Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

How to protect yourself at wireless hot spots
Computer World ^ | January 5, 2007 | Preston Gralla

Posted on 01/26/2007 10:50:34 PM PST by CedarDave

Connecting to a hot spot can be an open invitation to danger. Hot spots are public, open networks that practically invite hacking and snooping. They use unencrypted, insecure connections, but most people treat them as if they are secure private networks.

This could allow anyone nearby to capture your packets and snoop on everything you do when online, including stealing passwords and private information. In addition, it could also allow an intruder to break into your PC without your knowledge.

But there's plenty you can do to keep yourself safe. If you follow these tips, you'll be able to make secure connections at any hot spot.

Disable ad hoc mode

Little-known fact: You don't need a hot spot or wireless router in order to create or connect to a wireless network. You can also create one using ad hoc mode, in which you directly connect wirelessly to another nearby PC. If your PC is set to run in ad hoc mode, someone nearby could establish an ad hoc connection to your PC without you knowing about it. They could then possibly wreak havoc on your system and steal files and personal information.

The fix is simple: Turn off ad hoc mode. Normally it's not enabled, but it's possible that it's turned on without your knowledge. To turn it off in Windows XP ...

Turn off file sharing ...

Turn off network discovery ...

Encrypt your e-mail ...

Carry an encrypted USB flash drive ...

Protect yourself with a virtual private network ...

Disable your wireless adapter ...

Watch out for shoulder surfers ...

Beware phony hot spots ...

Turn on your firewall ...

(Excerpt) Read more at computerworld.com ...


TOPICS: Computers/Internet
KEYWORDS: internet; wifi; wireless
A detailed "how-to" article with figures. Download the entire story for specifics.
1 posted on 01/26/2007 10:50:37 PM PST by CedarDave
[ Post Reply | Private Reply | View Replies]

To: ShadowAce

Shadowace PING!


2 posted on 01/26/2007 10:53:32 PM PST by CedarDave
[ Post Reply | Private Reply | To 1 | View Replies]

To: CedarDave

Ping for later.


3 posted on 01/26/2007 11:00:24 PM PST by ConservativeMind
[ Post Reply | Private Reply | To 1 | View Replies]

bookmark


4 posted on 01/26/2007 11:50:03 PM PST by jer33 3
[ Post Reply | Private Reply | To 1 | View Replies]

To: CedarDave

bttt


5 posted on 01/26/2007 11:55:50 PM PST by Smokin' Joe (How often God must weep at humans' folly.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Letaka

I told you this. Print this out or dl it. Read it and be careful.


6 posted on 01/27/2007 4:40:21 AM PST by Shimmer128
[ Post Reply | Private Reply | To 1 | View Replies]

To: rdb3; chance33_98; Calvinist_Dark_Lord; Bush2000; PenguinWry; GodGunsandGuts; CyberCowboy777; ...

7 posted on 01/27/2007 7:32:02 AM PST by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson