What is the best technique to secure a wireless network. Securing a wireless network is very important because if you don't, your neighbors can not only borrow your Internet connection, but also access your files and check up on what you're doing. Even worse, hackers can use your internet connection to upload illegal materials, and the FBI will ring your bell. Then what? You don't know what to say now. These are what we call the bad hackers of the world. SECURE YOUR WIRELESS PEOPLE!!!!
Translate
Saturday, September 22, 2012
Tuesday, September 18, 2012
Are We Too Dependent on Computers
There are different opinions, for and against. With the improvement of technology, mobile phones have
become an inevitable part of our lives. Because of their convenience and
improvements, we now can make a phone call from any spot on our planet Earth. In today’s society our technology is more advanced than ever
before. So far advanced is our society, that we can easily use cell phones to
speak to anyone, anywhere and at any time. That’s why I am in favor of them.
Hackers Friend or Foe???
Good hackers go to heaven, bad
hackers go everywhere. But who are these hackers and what is so bad or so good
about them? What do they do? Where do they go? Trying to answer these questions
raises even more. Consider the following recent incidences.
The
attacks on the Internet are made possible by an early design error. The
Internet was not designed to be a large public network. It was designed to be a
closed network used by trustworthy people inside the US military and
universities. Today the vulnerabilities are causing heartburn for all those who
depend on the network. The hackers are running amok, and the fear of legal
action is not enough of a restriction (the challenge is to cause harm and not get
caught). The solution? Who knows?

Saturday, September 15, 2012
How safe are cell phone networks?
Many people remain unaware that smartphones face even greater security threats than home computers. Viruses, hacking and theft can put sensitive personal information at risk. However, the many integrated features of a smartphone make it even more valuable to hackers. Some hackers can even monitor your personal conversations when the phone appears to be off.
Thursday, September 13, 2012
Pt.1 How secure are your wireless networks home or office??
A variety of site surveys found that more than half of all wireless networks are wide open and ripe for anyone to gather traffic and even steal sensitive information. Some people mess around with locking down MAC address, but that gets unwieldy and a better solution would be to use WPA2 encryption. WPA2 is far better than other encryption methods that are more easily broken into.
If you have a wireless network, make sure to hide your SSID (service set identifier), or at least change its name to something common. All wireless routers should have obscure IDs when they announce themselves to the world. Rather than using a name that makes it clear who owns the router or that can divulge your location, such as “Acme Systems, here on the 4th floor” or the product name like “Netgear,” use something innocuous like “wireless” or “router1″ that doesn’t give away any critical information. In my last apartment, I had neighbors who used their apartment numbers for their IDs, making it very easy to figure out who’s router was where. Still to this day they still have names placed on their wireless SSID!!!
If you have a wireless network, make sure to hide your SSID (service set identifier), or at least change its name to something common. All wireless routers should have obscure IDs when they announce themselves to the world. Rather than using a name that makes it clear who owns the router or that can divulge your location, such as “Acme Systems, here on the 4th floor” or the product name like “Netgear,” use something innocuous like “wireless” or “router1″ that doesn’t give away any critical information. In my last apartment, I had neighbors who used their apartment numbers for their IDs, making it very easy to figure out who’s router was where. Still to this day they still have names placed on their wireless SSID!!!
Monday, September 10, 2012
I guess you can thank the hackers for jobs.
Hackers are not cyber criminals thats a misconception
hackers define what technology is. Without hackers security would not grow.
They are used to hack into systems to find flaws and correct them to build a
better security systems not just in the internet but in all tech products.
Cyber criminal as you put are just hackers turned badjust like in life thees
bad people and good people. Not trying to prove you wrong or anything just
correcting some bad things about hackers. A lot of people would be out of jobs without hackers doing what they do. Just saying.
Thursday, September 6, 2012
The internet has progressed more than anyone would imagine. Just ask Sony?
As the internet grew so did the minds of hackers across the country. I think
when a software is created a hacker has already created a back door into the software. They are the ones creating them?
Really on the Sony hacker issue i think it was an inside job from a computer
hacker of friends who got a job with Sony. How else would the individual get pass the
security of Sony? Not saying it's not possible.
“Hacktivist” group 'Anonymous' had launched a
'Cyber' war against Sony. The attack was codenamed '#OpSony' and is said
to be a retaliatory attack on behalf of PS3 hackers George 'GeoHot'
Hotz and Graf_Chokolo.
Wednesday, August 29, 2012
The term “secure” sure has a lot of different meanings depending on the context in which it is used. If we take it from a corporate security perspective, your options are somewhat limited to physical security, as in video surveillance or physical access, or logical security, as in your laptop or data access. But, when you ask a security professional if they are secure, they will most certainly take that in the context of what they can control, and will most likely answer “yes”.
It’s no secret that network threats have grown significantly over the past several years – in number, as well as complication. This growth continues to place an overwhelming burden on IT resources, which have to combat these threats on a daily basis. These guys already have a rough job of just keeping up with the volume and variety of threats, But also making them go through multiple hoops and internal approvals to procure and piece together the solution from different vendors is enough to push a lot of folks over the edge!
Subscribe to:
Comments (Atom)


