5 Tips for Buying a Laptop
Buying a laptop is a major investment decision. As such it is not one that you should make lightly. Below are 5 tips that will help prepare you for making the best and most well informed decision when buying a laptop.
Tip #1 Size Matters
Buying a laptop is a matter that requires some thought. Consider the size and weight of the laptop. How often will you be carrying your laptop? Your answer will help determine which size and weight will best suit your needs. If you will be carrying your laptop frequently, a lighter model will be preferable.
The keyboard is another area to consider when buying a laptop. Why is the size of the keyboard important? A larger laptop will have a slightly larger keyboard area. But keep in mind that if you worry about your fingers or wrists taking on too much stress from typing on a keyboard that is too small, you may want this to be a main factor in your purchasing decision,
Tip #2 Choose Your Mouse
A laptop it will come with a built in touch pad, an alternative to the mouse, whereby the pad is controlled by the user’s finger movement. For some people, this type of pad is uncomfortable and not easy to work with. Before purchasing a laptop, determine what mouse options are available. Test each one and determine which one best meets your needs.
Tip #3 Wireless Options
Today, when many people think laptop, they think “wireless”. No doubt people want to make sure that their laptop computer will be able to access the Internet with a wireless connection. Many try to account for this by ensuring that their laptop has potential upgrade options, such as room for an expandable PC card or a USB port. However, since so many laptop users are looking for wireless connections, many of today’s laptops come pre-wired for wireless Internet. All you need to do is activate your wireless Internet service, and your laptop will take it from there. So depending on your needs, choose your laptop whether it is capable of expanding or if it is already configured for wireless Internet.
Tip #4 Check for Ports
Peripheral equipment will be connected to your laptop through USB ports. You will make your life much less complicated by ensuring that your laptop has adequate ports. Connecting equipment such as printers, scanners, and digital cameras will be much simpler if you have the ports readily available. If you are not sure, thoroughly read the specs for any laptop that you are considering purchasing.
Tip #5 Check Your Budget First
Finally, when buying a laptop, beware that you do not overspend. First create your budget and stick to it. When you think that you have found the laptop that you want, do not rush into it. Wait a day and check over your budget, requirements, and see if you are still as excited about the laptop in the morning, as you were when the sales clerk was showing off its specs. If you still feel that it is the laptop that you want to purchase, then go for it.
Showing posts with label wireless. Show all posts
Showing posts with label wireless. Show all posts
Friday, January 9, 2009
Sunday, January 4, 2009
Checking To See If You Have Wireless Capability
Do you know if your new computer already has wireless capability? Many new computers have the built-in software and connections in order for you to set up a wireless network. These wireless networking devices are so inexpensive that the manufacturers of the computers include them as part of the package and can be found on the system specification list.
Like most people, however, you may not even know how much memory your computer has, let alone whether it arrived already wireless-enabled. This is especially true if you don't know what wireless networking is. It's easy to ignore this detail in the specifications that come with the computer and to fail to take the time to set it up and get it working. Let’s look at some things to look for if you want to check your computer's wireless capabilities.
Intel Centrino
If you own a laptop that comes with something called 'Intel Centrino mobile technology', this is what you’re looking for! Unfortunately, manufacturers of computers are not good at explaining what this technology is or does. Quite simply, it means that your laptop has wireless networking built right in; you don’t need to do a thing! Intel Centrino is a term used in marketing that stands for a combination of the Intel Pentium M processor and Intel's Pro/Wireless card.
Your computer should have an 'Intel Centrino' sticker on it somewhere if it is enabled with Intel Centrino. If you don’t see this type of sticker, you can also check the name of your processor by right-clicking the My Computer icon in the Start Menu (or on your desktop) and clicking on “Properties” from the menu. Look at the wording following the word “Computer” in this section. It should tell you if it has the wireless feature.
