Wireless Security

Increasingly, computer users  interested in convenience and  mobility are accessing the Internet  wirelessly. Today, business travelers  use wireless laptops to stay in touch  with the home office; vacationers beam  snapshots to friends while still on  holiday; and shoppers place orders from  the comfort of their couches. A wireless  network can connect computers in  different parts of your home or school  without a tangle of cords, and enable  you to work on a laptop anywhere  within the network’s range. Going wireless generally requires a  broadband Internet connection into  your home, called an “access point,”  like a cable or DSL line that runs into a  modem. To set up the wireless network,  you connect the access point to a  wireless router that broadcasts a signal  through the air, sometimes as far as  several hundred feet. Any computer  within range that’s equipped with a  wireless client card can pull the signal  from the air and gain access to the  Internet. The downside of a wireless  network is that, unless you take  certain precautions, anyone with a  wireless-ready computer can use your  network. That means your neighbors,  or even hackers lurking nearby, could  “piggyback” on your network, or  even access the information on your  computer. And if an unauthorized  person uses your network to commit a  crime or send spam, the activity can be  traced back to your account. Here’s how  you can protect your wireless network  and the computers on it. 1. Use encryption. The most effective  way to secure your wireless network  from intruders is to encrypt, or  scramble, communications over the  network. Most wireless routers, access  points, and base stations have a built-in  encryption mechanism. If your wireless  router doesn’t have an encryption  feature, consider getting one that does. Manufacturers often deliver wireless  routers with the encryption feature  turned off. You must turn it on. The  directions that come with your wireless  router should explain how to do  that. If they don’t, check the router  manufacturer’s website. Two main types of encryption are  available: Wi-Fi Protected Access (WPA)  and Wired Equivalent Privacy (WEP).  Your computer, router, and other  equipment must use the same encryption.  WPA is stronger; use it if  you have a choice. It should protect you  against most hackers. Some older routers use only WEP  encryption, which is better than no  encryption. It should protect your  wireless network against accidental  intrusions by neighbors or attacks by  less sophisticated hackers. If you use  WEP encryption, set it to the highest  security level available.

2. Use anti-virus and anti-spyware  software, and a firewall.

3. Most wireless routers have  a mechanism called identifier  broadcasting. Turn it off so your  computer won’t send a signal to any  device in the vicinity announcing its  presence

4. Change the identifier on your router  from the default. The identifier for your  router is likely to be a standard, default  ID assigned by the manufacturer to all  hardware of that model. Even if your  router is not broadcasting its identifier  to the world, hackers know the default  IDs and can use them to try to access  your network. Change your identifier to  something only you know, and  remember to configure the same  unique ID into your wireless router  and your computer so they can  communicate. Use a password that’s  at least 10 characters long. Again, the  longer your password, the harder it is  for hackers to break.

5. Change your router’s pre-set  password for administration to  something only you know. The longer  the password, the tougher it is to crack.

6. Allow only specific computers to  access your wireless network. Every  computer that is able to communicate  with a network is assigned its own  unique Media Access Control (MAC)  address. Wireless routers usually have a  mechanism to allow only devices with  particular MAC addresses access to the  network. Some hackers have mimicked  MAC addresses; so don’t rely on this  step alone.

7. Turn off your wireless network when  you know you won’t use it.

8. Don’t assume that public “hot spots”  are secure. Assume that other people  can access any information you see or  send over a public wireless network