secure

How to secure your wireless network?

<p><span style="font-family: &quot;Cambria&quot;,&quot;serif&quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;"><span style="font-size: small;"><span style="color: #000000;">Wireless networking has become very popular in the last couple of years. The necessary hardware is widely availabe and relatively easy to install and configure. With wireless network users can connect to Internet from every part of the house without any cable necessary which makes thier life much easier. This technology brings meny benefits but it has to be properly secured to prevent many serious risks and dangers if left wide open.</span></span></span></p><p><span style="font-family: &quot;Cambria&quot;,&quot;serif&quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;"><span style="font-size: small;"><span style="color: #000000;">In best case, intruder only uses the victim's broadband connection to surf the web and download content. It can slow down Internet or network access for the victim and couse additional cost it the ISP meters used bandwith and charges for actual usage.</span></span></span></p><p><span style="font-family: &quot;Cambria&quot;,&quot;serif&quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;"><span style="font-size: small;"><span style="color: #000000;">An unauthorized user could abuse the connection for hacking, launching DoS attack or distributing illegal material.</span></span></span></p><p><span style="font-family: &quot;Cambria&quot;,&quot;serif&quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;"><span style="font-size: small;"><span style="color: #000000;">Through wireless network, intruder can access victim's private network. He can access confidential data such as financial data, tax records, development information&hellip; By employing a sniffer an intruder can even sniff email of FTP user names and passwords and use information to gain unauthorized access to email accounts or web services without the victim's knowledge. </span></span></span></p><p><span style="font-family: &quot;Cambria&quot;,&quot;serif&quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;"><span style="font-size: small;"><span style="color: #000000;">What is also important, one does not have to be a programmer or network specialist to discover and gain unauthorized access to wireless network. <span style="mso-spacerun: yes;">&nbsp;</span></span></span></span></p><p><span style="font-family: &quot;Cambria&quot;,&quot;serif&quot;; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;"><span style="font-size: small;"><span style="color: #000000;">Considering all of the possible attacks, it's clearly that every wireless network has to be secured in order to avoid problems. </span></span></span></p>

Securing an iPhone / iPod touch with installed SSH Server

<p>&nbsp;</p><p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica;">Many iPhone owners have installed an application for the iPhone that provides SSH - Secure Shell - server functionality. This implies the accessability from external hardware such as PCs or Macs. However, this access is not suffieciently secured as it does use standard credentials.</p> <p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica; min-height: 14.0px;">&nbsp;</p> <p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica;">Many incident have already ocurred in which an unauthorized access has happened. This can cost a lot of money by losing important data, abuse of sensitive credentials or system destruction. However, the usage of SSH is very comfortable for loading files to an external machine.</p><p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica;">The most recent incident was a Worm that requested some money from the iPhone users to secure the iPhone.&nbsp;</p><p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica;">&nbsp;</p><p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica;">The solution should be usable on Max OS X, Windows and Linux, because I am using all three systems. It is does not matter, if the solution is usable using some tools or the command-line.&nbsp;</p><p>&nbsp;</p>

Cheap Yet Secure Daily Backups For Database And Files

I need to make backups of a webapplication's MySQL database and some files for a client. Backups should be done on a daily basis and the whole system should be as cheap as possible - "ok, backups are important, but I don't want to spend any money on it anyway...". The backup should be fully automated. Furthermore installing an FTP server on one of the client's local machines (to upload the backups there) is not wanted, due to security concerns. Generally nothing of the existing setup should be changed, if possible. Finally security is a major concern - the backups' content is sensitive so making the data publicly available is nearly as bad as losing it.
Subscribe to secure