Intel Centrino technology has the capability of increasing the life of your computer’s battery and allows computers to be smaller in size. If you didn't buy an Intel Centrino laptop but your laptop has a free card slot, adding wireless capabilities will be no problem.
Desktop Computers
Desktop computers come with wireless capabilities, too. If you're not sure whether or not your desktop computer has a wireless connection, turn it around and look at the back of the computer. If a wireless connection is present, you can generally see a small aerial antenna sticking out of the back of the computer near the bottom of the computer.
If you don’t see anything there, it's still possible that you have a wireless device in the computer, especially if the computer is relatively new. Unless you’re a computer expert, don’t open the back of your computer to determine if it has wireless capabilities. Instead, you should probably try and figure it out using Windows.
Checking in Windows
You can easily check your computer’s wireless capabilities by going into Windows' Device Manager. You must first right-click My Computer and choose Manage from that menu. Now click on “Device Manager”.
In device manager, you will be able to see a list of the different devices you have or would be able to have on your computer. Look under 'Network Adapters'. Anything that uses the words '10/100' or 'Ethernet' is a normal network connection and isn’t related to wireless connectivity. Anything else may be a wireless device.
If you think you have a wireless device but note that it has a yellow warning sign next to its name in the Device Manager, click its name to find out what is wrong with the device. Windows should be able to let you know why the device is not working. The computer may also suggest that you go into its troubleshooter program. Try doing that before trying anything else.
The problem could be a driver problem. In that case, insert the drivers CD that came with your computer. If you can’t find the drivers CD, you can always find the drivers online. In order to do this, you should look on the website of the computer's manufacturer. From there, you can try searching for the particular name of the wireless device in Device Manager.
Unfortunately, it could turn out that you don't have a wireless device after all. That’s too bad. On the bright side, it is much better to learn that now than it would be to buy wireless equipment and then realize you couldn’t run it on your computer. In any event, even if you did find a wireless device in one of your computers, you may decide that you need even more wireless capability. Fortunately, wireless technology is getting cheaper all the time!
Like most people, however, you may not even know how much memory your computer has, let alone whether it arrived already wireless-enabled. This is especially true if you don't know what wireless networking is. It's easy to ignore this detail in the specifications that come with the computer and to fail to take the time to set it up and get it working. Let’s look at some things to look for if you want to check your computer's wireless capabilities.
Intel Centrino
If you own a laptop that comes with something called 'Intel Centrino mobile technology', this is what you’re looking for! Unfortunately, manufacturers of computers are not good at explaining what this technology is or does. Quite simply, it means that your laptop has wireless networking built right in; you don’t need to do a thing! Intel Centrino is a term used in marketing that stands for a combination of the Intel Pentium M processor and Intel's Pro/Wireless card.
Your computer should have an 'Intel Centrino' sticker on it somewhere if it is enabled with Intel Centrino. If you don’t see this type of sticker, you can also check the name of your processor by right-clicking the My Computer icon in the Start Menu (or on your desktop) and clicking on “Properties” from the menu. Look at the wording following the word “Computer” in this section. It should tell you if it has the wireless feature.
Intel Centrino technology has the capability of increasing the life of your computer’s battery and allows computers to be smaller in size. If you didn't buy an Intel Centrino laptop but your laptop has a free card slot, adding wireless capabilities will be no problem.
Desktop Computers
Desktop computers come with wireless capabilities, too. If you're not sure whether or not your desktop computer has a wireless connection, turn it around and look at the back of the computer. If a wireless connection is present, you can generally see a small aerial antenna sticking out of the back of the computer near the bottom of the computer.
If you don’t see anything there, it's still possible that you have a wireless device in the computer, especially if the computer is relatively new. Unless you’re a computer expert, don’t open the back of your computer to determine if it has wireless capabilities. Instead, you should probably try and figure it out using Windows.
Checking in Windows
You can easily check your computer’s wireless capabilities by going into Windows' Device Manager. You must first right-click My Computer and choose Manage from that menu. Now click on “Device Manager”.
