Free Help from Tech Experts

Geeks To Go is a helpful hub, where thousands of volunteers serve up answers and support. Check out the forums and get free advice from the experts, including malware removal and how-to guides and tutorials. Converse about Windows 10, get system building advice or download files... Go to forums >>

Author Archive

How To Make Your Wireless Network More Secure

With wireless internet taking over our lives, internet cables have become a rare sight. Today, what has been a breakthrough, cutting edge discovery just several years ago, is being utilized by most of us every day. It’s called Wireless LAN (otherwise referred to as WiFi, or WLAN) and while it did bring about a revolution in the way we access the internet, it doesn’t come without drawbacks.

Unlike a traditional, wired internet connection, Wireless LAN is transmitted through the air – and thus, anyone with the proper equipment can intercept it. In the best case scenario, someone steals your internet connection. But in the worst case, sensitive data may be intercepted and stolen.

So, just how do you make your wireless internet activity safer? How do you secure your connection? Here’s how.

Secure your wireless connection

If you connect to the internet wirelessly, you have a router. This device allows several wireless connections at a time. There are several methods to secure your home or business connection. They can be used separately or best –  together, for ultimate protection. Note: Refer to your router’s user manual to determine the exact procedures needed to change the various settings mentioned in this article. They may vary from router to router.

MAC filtering

MAC, not to confuse with Apple’s operating system, is an acronym which stands for Media Access Control. A unique MAC address is assigned to network adapters, in our case, in order to identify the computer. Most routers allow filtering MAC addresses, so only specific addresses can connect to the network. This is a rather simple method, which has several drawbacks. First, even a not particularly seasoned hacker can spoof a MAC address and gain access to the router. Second, this system proves to be inefficient over time, as any device or computer you might want to add to the trusted list, needs to be manually entered into the system.

To find out your network adapter’s MAC address in Windows, you first need to open a command prompt – in Windows 98/2000/XP, click Start > Run > type “cmd” (without the quotes) then hit OK. In Windows Vista, click Start > All Programs > Accessories > Command Prompt. In the window that appears, type “ipconfig/all” (without the quotes) and hit Enter. You will see a plethora of information on the screen – we’re looking for Physical Address under Ethernet Adapter.

After you’ve found out the relevant MAC address, open up your router’s interface through a browser (see the manual). You will then need to look for an option called MAC Filtering or similar. There, enable MAC filtering and add the address we’ve just found to the list. Note that you will need to do the same procedure for every additional computer, as well as when changing network adapters.

Secret Access Point name

Every wireless connection – or Access Point -– has a Service Set Identifier (SSID), which translates to the name of the wireless network you’re connecting to. By default, the SSID will automatically show when one searches for a wireless network.  However, most routers allow you to hide the SSID, so it’s only possible to connect to the network by entering the exact SSID. This is where you come in – you can give the connection a particularly nasty or long name, essentially serving as a password. The major disadvantage here, like with MAC filtering, is that any average hacker will be able to sniff out a hidden SSID’s name, and effortlessly connect to your network if it’s not encrypted.

To make a hidden SSID, search for this option in the router’s menu – it can usually be found under Wireless Setup or similar. After this, you will need to enter the exact SSID when connecting to this network.

Encryption

This is by far the most popular and secure method of protecting your wireless connection. Wireless Network encryption means that you have to enter a password to gain access to  a WLAN or the information streamed through the connection.

There are two main encryption protocols in use today. The first is called WEP – which stands for Wired Equivalent Protection. WEP is an aged technology, having been developed in the early days of WLAN. Therefore, although it still remains a very popular encryption method, it is the most insecure – it’s very easy to crack this encryption protocol with no technical knowledge and simply with a few minutes to spare. WEP is offered in several degrees of complexity: 64, 128 and 256 bits, which directly influence the encryption key’s length. The more complex the cipher is, the better.

