Quantcast
Channel: SoftSupplier » Wireless LAN security
Viewing all articles
Browse latest Browse all 3

How to protect against hackers?

0
0

In a world in constant motion, the usefulness of wireless networks can not be challenged. You need the Internet, you need to be informed. Print media is shrinking, influenced by economic period in which we all auspicious and the projections converge in one point: online. But we have very handy solutions. Almost every laptop has Wi-Fi now and the trend is also reflected in telephones field. If now few years ago a Wi-Fi mobile costed a fortune, now you can buy such a gadget at a decent price, under 300 euros. With the increasing popularity of wireless networks, the hacker attacks have increased, and the worst is that radio waves have an increased vulnerability compared to cable.

You’ve probably heard how easy it is to intercept a telephone conversation. Well, almost as simple, a hacker can access your laptop and steal confidential information : emails, documents, personal data and so on.  In fact, a hacker in action can see  everything you do in real time. From here till finding your various passwords and bank account data when doing a transaction is no more than one step. You become a victim of cyber criminals. How can you protect? Get informed. See what you should do to improve the security of the connection. We will disappoint you and tell you that there is 100% secure connection, but the more steps you take, the less likely to be stolen. Currently, the only remedy for which there is no a currently  solution is DoS (Denial of Service) or, even safer — DDoS. Let’s see what you can do against the rest.

Virtual world is an endless source of information

First of all, you must configure your security options (varies from system to system). If authentication and encryption settings are off, and the service identifier (SSiD) are left unchanged, the hacker’s task becomes more a routine as morning coffee. Check if you have at least one active encryption option. Also, you must be prudent in unsafe areas.
In parks, for example, is not recommended to do online transactions or other operations involving personal data. Wonder why? It’s easy. Because Access Point can be easily removed and configured by the hacker’s like and then mounted.  There are some „trap” connecting points and you better be careful. The situation is somewhat similar to the parks, but wireless networks are already prepared, designed by hackers to capture sensitive information such as credit card details.

You should install a program to monitor your connection. If the hacker will attempt an intrusion and is not sufficiently skilled to sweep the program, it will alert you and you can end the connection in time. Choose a more secure encryption option. First, beware of WEP (Wireless Encryption Protocol), a very weak security algorithm – a lot of hackers have been successful in just a few minutes, on users laptops who used WEP. Then, in the wireless module’s configuration panel, choose WPA or WPA2 – are much safer. This is the minimum of effort you need to do to reduce the risk of information theft. But let’s see what will make the hacker.

Protect against hackers

Hackers are moving on the ground and looking for vulnerable wireless access points. For this, they use an antenna that detects radio waves in the 2.4 GHz bands. AP, poorly configured, are scanned with a software (for example, Netstumbler), and then, using special programs (AirSnort, WEPCrack), they break the encryption codes. Finally, they use a software such as HostAP to convert the system into an Access Point. Finally, they will connect to the vulnerable network. Hence, any poorly configured computer will become a potential source of benefit to the hackers.

Might be hard to be a hacker?!

Note that these unpleasant events can happen not only in unsafe areas- recently even wireless networks in airports have been targeted by hackers. It’s normal, there are passing more important people, people with money.11


Viewing all articles
Browse latest Browse all 3

Latest Images

Trending Articles





Latest Images