In device manager, you will be able to see a list of the different devices you have or would be able to have on your computer. Look under 'Network Adapters'. Anything that uses the words '10/100' or 'Ethernet' is a normal network connection and isn’t related to wireless connectivity. Anything else may be a wireless device.
If you think you have a wireless device but note that it has a yellow warning sign next to its name in the Device Manager, click its name to find out what is wrong with the device. Windows should be able to let you know why the device is not working. The computer may also suggest that you go into its troubleshooter program. Try doing that before trying anything else.
The problem could be a driver problem. In that case, insert the drivers CD that came with your computer. If you can’t find the drivers CD, you can always find the drivers online. In order to do this, you should look on the website of the computer's manufacturer. From there, you can try searching for the particular name of the wireless device in Device Manager.
Unfortunately, it could turn out that you don't have a wireless device after all. That’s too bad. On the bright side, it is much better to learn that now than it would be to buy wireless equipment and then realize you couldn’t run it on your computer. In any event, even if you did find a wireless device in one of your computers, you may decide that you need even more wireless capability. Fortunately, wireless technology is getting cheaper all the time!
Saturday, January 3, 2009
A Child Is Calling For Help. Wireless AMBER Alerts Put Wireless Devices To Use
Statistics show that the first three hours after a child's abduction are most critical to recovery efforts. By combining the efforts of the wireless industry with the U.S. Department of Justice, the National Center for Missing & Exploited Children® (NCMEC) and law enforcement agencies, the Wireless AMBER Alerts™ initiative will be a catalyst for the more than 200 million wireless subscribers to aid in the search for and recovery of an abducted child.
AMBER
According to NCMEC, more than 260 children have been recovered since the AMBER Alert program began in 1997. The program-an early warning system to find abducted children-started as a local effort in the Dallas-Fort Worth, Texas, area and became a national initiative in 2003. AMBER stands for "America's Missing: Broadcast Emergency Response." The program is a legacy to Amber Hagerman, a 9-year-old girl who was kidnapped while riding her bicycle in Arlington, Texas, and was later found murdered.
An estimated 70 percent of Americans have wireless phones, and together they can serve as a national network that assists families and the authorities in searching for abducted children. By signing up to receive Wireless AMBER Alerts, subscribers receive information about local Alerts, as well as updates as the search progresses.
Opting In
Subscribers capable of receiving text messages, and whose wireless carrier participates in the Wireless AMBER Alerts initiative, may opt in to receive Alerts by registering at www.wirelessamberalerts.org or their wireless carrier's Web site. Users can designate up to five ZIP codes from which they'd like to be alerted in the case of an AMBER Alert activation.
Public Service
Advertising Campaign
The Advertising Council, in partnership with NCMEC, The Wireless Foundation and the U.S Department of Justice, launched a multimedia public service advertising (PSA) campaign designed to raise awareness of Wireless AMBER Alerts and encourage all wireless subscribers to aid in the search for abducted children. It is the first nationwide PSA campaign to address this technology and the ads launched on National Missing Children's Day (May 25th).
Wireless subscribers can now sign up to receive free AMBER Alerts via text messages.
AMBER
According to NCMEC, more than 260 children have been recovered since the AMBER Alert program began in 1997. The program-an early warning system to find abducted children-started as a local effort in the Dallas-Fort Worth, Texas, area and became a national initiative in 2003. AMBER stands for "America's Missing: Broadcast Emergency Response." The program is a legacy to Amber Hagerman, a 9-year-old girl who was kidnapped while riding her bicycle in Arlington, Texas, and was later found murdered.
An estimated 70 percent of Americans have wireless phones, and together they can serve as a national network that assists families and the authorities in searching for abducted children. By signing up to receive Wireless AMBER Alerts, subscribers receive information about local Alerts, as well as updates as the search progresses.
