Showing posts with label Network. Show all posts
Showing posts with label Network. Show all posts

Securing Your Wireless Network Signal

With recent news reports of offenders being caught obtaining free Internet access by piggybacking someone else’s unsecured wireless broadband connection, it’s clear consumers need to take action now to secure their WiFi signal.

Michael Phillips, BroadbandChoices.co.uk product director, explains, “A home wireless network can be incredibly useful and convenient but in a world where we all have to be on the lookout against identity theft, viruses and online fraud, it’s vital that you secure your WiFi signal.”

Philips continues, “Dishonestly obtaining free Internet access is an offence under the Communications Act 2003 and a potential breach of the Computer Misuse Act. Unfortunately this still doesn’t deter some from piggybacking on someone else’s wireless broadband connection.”

BroadbandChoices.co.uk five top tips for securing your wireless network:

1. Am I secured?
If you haven’t set up security passwords yourself then it’s not likely that you will be secured. To find out, simply go to ‘My Network Places’ on your PC and scan for your wireless network. In the list that appears, there should be a picture of a padlock next to the name of your network. If there is no padlock, then you need some security.

2. Use WPA
Most new routers now offer WiFi Protected Access (WPA) passwords as well as Wired Equivalent Privacy (WEP). WPA offers increased security, and if your computer and other hardware is compatible, you should always use WPA as it is far harder to hack into than previous encryption methods.

3. Added security
You should also always have comprehensive anti-virus software such as Norton or McAfee installed on your computer to protect you from viruses that can open your PC up to hackers. Make sure that these are always kept up to date by regularly checking for updates on the provider’s website. You should also use a firewall - many routers have one built-in but you should run one on your PC too.

4. Isolate your wireless signal
Wireless isolation works to make your signal invisible to anyone searching for WiFi in your area. It is built-in to some routers but must be physically enabled by the user - so check your router’s manual for instructions on how to do this.

5. Use an access list
If you’re still worried, you can create an access list. All computers have their own Media Access Control (MAC) address - a way of identifying each individual computer - and you can tell your router which MAC addresses it can allow access to; blocking all others. This means that anyone wanting to use your wireless signal would not only have to have your password but would have to be on the access list too.

Sphere: Related Content

Managing Server In A Distributed Data Centre (2)

Flexible, Scalable and Cost Effective.
The dynamic nature of the distributed data centre and cost constraints demands any remote server management solution to provide flexibility and scalability as part of the solution, without requiring the purchase of additional elements. A distributed solution should provide:

• No special software licenses to buy or maintain (client software, remote users, etc.)
• No special cabling limitations (supports CAT5 cabling)
• No special hardware or dongles to purchase and install
• Incremental ‘add-as-you-grow’ capability with no sudden cost increase to scale and add additional servers or remote administrators
• No conflict with existing server management solutions (no ‘rip-and-replace’)
• Ability to enhance existing server management solutions (local KVM)
• Ability to integrate into larger remote (OOBI10) management architecture 10 Out Of Band Infrastructure

Fault Tolerant and Secure.
Distributed remote assets must be fault-tolerant and secure by providing the following benefits:

• Allows management access when server, OS, or network stack is compromised
• No single point of failure (e.g. unit failure doesn’t effect other systems)
• Designed for high MTBF (Mean Time before Failure) (e.g. no moving parts, cooling fans, power supplies)
• No special security software or infrastructure to purchase, install and maintain
• Uses existing IT security services (RADIUS, LDAP, Active Directory)
• Optional out-of-band access in case of network failure (e.g. serial modem access)

Sphere: Related Content

Managing Server In A Distributed Data Centre (1)

In the distributed data centre, there are many elements to consider when developing an overall server IP-based KVM management strategy. Guaranteed Anytime Anywhere Access.

A server management solution should support guaranteed access (anytime, anywhere) to servers regardless of how many users are logged in. Criteria to look for include:

• Secure administrator access to servers over an IP network - from LAN or the Internet
• Non-blocked access to servers (e.g. no conflict for remote access)
• BIOS level access to servers
• No limitations on locations of servers (across the room, across the globe)

Simple and Non-Invasive.
Any server management strategy should reduce complexity and lower the overall IT workload. Deployment, installation and usage of a server management solution should minimize or eliminate impact on the server, its operating systems, services and applications. The solution should offer:

• Simple and quick installation
• No special hardware (management cards, etc.) to install in server
• No special software (drivers, application software) to install and maintain on server
• Operating system and application independent
• Simplified remote maintenance (e.g. Virtual Media support)
• No special software to install and maintain on clients
• Small size (form factor)
• Minimal power consumption and heat generation
• Flexible cabling (utilize CAT5 cabling)
• No special training required to install or operate

Sphere: Related Content