Find Sporting Goods on eBay
Video and Audio], Broadcasting and podcasting Broadcast On the Net

[description], Story, any other text you want to use.

What Is Wardriving And How Can You Prevent It

 by: Zackary Anderson

Imagine a car equipped with nothing more than a laptop computer, a portable GPS receiver, and a wireless network card slowly strolls through your neighborhood. Unknown to any onlookers, this is no ordinary vehicle; rather, it is a wardriving machine. As the car strolls past homes and businesses, a wireless network card (available at any electronics store for as low as $25) scans for any wireless access points. Anyone with a wireless network (and there are many out there) is vulnerable. The computer is looking for what is called an SSID. An SSID is your wireless network name and it is being constantly transmitted by your access point, letting computers know of its presence. The wardriver uses software such as Netstumbler (for windows) or Cismet (for linux) to scan the airwaves for SSIDs. The program can track various access points at once and monitor the signal strength. These programs can also check to see if the network is encrypted. The wardriver will generally configure his or her software to log any strong unencrypted signals. Using the GPS receiver, the coordinates of the strong signal will be recorded. After this preliminary drive, the wardriver can return to the locations that were recorded, and connect to the access point. Once connected to an unencrypted network, the wardriver can use the victim's internet access, and can also explore computers on the network. If files are being shared within someone's private network, all of that information is susceptible to a wardriver. Furthermore, once in the network, a wardriver can sniff network traffic and can view any information such as passwords and credit card numbers you send out to the internet – even SSL secured data. Wireless network vulnerability is a major problem, and as more and more households purchase wireless technology, the problem of insecure networks increases. Sound scary? Well this happens every day, and it doesn't take an expert to pull off. It doesn't take an expert to protect against either, however.

Steps you can take to protect against wardrivers:

There are a number of very simple steps you can take to protect your wireless network. For many of these, you will have to access your router configuration utility (check your manual on how to do this, you will generally need to type an IP address into your browser such as 192.168.0.1 or 192.168.1.1).

Don't broadcast your SSID. If you are broadcasting your SSID, this is the first thing a program will pickup and recognize. If you configure your router to not broadcast your SSID, it will be difficult to detect (but not impossible, for some software can sniff wireless communication, so if you are using your wireless network, the SSID can be revealed). If you are not broadcasting your SSID, but it can be guessed (such as if you are using a default SSID), cloaking is pointless. Due to this, remember to change your SSID from the factory default. This is not a 100 percent effective method to secure your network, but it is a good first line of defense.

Change the default password. When you buy a router, a factory password is stored. People experienced in working with routers know the default passwords for different routers (and the make of the router can be seen by wardriver software such as netstumbler). It is important that you secure your router with a good password.

Encrypt your wireless communication. I can't stress the importance of encrypting your wireless communication enough. Enable encryption and enter a key. Most routers are only capable of WEP encryption, but if they permit, use EAP encryption, it's more secure than WEP. Like cloaking your SSID, encryption is not 100 percent secure. Given enough time and determination, if someone wants to target you and access your network, WEP encryption can be bypassed using software such as AirSnort.

Filter the MAC addresses that are allowed to connect to your router. This would require that you enter your router configuration and input the MAC address of each wireless card you have. This will restrict access so that only your computers can connect to the router. You will need to obtain the MAC address (which is the individual identification address of a network card in the form a 12 digit hexadecimal number). If someone sniffs traffic and detects the MAC address of a computer wirelessly using your network, the wardriver could emulate that address and connect to the router, but this takes time.

If you configure file sharing on your computers, make sure it is password protected. You should not share files on your networked computers unless it requires an authenticated user to access. Set up the same user accounts on your machines so that your computers can share files.

With these relatively simple steps, wireless network users can secure their networks from wardrivers. Wireless networks are inherently insecure, and these tips will merely help you greater secure your network. If someone is really determined to gain access to your network, given enough time, a good hacker can get access. These tips will deter the average wardriver from gaining access to your network, however. Although these methods are not definite security measures, they will change your network from being something that can be hacked in a matter of seconds, to something that will take a determined hacker days if not weeks of work, all of which will have to be done while in close proximity to your network.

About The Author

Zackary Anderson is a network security veteran, and CEO of Andertec Enterprises http://www.andertec.com, which specializes in onsite custom computer services for the Los Angeles area. Andertec also sells custom made-to-order computer systems, and has a line of revolutionary products at incredibly low prices including the best-selling CyberHome Complete home automation package.


dsl yahoo

Brodcast On the Net - streaming video, streaming audio, video conferencing, audio
Broadcast On the Net. If you are running a search for video conferencing and are looking for audio streaming or video streaminng and web conferenceing then you have come to the proper place. You can find many of the finest sites with the best conferencing services. Even find video studios or maybe the video talent to produce your program, no matter what you are looking for you can see the best streaming media here.
Brodcast On the Net - streaming video, streaming audio, video conferencing, audio

If you are truly interested in the very best in dsl yahoo then be sure you click the link above. We have researched the dsl yahoo subject extensively and can guarantee that the people have the best.

The dsl yahoo links on the left side of this page will take you directly to the specific item you need so look around. We have made it easy for you and of course this company stands behind their dsl yahoo with total satisfaction guarantees.

Main Menu
Broadcast On the Net
Site Map

Affiliate Ads, Links, news, etc.

News for 25-Nov-24

Source: BBC News - Home
George North: World Rugby wants more information from RFU over 'non-compliance'

Source: BBC News - Home
Steam baths and brandy

Source: BBC News - Home
Yemen's displaced

Source: BBC News - Home
Obama's snowman phobia

Source: BBC News - Home
Berlin truck attacker Anis Amri killed in Milan

Source: BBC News - Home
Arctic heatwave could break records

Source: BBC News - Home
Preserving Mali's rural life

Source: BBC News - Home
May Christmas message urges unity after Brexit vote

Source: BBC News - Home
UN votes against Israeli settlements

Source: BBC News - Home
British passenger missing from Queen Mary 2 liner


Links
Links
Links
Google

Forum On The Net | Medical Newscast | Real Time Media On The Net | Medical Newscast
Copyright © 2005. Name of Site here. Last Updated: Monday, 25-Nov-2024 00:00:50 MST.
Medical Meetings   Take It Correctly   Take It Right