Opting In
Subscribers capable of receiving text messages, and whose wireless carrier participates in the Wireless AMBER Alerts initiative, may opt in to receive Alerts by registering at www.wirelessamberalerts.org or their wireless carrier's Web site. Users can designate up to five ZIP codes from which they'd like to be alerted in the case of an AMBER Alert activation.
Public Service
Advertising Campaign
The Advertising Council, in partnership with NCMEC, The Wireless Foundation and the U.S Department of Justice, launched a multimedia public service advertising (PSA) campaign designed to raise awareness of Wireless AMBER Alerts and encourage all wireless subscribers to aid in the search for abducted children. It is the first nationwide PSA campaign to address this technology and the ads launched on National Missing Children's Day (May 25th).
Wireless subscribers can now sign up to receive free AMBER Alerts via text messages.
Sunday, December 28, 2008
Protect Your Network From Identity Theft Now!
It is deniable that our works and lives are more convenient and easier when using wireless. We can work anywhere and that is why wireless networks are becoming so popular. Especially if you have broadband Internet access, a wireless router can give you instant communication with the world.
Imagine you are sitting by the pool and enjoying chatting through the Internet. Or lounging in the Jacuzzi listening to your MP3 collection is appealing to us all. Unfortunately, many, or even most, wireless units don't come with security features already functioning. This may not seem like a big issue to someone who is simply setting up a home network, but there are a number of potential problems you should consider.
Identity theft seems to be the most serious problem. If your network is unsecured, the personal data on your wireless electronic equipment is also unsecured. The order you just placed for a book at Amazon may have given your contact and payment information to an unscrupulous hacker! Nearly every town in which "WiFi" is common will have "War Drivers" and "War Chalkers" at work. These are people who walk or drive around town with wireless equipment, searching for unsecured networks. The "Chalkers" then live up their name, marking curbs and other public items with chalk so that others can more easily find and exploit your network.
In fact, not all "War Drivers" are hackers, of course. Many just want to use your network for free, but the risk is high if you don't learn how to protect yourself. You can usually find quite a bit of free information as to how to secure your network at the website of your router's manufacturer, or by doing a search in a search engine for a phrase like "secure home wireless."
In addition, there are also your neighbors who may find your network by accident and enjoy nosing into your activities and using your Internet access at will, slowing down your network speed in the process.
Even many businesses use cheap, home-use quality equipment for their company networks. With the poor security often found on small business networks, anyone with a basic knowledge of wireless can access sensitive company and customer data.
It is highly recommended that you hire service companies to secure your network for you, or else you will have to bear with a risk of being exploited. A search of your local yellow pages or an inquiry at your neighborhood computer store should yield professional help and get your private data private again.
Imagine you are sitting by the pool and enjoying chatting through the Internet. Or lounging in the Jacuzzi listening to your MP3 collection is appealing to us all. Unfortunately, many, or even most, wireless units don't come with security features already functioning. This may not seem like a big issue to someone who is simply setting up a home network, but there are a number of potential problems you should consider.
Identity theft seems to be the most serious problem. If your network is unsecured, the personal data on your wireless electronic equipment is also unsecured. The order you just placed for a book at Amazon may have given your contact and payment information to an unscrupulous hacker! Nearly every town in which "WiFi" is common will have "War Drivers" and "War Chalkers" at work. These are people who walk or drive around town with wireless equipment, searching for unsecured networks. The "Chalkers" then live up their name, marking curbs and other public items with chalk so that others can more easily find and exploit your network.
In fact, not all "War Drivers" are hackers, of course. Many just want to use your network for free, but the risk is high if you don't learn how to protect yourself. You can usually find quite a bit of free information as to how to secure your network at the website of your router's manufacturer, or by doing a search in a search engine for a phrase like "secure home wireless."
In addition, there are also your neighbors who may find your network by accident and enjoy nosing into your activities and using your Internet access at will, slowing down your network speed in the process.
Even many businesses use cheap, home-use quality equipment for their company networks. With the poor security often found on small business networks, anyone with a basic knowledge of wireless can access sensitive company and customer data.
