HOW TO SETUP AND CONFIGURE WIRELESS NETWORK IN SECURE MANNER

Evette

Evette

Passionate Information Technology Customer Support Specialist Student at Milwaukee Area Technical College
Motivated and determined Information Technology Customer Support student with an anticipated graduation date of Spring 2018.
Evette
Wireless networks are setup based on the administrator or end user’s goals, which includes:  speed, range, and security.  Deploying secure wireless networking is an ongoing practice.  Employing encryption to protect wireless network is one of the best manner to protect your wireless network from attacks and interceptions.  Encryption is the process of preventing unauthorize access by changing information or data into a code.  Wireless network users have an option of choosing between three common forms of secure encryption.  These options are: WEP, WPA. And WPA2.  Details regarding these protocols can be accessed through Wireless Encryption Basics.  Passwords are simply one level of security.  Encryption and selecting the right wireless broadband router are also essential when setting up your wireless network.  Another facet of setup of routers that should be considered is location.  Placement of the wireless router near a window means that your wireless signal range reach too far outside the house where it can be easily interception by cybercriminals.  Place your router in the middle of you house so all rooms have the same internet access.  When you leave on vacation, make sure to disable your wireless network, prevent an opportunity for malicious hackers to attempt to gain unauthorized access to your network. Here are great points about securing your wireless network: New technology on routers has wi-fi protected setup which has a WPS button to lock the device during setup. As with any software, check the manufacturer’s website for updates to your firmware. Disable SSID in your wireless setting which will prevent your device showing up is a list of nearby network. Each device on the network...

How to remember only one password and maintain high levels of security with LastPass?

Evette

Evette

Passionate Information Technology Customer Support Specialist Student at Milwaukee Area Technical College
Motivated and determined Information Technology Customer Support student with an anticipated graduation date of Spring 2018.
Evette
A long time ago, computer hackers were considered geeks who sat in their basement or garages and became expert programmers… that is the movie’s version.  In real life, hackers have no single descriptive factor.  Today’s hackers are defined as a person or persons who gain unauthorized access to users’ information for the intent of personal gains or malicious activities… it could be a friend next door, a family member in your home, or a complete stranger thousand miles away in a foreign country.  Years ago, hacking required hours of sitting in front of a computer trying various methods to gain unauthorized access through different levels of security on a computer system or network.  Now, is it as simple as running a program or utilizing a hacker tools which exploit weak points and vulnerabilities and penetrate private information.  Sometimes, hackers take only a passive role and observe network activity, while others take on a more active role and simulate attacks and use confidential information for malicious gains.  Whatever the case, it is an invasion of privacy and breach of security … we are now in the new era of cybersecurity.  With all the worms, viruses, malware, spyware, how can users maintain and secure password credentials and personal information? If you are like me, all passwords are conveniently “remembered” on your personal laptop or computer.  But, if you need to logon to a site using a different computer away from home, you either:  a) reset your password after successfully advancing through a two-factor authentication (for example:  email address associated with account or “what was the name of your first pet?”) or b)...

What are the differences between Adware, Virus, Worms, Spyware, Trojan, Rootkits, Backdoors, Logic bomb and Botnets

There are many different issues that can affect your computer and network. Some of the things that can cause harm to your computer might be done on purpose. These threats are known as malware. There are different forms of malware that can harm your computer; Adware, Virus, Worms, Spyware, Trojan, Rootkits, Backdoors, Logic bomb and Botnets. Adware is any software package that automatically renders advertisements in order to generate revenue for its author. The advertisements may be in the user interface of the software or on a screen presented to the user during the installation process. The functions may be designed to analyze which Internet sites the user visits and to present advertising pertinent to the types of goods or services featured there. Worm is a standalone malware computer system that replicates itself in order to spread to other computers.Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer. Spyware is software that aims to gather information about a person or organization without their knowledge, that may send such information to another entity without the consumer’s consent, or that asserts control over a device without the consumer’s knowledge. Trojan is a malicious computer software which is used to hack into a computer by misleading users of its true intent. The term is derived from the Ancient Greece story of the wooden horse that was used to help Greek troops invade the city of Troy by stealth. Rootkit...

What are the differences between Adware Virus, Worms, Spyware, Trojan, Rootkits, Backdoors, Logic bomb, Botnets

Security breaches is a big problem that concerns every company. Many businesses are still unprepared or not protected at all from a variety of security  threat. There are many causes and many type  of security threat. These threats are referred to as malicious software program also known as “Malware”.  Some of them are not even known by the average computer users. Below are the most known malware that can harm our computers, each one will be define along with their characteristics. Adware: They are designed to display advertisements on your computer, redirect your search request to advertising websites and collect marketing-type data about you- in instance- the types of websites that you visit-so that customized adverts can be displayed. There is no signs of the program in your computer’s system making its presence unknown and challenging to detect. Visiting an infected website can result in unauthorized installation of adware on your computer. Virus: Is design to spread from host to host. It has the ability to replicate itself. A computer virus is a type of malicious program written to alter the way a computer operates. It is also designed to spread from one computer to another. A virus operates by inserting itself to a legitimate program in order to execute its code. Worms: A computer worm is a self-b replicating computer program that penetrates an operating system with the intend of spreading malicious codes.  Worms utilizes networks to send copies of the original code to others computers. Worms cause harm by consuming bandwidth or sometimes deleting files or sending document via e-mail. Worms can also install backdoor on computers. Worms are often...
What are the advantages of wiring workplace vs wireless?

What are the advantages of wiring workplace vs wireless?

In computing technology, the term “wired” is used to differentiate between wireless connections and those that involve cable. A wired setup uses physical cables to transfer data between connected PCs. In a small wired network, a single router may be used to connect all the computers. Larger networks often involve multiple routers or switches that connect to each other. On of these devices typically connects to a cable modem such as T1 line or other type of Internet connection that provides Internet access to all devices connected to the network. Nowadays, most of big enterprises choose wire connection over the wireless. There are many reasons why these corporations decide to implement a wire internet. Below we will be studying some of the main advantages of the wire connection. Cost: Since companies are always trying to save money and generate more revenue, cost is one of the main reasons wire connection is an option. Cables, switches are not expensive. Wire connection is cheaper than the wireless. In another hand, Ethernet consume less power . Using Ethernet improve laptops battery life.  Reliability: Wire connection is known to be very reliable. Therefore, reliability is one of the reason why some companies choose to implement the wire Internet. Ethernet, cables, switches are reliable because manufacturers have improved their technology over several decades. Speed and Bandwidth is very high with the wire connection.  We are talking about up to 100 Mbps. Nowadays most IT professionals choose fiber optic cables for less attenuation and electromagnetic interference (EMI) Security: Wire connection is very handy if you have sensitive data that you want to secure using some software...