eBusiness Help
Web Customer Support
Complete solution automates email, FAQs, ticket tracking and more
Fanatical Support and Instant Emergency Response on our Zero-Downtime Network
Get more info on our managed hosting solutions on Linux or Microsoft operating systems

WebProWorld Networking Forum
Cant open pages with certin links
As of Friday I have not been able to open pages with affiliate links particularly Clickbank and eMarketmakers.

Recent Articles
Cisco CCNA Exam Tracks
With the latest version of the CCNA exam, Cisco offers two possible exam track options of either one or two exams.

Debug and Show commands for ISDN
The major reason I recommend getting your hands on real Cisco equipment rather than a simulator is that real Cisco routers give you the chance to practice and learn show and debug commands.
02.28.05

Securing Your Wireless Home Network

By Rick Rouse

Do you have a wireless network installed in your home? Chances are that you do. If so, did you know that hackers might be using your Internet connection without your knowledge or consent?

It's called "Drive-By Clicking" and it is becoming more and more popular all the time. Here is how it works:

A hacker drives through a residential neighborhood with a laptop computer equipped with a wireless network adapter. If a wireless router isn't configured for secure communications the hacker's laptop can detect the signal, stop his car, and access the Internet using the unsuspecting homeowner's Internet connection.

He can send spam emails (potentially getting the homeowner in trouble) and even access sensitive information on the host's computer. Scary stuff, huh?

If you have a wireless router you can protect yourself with these tips:

Request Free R-1 Evaluation Kit
for Application and Content Distribution

1. Place your wireless router in a location that is as far away from the street or the closest neighbor's house as possible.

2. Change your router's password from the factory default (which most "competent" hackers are familiar with) to a new one.

3. If you have file sharing enabled on your PC be surer to activate password protection.

4. Enable encryption (WEP) in your router's configuration settings.

5. Be alert for clues that someone else is using your Internet Connection or home network. These include excessive Internet traffic through your cable or DSL modem (the data lights will flash more than usual) and a sluggish PC with lots of unsual hard drive activity.

Taking the time to secure your wireless network from cyber-intruders could save you lots of headaches and losses (monetary and otherwise) in the future.


About the Author:
Rick Rouse is the owner of RLROUSE Directory & Informational Resources, one of the fastest growing Directories on the web. Visit http://www.rlrouse.com and submit your URL!

About NetworkNewz
NetworkNewz editors, writers and contributors focus on both the big picture and the details of networking. At NetworkNewz our goal is to deliver to you The Key To Network Management.

NetworkNewz is brought to you by:

SecurityConfig.com NetworkingFiles.com
ITmanagementNews.com WebProASP.com
DatabaseProNews.com SQLProNews.com
ITcertificationNews.com SysAdminNews.com
LinuxProNews.com WirelessProNews.com
CProgrammingTrends.com ITmanagementNews.com

-- NetworkNewz is an iEntry, Inc. publication --
iEntry, Inc. 880 Corporate Drive, Lexington, KY 40503
2005 iEntry, Inc.  All Rights Reserved  Privacy Policy  Legal

archives | advertising info | news headlines | free newsletters | comments/feedback | submit article

The Keys To Network Management Ask Questions in the Networking Forum NetworkNewz News Archives About Us Feedback NetworkNewz Home Page About Article Archive News Downloads WebProWorld Forums Jayde iEntry Advertise Contact