It is highly recommended that you hire service companies to secure your network for you, or else you will have to bear with a risk of being exploited. A search of your local yellow pages or an inquiry at your neighborhood computer store should yield professional help and get your private data private again.
Peltier Associates Breaking and Fixing Wireless Security
To the information security professional wireless networking may be thought of as a four letter word to be avoided at all costs. Regardless of the security implication wireless networking can provide cost efficiency, and because of that wireless technologies are here to stay. While many in the profession believe that wireless networks can be easily compromised, this class will show how the appropriate wireless architecture with the proper security controls can make your wireless network as secure as any other remote access point into your network.
In this three day, wireless security workshop, we will examine the cutting edge of wireless technologies. The purpose of the course is to give you a full understanding of what wireless (802.11) networks are, how they work, how people find them and exploit them, and how they can be secured. This hands-on course is based on real world examples, solutions, and deployments. In this course we will actually set up and use wireless networks, determine the tools to uncover wireless networks, and also look at how to defeat the attempts to secure wireless networks.
Course Completion
Upon the completion of our CISM course, students will have:
Constructed a wireless network architecture
Install and configure 802.1x authentication using Microsoft Windows IAS and Server 2000
Install a wireless access point
Distinguish between 802.11x standards
Defeat Wired Equivalent Privacy
Key Take Aways:
An understanding of wireless networks
A CD of common tools and documentation
An ability to search the internet for updates and more information on wireless networks
Detail of Course Content The following topics will be covered:
Wireless History
Radio Frequency (RF) Fundamentals
WLAN Infrastructure
802.11 Network Architecture
802.1X Authentication
Extensible Authentication Protocol (EAP)/(LEAP)/(PEAP)
Detection Platforms
WLAN Discovery Tools
Kismet
Wireless Sniffers
Conventional Detection
Antennas
Exploiting WLANs
Securing WLANs
Other Wireless Options
Legal Issues including GLBA and ISO-17799
Future
Resources
http://www.acquisitiondata.com/wireless_security.asp
In this three day, wireless security workshop, we will examine the cutting edge of wireless technologies. The purpose of the course is to give you a full understanding of what wireless (802.11) networks are, how they work, how people find them and exploit them, and how they can be secured. This hands-on course is based on real world examples, solutions, and deployments. In this course we will actually set up and use wireless networks, determine the tools to uncover wireless networks, and also look at how to defeat the attempts to secure wireless networks.
Course Completion
Upon the completion of our CISM course, students will have:
Constructed a wireless network architecture
Install and configure 802.1x authentication using Microsoft Windows IAS and Server 2000
Install a wireless access point
Distinguish between 802.11x standards
Defeat Wired Equivalent Privacy
Key Take Aways:
An understanding of wireless networks
A CD of common tools and documentation
An ability to search the internet for updates and more information on wireless networks
Detail of Course Content The following topics will be covered:
Wireless History
Radio Frequency (RF) Fundamentals
WLAN Infrastructure
802.11 Network Architecture
802.1X Authentication
Extensible Authentication Protocol (EAP)/(LEAP)/(PEAP)
Detection Platforms
WLAN Discovery Tools
Kismet
Wireless Sniffers
Conventional Detection
Antennas
Exploiting WLANs
Securing WLANs
Other Wireless Options
Legal Issues including GLBA and ISO-17799
Future
Resources
http://www.acquisitiondata.com/wireless_security.asp
Peltier Associates Breaking and Fixing Wireless Security
To the information security professional wireless networking may be thought of as a four letter word to be avoided at all costs. Regardless of the security implication wireless networking can provide cost efficiency, and because of that wireless technologies are here to stay. While many in the profession believe that wireless networks can be easily compromised, this class will show how the appropriate wireless architecture with the proper security controls can make your wireless network as secure as any other remote access point into your network.