To answer the disadvantages of WEP, a new protocol – called WPA (WiFi Protected Access) – was developed by the Wi-Fi Alliance. It utilizes a more complex algorithm which is far more secure than WEP. Unfortunately, WPA and WPA2 – the newest iteration of the protocol – are not readily available on all routers on sale today, so if you’re shopping for a router in the lower price range, make sure it supports WPA for ultimate security. The encryption key, in WPA’s case, can be entered as 8-63 characters – but generally speaking, a random, 13 character WPA key is nearly impossible to crack.

Which protocol to use is your decision – however, using WPA is highly recommended, as it provides a much better layer of security than WEP. Whichever you choose, remember to use a random combination of letters and numbers as your password – if your router has a ‘Generate Password’ feature, use it.

To set up encryption, enter your router’s menu and look for Wireless Security. Choose the appropriate protocol and follow the instructions.

Additional tips on wireless security

  • When using public wireless networks, like in a café or  restaurant, pay extra attention to online security. Avoid entering your banking information, or credit card number, while connected in public networks, as it’s very easy for hackers to intercept this information and steal it.

Norton Internet Security 2009: Review

imageChange can be a great thing. We’ve all heard fascinating tales of people who shed half their weight.  But change can also be treacherous and destructive. A peek into history books would reveal us tales of great empires falling apart, leaving nothing but dust behind. Doubtless however, change is powerful.

Symantec’s history over the last few years seems to match the second definition. The huge security company, which just a few years ago has been the biggest and doubtless the most influencing security software developer around, witnessed a steep downfall in sales. The security giant, whose products were once installed in almost every new computer, was taunted by the Revolution of the Internet. Faster download speeds made it easier to find alternatives – some of which were free; so did online reviews and comparisons, which were available to everyone: not only in geeky computer magazines.

Read the rest of this entry »

Can Spam – Put Your Inbox on a Diet

slim_spam

The first thing that comes to mind upon hearing the word spam, for most people, is an email advertising certain enhancements to the male body, not the cheap pork brand – which is actually the source of the word. This is not surprising: in 2006, 40% of all e-mails sent – 12 billion per day – were classified as spam emails, and that figure continues to grow constantly as spam vendors evolve and develop their spamming practices.

Many people have had their personal email boxes completely flooded with spam emails – but just how massive is this phenomenon is in real life, for a real person? What websites send the most spam? How do your actions influence the amount of spam sent? Finding answers to these is just the purpose of the recent McAfee research, the results of which have been posted last June. McAfee took spam surveys on a whole new level. 50 volunteers from around the world have been given a computer and email accounts and participated in this research, creatively named Spammed Persistently All Month (SPAM). They have been asked to submit their email addresses to as many websites as possible, including ‘get rich quick’ plans, ‘work from home’ websites, ad clicking websites, and free giveaways: iPods, vacations, etc., and similar.

Read the rest of this entry »

Firefox 3 vs. Opera 9.5

Over the last few years, Mozilla has taken quite a large slice of the internet browser market.  Its community-developed Firefox, is now already in its 3rd version, which has been released today.  Firefox has been praised for its security features, and often declared safer than Microsoft’s Internet Explorer by security experts. The new Firefox boasts, in addition to a comprehensive redesign of its looks and a host of new features, several new security enhancements which promise to make it even more secure.

But Firefox isn’t the only player in the web browser game. Another recent player is Opera. Actually, it’s not new, per se. Several years ago, before Firefox’s breakthrough into the market, Opera was a paid browser. Later, Opera released an ad-supported free version, and then finally released a fully free version, without any advertising whatsoever, in order to try and capture a larger market share. The release of various beta versions of Firefox 3 took most of the attention of the media, however, and the news about the release of the new 9.5 version of Opera was overlooked. Along with an update of its appearance, the addition of several new gadgets and features, and speed optimization, Opera added a security feature which is very similar to one offered by Firefox 3; both of these enhancements will be described later in this article.

So, is Opera a real player in the browser scene? Can it beat the unbeatable? Let’s find out.

Read the rest of this entry »