Wireless Security Tips http://www.forcefieldwireless.com/tips.html Your wireless network gives you freedom. No longer do you have to be tied down to the wires of your network. With this freedom you lose the security of a wired network. You run the risk of others intercepting your emails, files, and using your network and internet connection. If you are implementing a wireless network or have had wireless for a long time you need protection. Remember, security is a personal decision, and we encourage you to use at least some level of security as a deterrent to intrusion. Here are some tips to make your wireless network more secure and efficient. Enable WEP (Wireless Equivalent Privacy) Even though WEP uses weak encryption and is breakable, it still provides an effective first measure of defense by encrypting the traffic between your wireless card and access point. Make sure you use the largest WEP key size that your equipment supports. Change your SSID (Service Set Identifier) to something non-descriptive You do not want to give out your name, address, or any other useful information to potential hackers. Also, using the default SSID is a bad idea. A good example would be anything non-descriptive like "flower" or "napkin" and a bad example would be "235 Elm St." or "Johnson Family". Change the default password(s) on your access points The default passwords of most network equipment are well known and could allow an intruder to gain access to your access point(s). Disable Broadcast SSID If your access point supports "closed system" or allows you to "disable broadcast SSID," use this feature. This will make your network essentially invisible to almost all scanning methods. Update the firmware and drivers on your access point and wireless cards It is always wise to use the latest firmware and drivers on your access points and wireless cards. Manufacturers commonly fix known issues, security holes, and enable new features with these updates. Enable MAC based filtering Using this feature, only your unique wireless cards can communicate with your access point. Turn off your access points when you are not using them Why risk being scanned or being broken into if you are not using your wireless network. Wave point placement and antenna selection Try to position your access points towards the center of your house or building. This will minimize the signal leak outside of its intended range. If you are using external antennas, selecting the right type of antenna can be helpful in minimizing signal leak. Disallow router / AP administration via wireless This feature is usually only present in "Enterprise-grade" AP's, and shuts off the ability to administer your Access Point from wireless clients. But if your router/AP has it, use it. Don't send sensitive files over Wi-Fi networks unless you know it's secure. Make sure that your internet connection is secure before you send very sensitive internet communications. On the web most sites that perform sensitive transactions like shopping with a credit card or checking bank account information use Secure Socket Layer (SSL) technology. SSL encrypts the transaction -- creating a secure tunnel between your computer and the web site server. How do you know if your web page transaction is using SSL? One good way is to look at the web page URL. The prefix should start with "https://";. The "s" means it's SSL secure. You can also look for a padlock icon or a solid key icon on your web browser. Some popular web-based email services allow users to log-on using a secure SSL connection. If you're sending or receiving email while using a Wi-Fi network, make sure you log-in to your web-based email using SSL. Use a virtual private network (VPN). A VPN is an advanced networking feature. It is a technology that creates a tunnel between your computer and the network server. Many corporate networks have VPN's to protect transmissions. If you are accessing your work files or email using a Wi-Fi network, make sure your office network administrator has created a VPN for those transmissions. These tips cover some things you can do to increase security, but they only constitute a small piece of a true security model. Remember, security is a personal decision, and we encourage you to use at least some level of security as a deterrent to intrusion. Thanks to; http://www.forcefieldwireless.com Mike ~ It is a good day if I learned something new. Editor MikesWhatsNews see ~ http://www.mwn.ca A Technical Support Alliance & OWTA Charter Member -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Was this forwarded to you? Want to subscribe? Send an email to chadfree-request@xxxxxxxxxxxxx?Subject=subscribe. For a complete list of email commands for our list send an email to ecartis@xxxxxxxxxxxxx with a subject line of "info chadfree" without the quotes. If you wish to unsubscribe from our list send an email to; chadfree-request@xxxxxxxxxxxxx?Subject=unsubscribe To contact the list moderators send an email to chadfree-moderators@xxxxxxxxxxxxx -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-