In this three day, wireless security workshop, we will examine the cutting edge of wireless technologies. The purpose of the course is to give you a full understanding of what wireless (802.11) networks are, how they work, how people find them and exploit them, and how they can be secured. This hands-on course is based on real world examples, solutions, and deployments. In this course we will actually set up and use wireless networks, determine the tools to uncover wireless networks, and also look at how to defeat the attempts to secure wireless networks.
Course Completion
Upon the completion of our CISM course, students will have:
Constructed a wireless network architecture
Install and configure 802.1x authentication using Microsoft Windows IAS and Server 2000
Install a wireless access point
Distinguish between 802.11x standards
Defeat Wired Equivalent Privacy
Key Take Aways:
An understanding of wireless networks
A CD of common tools and documentation
An ability to search the internet for updates and more information on wireless networks
Detail of Course Content The following topics will be covered:
Wireless History
Radio Frequency (RF) Fundamentals
WLAN Infrastructure
802.11 Network Architecture
802.1X Authentication
Extensible Authentication Protocol (EAP)/(LEAP)/(PEAP)
Detection Platforms
WLAN Discovery Tools
Kismet
Wireless Sniffers
Conventional Detection
Antennas
Exploiting WLANs
Securing WLANs
Other Wireless Options
Legal Issues including GLBA and ISO-17799
Future
Resources
http://www.acquisitiondata.com/wireless_security.asp
In this three day, wireless security workshop, we will examine the cutting edge of wireless technologies. The purpose of the course is to give you a full understanding of what wireless (802.11) networks are, how they work, how people find them and exploit them, and how they can be secured. This hands-on course is based on real world examples, solutions, and deployments. In this course we will actually set up and use wireless networks, determine the tools to uncover wireless networks, and also look at how to defeat the attempts to secure wireless networks.
Course Completion
Upon the completion of our CISM course, students will have:
Constructed a wireless network architecture
Install and configure 802.1x authentication using Microsoft Windows IAS and Server 2000
Install a wireless access point
Distinguish between 802.11x standards
Defeat Wired Equivalent Privacy
Key Take Aways:
An understanding of wireless networks
A CD of common tools and documentation
An ability to search the internet for updates and more information on wireless networks
Detail of Course Content The following topics will be covered:
Wireless History
Radio Frequency (RF) Fundamentals
WLAN Infrastructure
802.11 Network Architecture
802.1X Authentication
Extensible Authentication Protocol (EAP)/(LEAP)/(PEAP)
Detection Platforms
WLAN Discovery Tools
Kismet
Wireless Sniffers
Conventional Detection
Antennas
Exploiting WLANs
Securing WLANs
Other Wireless Options
Legal Issues including GLBA and ISO-17799
Future
Resources
http://www.acquisitiondata.com/wireless_security.asp
Saturday, December 27, 2008
How To Secure Your Wireless Network
People have more flexible time due to wireless network. Thanks to the invention of wireless. People can now work from home while taking care of their kids or doing house works. No more stress from traffic jam anymore. Is this great?
Well, there is something you should realize. Working from home while using a wireless local area network (WLAN) may lead to theft of sensitive information and hacker or virus infiltration unless proper measures are taken. As WLANs send information over radio waves, someone with a receiver in your area could be picking up the transmission, thus gaining access to your computer. They could load viruses on to your laptop which could be transferred to the company's network when you go back to work.
Believe it or not! Up to 75 per cent of WLAN users do not have standard security features installed, while 20 per cent are left completely open as default configurations are not secured, but made for the users to have their network up and running ASAP. It is recommended that wireless router/access point setup be always done though a wired client.
You can setup your security by follow these steps:
1. Change default administrative password on wireless router/access point to a secured password.
2. Enable at least 128-bit WEP encryption on both card and access point. Change your WEP keys periodically. If equipment does not support at least 128-bit WEP encryption, consider replacing it. Although there are security issues with WEP, it represents minimum level of security, and it should be enabled.
