year 2000, Bill Gates commented aboutrepparttar 136935 internet saying, "the internet will create thousands upon thousands of new millionaires inrepparttar 136936 next four years, those who do not learn to use it will be left behinde, for there will be two people on planet earth: those onrepparttar 136937 internet and those going out of business". That same year, I got hooked torepparttar 136938 cyberworld. Becoming aware ofrepparttar 136939 infromation age, An age characterized by a high demand for infromation and where its exchange is quick.

The Internet is a door opener on a glamorous and exicting world with a powerful formative influence. Its advent has greatly increasedrepparttar 136940 abilities of companies to transact their businesses faster, accureately, and at reduced costs.

Road Warrior At Risk: The Dangers Of Ad-Hoc Wireless Networking

Written by Darren Miller


Airport Menace: The Wireless Peeping Tom

----------------------------------------

As a network security consultant, I travel quite frequently. At times, it seems likerepparttar airport is my second home. I actually like to fly, it's a moment in time where no one can reach me by e-mail, or mobile phone.

It never fails that something interesting happens to me at repparttar 136861 airport. I've even met some famous people during my travels. A few months ago, I ran into Frank Bielec, fromrepparttar 136862 TLC show, Trading Spaces. But one of my favorite things to do atrepparttar 136863 airport is browserepparttar 136864 wireless Ethernet waves. I'm never really surprised at what I find. I'm just glad I know more about wireless Ethernet thanrepparttar 136865 average road warrior.

The Dangers Of Ad-Hoc Wireless Networking

-----------------------------------------

Most people who have wireless Ethernet at home, orrepparttar 136866 office, connect torepparttar 136867 wireless network by attaching to a wireless Access Point, or AP. This method of wireless networking is called "Infrastructure Mode". If you have a secure wireless network configured in "Infrastructure Mode" you are using MAC address filtering, some level of encryption, and have made some additional changes to your AP in order to prevent just anyone from using it or capturing data. For more information on configuring your "Infrastructure Mode" wireless network take a look atrepparttar 136868 "Wireless Network Security" page at Defending The Net.

However, for those who are not using "Infrastructure Mode", and are configured to communicate from machine to machine, or "Ad-Hoc", there are a few things you should be aware of.

A wireless Ad-Hoc network allows you to communicate with other wireless Ethernet systems without using a wireless access point. It's kind of a peer to peer configuration and it works rather well. The problem is, most people just set it up, and forget about it. At home, it's not a huge problem, but when your onrepparttar 136869 road, it could cause you a great deal of grief. The airport is probablyrepparttar 136870 best place to find Ad-Hoc networks. Business men and women, delayed once again, power up their laptops and get to work completingrepparttar 136871 days tasks, or planning tomorrows agendas.

I can't tell you how many systems I find inrepparttar 136872 airport configured this way. Not just inrepparttar 136873 terminal, but onrepparttar 136874 plane. About three months ago, just after we reached cruising altitude and were allowed to use our "approved electronic devices", I found thatrepparttar 136875 gentleman two seats up from me had a laptop configured as Ad-Hoc. He walked by me about ten minutes later and commented on how much he liked my laptop. I thanked him, and asked if his laptop was on, and configured to use wireless Ethernet, he said yes.

To make a long story short, I showed him that I could see his laptops wireless Ethernet and informed him ofrepparttar 136876 danger. He asked me if I could access his hard drive, and I told him that it might be possible. He asked me to see if I could, so I obliged. After configuring my laptop to userepparttar 136877 same IP address class as his, and typing "net use * hiscomputersIPAddressc$ "" /USER:administrator", I received a notice thatrepparttar 136878 connection was successful and drive Z: was now mapped to his computer. I performed a directory listing of his hard drive andrepparttar 136879 guy almost had a heart attack!

Cont'd on page 2 ==>
 
ImproveHomeLife.com © 2005
Terms of Use