New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Donations
If you found this site helpful, please donate to help keep it online
Don't want to use PayPal? Try our physical address
image
Prime Choice
· Head Lines
· Advisories (All)
· Dnld of the Week!
· CCSP News Ltrs
· Find a Cure!

· Ian T's (AR 23)
· Marcia's (CO8)
· Bill G's (CO11)
· Paul's (AR 5)
· Robin's (AR 2)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
· Robin's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· RegChat
· Reviews
· Google Search
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
How much can you give to keep Computer Cops online?

$10 up to $25 per year?
$25 up to $50 per year?
$10 up to $25 per month?
$25 up to $50 per month?
More than $50 per year?
More than $50 per month?
One time only?
Other (please comment)



Results
Polls

Votes: 986
Comments: 19
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image
image wireless: Security HeadLines: Make sure your wireless network can't be sniffed image
Wireless
Make sure your wireless network can't be sniffed, warns DataPro
By Gary Sweidan

As wireless networks are becoming more popular, companies need to understand that they also need to be protected from intrusions because people with the right technology will be able to gain access to their networks, said Gary Sweidan, operations director of premier Internet service provider (ISP), DataPro.

One of the biggest problems, said Sweidan, is the capability of the people with the right technology to detect, or 'sniff', a wireless network.

The really alarming thing is that many of the tools required to hack into wireless networks are freely available on the Internet. There have even been press articles, which have talked about these tools, telling the reader where to find them on the Internet. But while there are risks inherent in running a wireless network - just like a physical one - we clearly have to accept that they are going to become more popular. The same security procedures, therefore, need to be taken - just as for a 'normal' network.

Sweidan said any sensitive information carried over a wireless network must, therefore, be protected by an appropriate form, and level, of encryption to protect against 'wireless eavesdropping'.

Network administrators might often wonder how close the perpetrators need to be to the wireless network to hack into it. Sweidan said that while the range of detection - and of actually data theft - can be limited to only a few meters by the small antennas or aerials built into the wireless LAN card, some models these days are provided with an external antenna connector which enables this range to be increased to several hundred meters and, in some instances, even kilometres.

Another problem faced by users of wireless networks is the advent of spoofing. This is where Internet hackers set up rogue wireless devices to ply their trade. The idea here is for the hacker to get legal or authorised users to connect unwittingly to the rogue, or false, network. This means there is no security whatsoever, and, as the authorised user is duped into connecting to the rogue network sensitive information can be effortlessly gleaned by the hacker.

There are ways to safeguard against this. One way, he explained, is to ensure that users modify their own default settings. In fact, SSID settings on a network should be regarded as the first level of security when it comes to wireless networks. Although the SSID, on its own, is not the ultimate panacea for wireless network security - and will not completely protect the network from unwanted intrusion - by cleverly configuring the SSID, hacking into your network will become a lot harder.

Sweidan said when it comes to network security the issue of money always crops up. With enough money networks can be made very safe. But not every company has millions of rands to throw at network security - even if the directors or management clearly recognise the importance of high-level network security.

But businesses with heavy network needs - and with enough money - can certainly consider installing a virtual private network (VPN). A VPN can be implemented with very high levels of network security; but they are naturally only advisable where a company, or corporation, has a number of office locations around the country.

It must also be remembered that hackers are not always malicious. They are not always out to do damage. Often they are just bored teenagers or students with a high level of technical skills - and who just enjoy gaining access to networks and Web sites. This notwithstanding, every now and again, a hacker might just get nasty and steal information for his own ends - or may be employed to get involved in industrial espionage. To be utterly safe, one should ensure that your level of network security is not only appropriate for your business requirements - and budget - but that it is aligned to protect you from the worst case scenario.




--------------------------------------------------------------------------------

itweb
Article printout from ITWeb courtesy of Lexmark South Africa.
Copyright © 1996-2003 ITWeb Limited
Posted on Thursday, 30 October 2003 @ 04:20:00 EST by phoenix22
image

 
Login
Nickname

Password

· New User? ·
Click here to create a registered account.
image
Related Links
· TrackBack (0)
· HotScripts
· W3 Consortium
· More about Wireless
· News by phoenix22


Most read story about Wireless:
First Ever GSM Cellphone Exploit

image
Article Rating
Average Score: 0
Votes: 0

Please take a second and vote for this article:

Bad
Regular
Good
Very Good
Excellent


image
Options

Printer Friendly Page  Printer Friendly Page

image
"Login" | Login/Create an Account | 0 comments
Threshold
The comments are owned by the poster. We aren't responsible for their content.

No Comments Allowed for Anonymous, please register