Showing posts with label Guide. Show all posts
Showing posts with label Guide. Show all posts

Wireless Router & Security - A Step-by-Step Guide


Setting up a wireless router is easy. Essentially you turn your cable or DSL modem off and your wireless router on. Then, you connect the router to the modem with a cable, and turn the modem back on. You are more or less done. The wireless network wizard on your computer will pick up the router and, if your ISP does not have any special requirements, away-you-go, you are on the Internet.

For ease of setup and configuration, manufacturers ship wireless routers with all security disabled. Therein lies the problem. If you do not take any further steps to secure your router, and a surprising number of people don't, your network will be wide open to all passersby and strangers. It's like you've hung out a sign, "The door is open. Please come in and help yourself."

The problem is not that strangers will be able to use your router to access the Internet but that, without further protection, would-be intruders will be able monitor and sniff out information you send and receive on your network. Malicious intruders can even hop on to your internal network; access your hard drives; and, steal, edit, or delete files on your computer.

The good news is that it is relatively easy to secure your wireless router. Here are three basic steps you should take.

1. Password protect the access to your router's internal configuration

To access your router's internal setup, open a browser and enter the routers setup URL. The URL will be specified in the manual. The URLs for D-Link and Linksys routers, two major manufacturers of wireless routers, are [http://192.168.0.1] and [http://192.168.1.1], respectively.

For Linksys routers, leave the user name blank and type "admin" (without the quotes) in the password field and press enter. To change the password, simply click on the Password tab and enter your new password.

For other routers, please consult your manual. Alternately, you can search on the Internet with the term "default login for ". Don't be surprised to find quite a number of pages listing default login parameters for many different routers, even uncommon ones.2. Change the default SSID (Service Set IDentifier)

The SSID is the name of a WLAN (Wireless Local Area Network). All wireless devices on a WLAN use SSIDs to communicate with each other.

Routers ship with standard default SSIDs. For example, the default SSID for Linksys routers is, not unsurprisingly, "Linksys". As you can see, if you don't change the default SSID of your router a would-be intruder armed with a few common SSIDs from major manufacturers will be able to find your wireless network quite easily.

To change the SSID, click on the Wireless tab. Look for an input item labeled SSID. It will be near the top. Enter a new name for network. Don't use something like "My Network". Use a name that is be hard to guess.

3. Disable SSID broadcast

Wireless enabled computers use network discovery software to automatically search for nearby SSIDs. Some of the more advanced software will query the SSIDs of nearby networks and even display their names. Therefore, changing the network name only helps partially to secure your network. To prevent your network name from being discovered, you must disable SSID broadcast.

In the same screen that you changed the name of your network, you will see options for SSID broadcast. Choose "Disable SSID" to make your network invisible. Now save all your settings and log out.

Since your wireless network is now invisible, you will have to configure your computers to connect to your wireless network using the new name. On Windows XP, start by clicking on the wireless icon in the Notification Area and proceed from there.

With these three steps, your network now has basic security. However, if you keep sensitive information on your computers, you may want to secure your wireless network even further. For example, you can


Change the channel your router uses to transmit and receive data on a regularly basis.
Restrict devices that can connect to the router by filtering out MAC (Media Access Control) addresses.
Use encryption such as WEP and WPA.

As with most things in life, security is a trade off between cost (time, money, inconvenience) and benefit (ease of use). It is a personal decision you make. However for the majority of home uses, the three basic steps plus WEP/WPA encryption provides reasonably strong security.

Turning on encryption is a two-step process. First you configure your router to use encryption using an encryption key of your choice. And then, you configure your computer to use the encryption key. The actual process of configuring your router for encryption varies from router to router. Please consult the router's manual.

There are even stronger methods for ensuring security. A strong and robust security method is RADIUS (Remote Authentication Dial In User Service). Using RADIUS requires additional hardware and software. However, there are companies that offer RADIUS security as a subscription based service. The fees are reasonable and dropping.

Therefore for example, if you run a business on your wireless network, have sensitive data on your computers such as credit card information, and have a number of users who access your network, you should consider using RADIUS. Since the service sector for RADIUS is dynamic and growing, a search on the Internet with terms like "RADIUS subscription" or "RADIUS service" is probably the best way to locate one.




Brian Medini in association with http://computer-internet.marc8.com Fast reliable wireless router




A Guide to Understanding and Implementing Microsoft Windows Security


Today, Information Security is the most important thing to be taken care of while using the Internet.

Internet, Being a source of knowledge, learning and entertainment, it is also something that can be misused for malicious and destructive intent.

So what do I mean by "Securing Windows"?

Windows being the most widely used operating system, Its users are vulnerable to data theft, Identity theft and cracking. By taking some precautions and a few good practices, you can secure your Windows computer, easily and effectively.

Security is a big field altogether in the world of computers, there are huge corporations that only specialize in security. This article is for the type of security you can use for your home computer and not it is not for huge corporate setups, since they have a much larger perspective.

To begin with, let me summarize the points that I am going to cover in this article

Understanding Windows processes that run in the background.
Antivirus software, and sources of viruses
Firewall
Security tips and tricks

Understanding Windows Processes

Every software, application we install in our computer runs as a "process", it is a way that the computer can keep track of running software, close it, or even modify it in some cases.

So where can you see them?

You can see the processes by following these steps -

Right-click the taskbar down below, select "Task Manager"
Select the "Processes" tab

Or - You can also open Task Manager by pressing (CTRL+SHIFT+ESC)

Once you get there, you can see all the processes that are currently running on your computer. This gives you a detailed overview of what exactly is going on in your computer. You can see what process is running, and how much of your system memory are they using.

