Unfortunately, many of us are not sufficiently concerned with the security of our computer's data (unless we are working for the government). Usually it's not a problem, because if someone wants to enter your computer, they must break into your house too. But when you have a wireless network, things are a little bit different. The radios signals that are used by a wireless connection won't stop at the walls of your house. The information freely floats in the air. Even someone who is passing by your house and driving a car will be able, with a wireless networking adapter, to grab information right off your computer, including deleting your files, inserting viruses, using your computer to send spam, and so on - unless you take steps to protect your network.
Along with the WI-FI equipment comes a security technology called Wired Equivalent Privacy (WEP). A very typical aspect of WI-Fi wireless networking is the fact that WEP can be hacked. The hackers successfully stolen the the secret WEP keys that were used to encrypt data on WI-FI network.
A new system security was implemented in 2002 by the WI-FI Alliance: Wi-Fi Protected Access (WPA). To hack the encryption key at this new protection system is much more difficult. Although WEP isn't as secure as WPA, you take a much greater security risk if you don't use WEP at all.
Many AP's manufacturers, in order to encrypt features like WEP or WPA, added a variety of other security features described as firewall protection. Other useful firewall features to look for when buying an AP include:
Along with the WI-FI equipment comes a security technology called Wired Equivalent Privacy (WEP). A very typical aspect of WI-Fi wireless networking is the fact that WEP can be hacked. The hackers successfully stolen the the secret WEP keys that were used to encrypt data on WI-FI network.
A new system security was implemented in 2002 by the WI-FI Alliance: Wi-Fi Protected Access (WPA). To hack the encryption key at this new protection system is much more difficult. Although WEP isn't as secure as WPA, you take a much greater security risk if you don't use WEP at all.
Many AP's manufacturers, in order to encrypt features like WEP or WPA, added a variety of other security features described as firewall protection. Other useful firewall features to look for when buying an AP include:
- NAT - The magic that makes an Internet gateway possible
- Virtual Private Network (VPN)- Usually used by corporate netwoks. It allows a secure access to a network.
- Monitoring software- All types of alerts and logs that beckon you about other computers that try to access your network.
Steve has been writing articles online for nearly 3 years now. Not only does this author specialize in diet, health and finance, you can also check out his latest website on http://www.matchingshoesandbag.org which reviews and lists the dyeable bridal shoes.
Article Source: http://EzineArticles.com/?expert=Steve_A._Daniels
No comments:
Post a Comment