3. Change the default SSID on your router/access point to a hard to guess name. Setup your computer device to connect to this SSID by default.
4. Setup router/access point not to broadcast the SSID. The same SSID needs to be setup on the client side manually. This feature may not be available on all equipment.
5. Block anonymous Internet requests or pings. On each computer having wireless network card, network connection properties should be configured to allow connection to Access Point Networks Only. Computer to Computer (peer to peer) Connection should not be allowed.
Enable MAC filtering. Deny association to wireless network for unspecified MAC addresses. Mac or Physical addresses are available through your computer device network connection setup and they are physically written on network cards. When adding new wireless cards / computer to the network, their MAC addresses should be registered with the router /access point. Network router should have firewall features enabled and demilitarized zone (DMZ) feature disabled.
All computers should have a properly configured personal firewall in addition to a hardware firewall. You should also update router/access point firmware when new versions become available. Locating router/access point away from strangers is also helpful so they cannot reset the router/access point to default settings. You can even try to locate router/access point in the middle of the building rather than near windows to limit signal coverage outside the building.
There is no guarantee of a full protection of your wireless network, but following these suggested tips can definitely lessen your risk of exposing to attackers aiming at insecure networks.
Well, there is something you should realize. Working from home while using a wireless local area network (WLAN) may lead to theft of sensitive information and hacker or virus infiltration unless proper measures are taken. As WLANs send information over radio waves, someone with a receiver in your area could be picking up the transmission, thus gaining access to your computer. They could load viruses on to your laptop which could be transferred to the company's network when you go back to work.
Believe it or not! Up to 75 per cent of WLAN users do not have standard security features installed, while 20 per cent are left completely open as default configurations are not secured, but made for the users to have their network up and running ASAP. It is recommended that wireless router/access point setup be always done though a wired client.
You can setup your security by follow these steps:
1. Change default administrative password on wireless router/access point to a secured password.
2. Enable at least 128-bit WEP encryption on both card and access point. Change your WEP keys periodically. If equipment does not support at least 128-bit WEP encryption, consider replacing it. Although there are security issues with WEP, it represents minimum level of security, and it should be enabled.
3. Change the default SSID on your router/access point to a hard to guess name. Setup your computer device to connect to this SSID by default.
4. Setup router/access point not to broadcast the SSID. The same SSID needs to be setup on the client side manually. This feature may not be available on all equipment.
5. Block anonymous Internet requests or pings. On each computer having wireless network card, network connection properties should be configured to allow connection to Access Point Networks Only. Computer to Computer (peer to peer) Connection should not be allowed.
Enable MAC filtering. Deny association to wireless network for unspecified MAC addresses. Mac or Physical addresses are available through your computer device network connection setup and they are physically written on network cards. When adding new wireless cards / computer to the network, their MAC addresses should be registered with the router /access point. Network router should have firewall features enabled and demilitarized zone (DMZ) feature disabled.
All computers should have a properly configured personal firewall in addition to a hardware firewall. You should also update router/access point firmware when new versions become available. Locating router/access point away from strangers is also helpful so they cannot reset the router/access point to default settings. You can even try to locate router/access point in the middle of the building rather than near windows to limit signal coverage outside the building.
There is no guarantee of a full protection of your wireless network, but following these suggested tips can definitely lessen your risk of exposing to attackers aiming at insecure networks.
Tuesday, December 23, 2008
An Overview of Mobile Wireless Computing
Being able to work while traveling is essential for every professional these days. That’s why laptops have become an essential item. Using the internet on a laptop is also important if one needs to keep in touch with work. Getting wireless internet for your laptop is therefore essential if you are a traveling professional. It is important that if you do so, get a wireless internet capability for your laptop, to get the best possible deal out there and maximize the potential of your computer. Due to the mobility of the laptop, computer users need not to be limited by wires when travelling so wireless internet is very handy. Wireless internet these days is becoming better and faster and almost a necessity for every laptop.
