Danh mục tài liệu

Networking with Microsoft Windows Vista- P8

Số trang: 50      Loại file: pdf      Dung lượng: 2.56 MB      Lượt xem: 17      Lượt tải: 0    
Xem trước 5 trang đầu tiên của tài liệu này:

Thông tin tài liệu:

Networking with Microsoft Windows Vista- P8: A better solution is to increase the number of computers available. Now thatmachines with fast processors, ample RAM, and massive hard disk space canbe had for just a few hundred dollars, a multiple-machine setup is an affordableproposition for most homes.
Nội dung trích xuất từ tài liệu:
Networking with Microsoft Windows Vista- P8 This page intentionally left blankPlease purchase PDF Split-Merge on www.verypdf.com to remove this watermark. C H A P T E R 15 Implementing Wireless Security C omputer veterans may be familiar with the term war- ■ IN THIS CHAPTER Specifying a New dialing, a black-hat hacker technique that involves auto- Administrative Password matically calling thousands of telephone numbers to ■ Positioning the Access Point for look for any that have a modem attached. (You might also Maximum Security know this term from the 1983 movie War Games, now a classic ■ Encrypting Wireless Signals in computer cracking circles. In the movie a young cracker, Matthew Broderick, uses wardialing to look for games and bul- with WPA letin board systems. However, he inadvertently ends up with a ■ Disabling Network SSID direct connection to a high-level military computer that gives Broadcasting him control over the U.S. nuclear arsenal. Various things hit the ■ Changing the Default SSID fan after that.) Modems are becoming increasingly rare these ■ Enabling MAC Address Filtering days, so wardialing is less of a threat than it used to be. ■ From Here That doesn’t mean we’re any safer, however. Our houses and offices may no longer have modems, but many of them have a relatively recent bit of technology: a wireless network. So now wardialing has given way to wardriving, where a cracker drives through various neighborhoods with a portable computer or another device set up to look for available wireless networks. If the miscreant finds a nonsecured network, he uses it for free Internet access (such a person is called a piggybacker) or to cause mischief with shared network resources. The hacker may then do a little warchalking, using chalk to place a special sym- bol on the sidewalk or other surface that indicates there’s a nonsecure wireless network nearby.Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark. 336 Networking with Microsoft® Windows Vista™ Crackers engage in all these nefarious deeds for a simple reason: Wireless net- works are less secure than wired ones. tip The most effective tech- nique for securing your 15 wireless access point (AP) is also That’s because the wireless connection that the simplest: Turn it off if you enables you to access the network from the won’t be using it for an extended kitchen or the conference room can also period. If you’re going out of enable an intruder from outside your town for a few days, or if you’re going on vacation for a week or home or office to access the network. two, shut down the access point Fortunately, you can secure your wireless and you’re guaranteed that no network against these threats with a few wardriver will infiltrate your net- simple tweak ...