Having wireless internet on your laptop allows the user to conduct their business in a timely and easy manner. Having a wifi internet connection on the laptop for example, makes conducting business much easier. It is becoming increasingly popular as well. Being able to connect to the internet while traveling allows the user to check emails constantly and therefore keep contacts, to have access to information like checking figures, and enhance their productivity. To be able to connect to the internet using a laptop, the computer must have the wireless capability to connect to a router. It is imperative that the laptop must have the right network card with a WiFi connector. There are many public spaces that allow for WiFi connections in every western city. The quality of the connection differs from place to place since it depends on a variety of factors. In general, the quality of the connection depends on the quality of the wireless signal that your laptop receives. Being closer or further from the source of the signal in the end will determine the strength and therefore the quality and possibly the speed of your connection. A WiFi network allows for constant connectivity in all hours of the day and every day of the week.
Currently, computer and consequently laptop manufactures are investing time and money in enhancing their products networking capabilities and speeds. In the past few years, wireless connectivity has come a long way in terms of quality and strength. When the portable computers were introduced a few years back the notion of the mobile network already existed. Nevertheless, it was not perfected and had many flaws. Over the years however, wireless capabilities have expanded, they have been bettered allowing for greater connectivity, stronger networks, and higher productivity. As a result, and due to the constant technological advancements, laptop users these days can buy the computer and never have to worry about finding a modem, or a router or those inconvenient cables. Just turn on the computer and start surfing the web. Due to the increasing popularity o wireless internet public spaces have been accommodating for this new trend. Public libraries, airports, or even specific businesses provide wireless internet for their customers. In many city centres in North America, there are so many wireless networks functioning at the same place that it is virtually impossible not to find an internet connection to log on to. The only down side to wireless computing is that it might be associated with health risks that we are not yet aware of. Overall, however wireless computing is the way to go for the business professional, the student or every other avid computer user.
Having wireless internet on your laptop allows the user to conduct their business in a timely and easy manner. Having a wifi internet connection on the laptop for example, makes conducting business much easier. It is becoming increasingly popular as well. Being able to connect to the internet while traveling allows the user to check emails constantly and therefore keep contacts, to have access to information like checking figures, and enhance their productivity. To be able to connect to the internet using a laptop, the computer must have the wireless capability to connect to a router. It is imperative that the laptop must have the right network card with a WiFi connector. There are many public spaces that allow for WiFi connections in every western city. The quality of the connection differs from place to place since it depends on a variety of factors. In general, the quality of the connection depends on the quality of the wireless signal that your laptop receives. Being closer or further from the source of the signal in the end will determine the strength and therefore the quality and possibly the speed of your connection. A WiFi network allows for constant connectivity in all hours of the day and every day of the week.
Currently, computer and consequently laptop manufactures are investing time and money in enhancing their products networking capabilities and speeds. In the past few years, wireless connectivity has come a long way in terms of quality and strength. When the portable computers were introduced a few years back the notion of the mobile network already existed. Nevertheless, it was not perfected and had many flaws. Over the years however, wireless capabilities have expanded, they have been bettered allowing for greater connectivity, stronger networks, and higher productivity. As a result, and due to the constant technological advancements, laptop users these days can buy the computer and never have to worry about finding a modem, or a router or those inconvenient cables. Just turn on the computer and start surfing the web. Due to the increasing popularity o wireless internet public spaces have been accommodating for this new trend. Public libraries, airports, or even specific businesses provide wireless internet for their customers. In many city centres in North America, there are so many wireless networks functioning at the same place that it is virtually impossible not to find an internet connection to log on to. The only down side to wireless computing is that it might be associated with health risks that we are not yet aware of. Overall, however wireless computing is the way to go for the business professional, the student or every other avid computer user.
Labels:
mobile computing,
wifi,
wireless,
wireless laptop,
wireless networks
Subscribe to:
Posts (Atom)