Here is a list of common Windows system processes that can be found there,

Ctfmon.exe

This is involved with the language/alternative input services in MS-Office. Ctfmon.exe will continue to put itself back into the system startup when you run the MS-Office apps as long as the Text Services and Speech applets in the Control Panel are enabled.

Explorer.exe

This is the Windows Shell - the desktop, taskbar, icons almost everything that you see in windows is controlled by this process

Svchost.exe

Svchost.exe (Generic Host Process for Win32 Services) is an integral part of Windows OS. It cannot be stopped or restarted manually. This process manages system services that run from dynamic link libraries (files with extension.dll). Examples for such system services are: "Automatic Updates", "Windows Firewall", "Plug and Play", "Fax Service", "Windows Themes" and many more.

Winlogon.exe

This controls the authentication of Windows users. It is one of the most important system processes.

Rundll32.exe

This program is part of Windows, and is used to run program code in DLL files as if they were within the actual program. DLL files are a part of the Windows programming.

Csrss.exe

This is the user-mode portion of the Win32 subsystem; Win32.sys is the kernel-mode portion. Csrss stands for Client/Server Run-Time Subsystem, and is an essential subsystem that must be running at all times.

When looking at the processes, you can also see the memory they are consuming, using the task manager process list, you can also close a non-responsive program.

From the security aspect, any Virus, Spyware will show up in this list, so this is a very important tool that you can use when you feel you have a virus or a spyware installed on your computer.

Sometimes you can directly say whether a process is running a virus or not, when you click on it, it will just 'slip' out of your mouse pointer and will change its position, these are the advanced viruses designed to evade from being manually removed.

Antivirus Software

Antivirus software is one of the first and foremost thing that you must install after getting a new system, or after you have re-installed your operating system.

Choosing the right anti-virus software is very important; it is very much dependent how fast your computer is. An Antivirus constantly scans your system's active processes and is vigilant, so as to prevent any threats. With thousands of viruses releasing every day, here are some things to note -

Prevention is better than cure, right?

Antivirus software priority - it should be the first thing you must install after getting a computer.

Never opt for 'Trial version', either purchase a full version, or use the free version with lesser features. The problem with trial version is, that once it is expired, it will stop protecting your system and trouble you with constant security alerts, which means, your computer is at risk while you are battling with security alerts.

Always keep your antivirus software updated, most of the antivirus softwares update automatically. However for some reason if they are not able to, update manually.

So why does it needs to be updated?

Companies that make these softwares release new virus Signatures or 'patterns' every week and in some cases even daily. The antivirus on your computer must learn about those new threats, so it downloads the new patterns from the server, while ensuring that you are protected from the latest viruses.

Virus Sources

There is no prime source of viruses, they can come up from just anywhere. However, here are some things you should be aware of -

EXE Files- Exe files are executable files that windows uses to execute or start any program, application or even a software.

Exe can contain viruses, even spyware designed to track your system, Always scan a file before opening it

Websites - Never accept a link from anyone whom you don't know. There are websites on the internet specially designed to compromise your computer, they may be in a form of internet chat, a forum, a game, or even music.

USB Flash Drives- we all share data, and use USB flash drives to carry our data with us. If you use your disk on an infected system, your disk will catch that virus, and will begin infecting every computer you insert it in. Always scan a USB flash drive before opening it.

Firewall

So what is a firewall?

In simple terms, It is an application that is designed to control and analyze the network traffic coming in and out of your computer.

It is like your pet dog that only allows certain people into your house, while preventing unauthorized people or intruders, at the same time alerting you at various occasions.

So why is a firewall important?

Everything that is in your computer needs to be protected. Your personal documents, photos, financial information, even your passwords. When your computer is connected to the internet, your data is susceptible to theft. Major corporations spend millions of dollars just on firewalls. According to a recent news report, Sony's Play Station was hacked, and a lot of data was leaked. This cost the company millions of dollars.

Taking little bit of care about your computer security and escalating it, can be very beneficial.

Does Windows have an in-built firewall?

For starters, newer versions of windows like the windows 7, has an amazing inbuilt firewall, also known as the windows firewall, It allows granular control over your systems' networking, even defining rules for applications that are installed in your computer.

Windows firewall also has different profiles like 'home network' and 'public network'. This allows easy one click configuration, wherein you change the settings depending on the location you are using.

When you're connected to a public network like a library or a coffee shops' wireless network, you may want to block all incoming connections and can select the public network profile.

At home or work, where you may be sharing files over the network, you can easily switch to the home network profile.

You can access windows firewall by - clicking the Start button clicking Control Panel, clicking Security, and then clicking Windows Firewall.

Make sure that your firewall is set to 'ON'

For advanced users, you can even install a free third-party firewall like "Comodo Firewall". It is one of the most advanced, and free firewalls that I have encountered and the one I personally use. This is however not recommended for basic users, since its configuration requires a very good understanding of the windows operating systems and its architecture, and about TCP/IP.

Security tips and tricks

Be cautious with your computer Administrator passwords, never store them anywhere, always memorize them, they are the key to your system. Someone who is trying to gain remote access to your system won't get through if he cannot guess your password. Try to include a combination of special characters, numbers and letters for your password.

Download softwares only from reputed websites, these include Cnet.com, FileHippo.com, Soft32.com.

These websites never host malicious softwares, and always scan them with an antivirus before hosting them.

Always scan your USB flash drives with your antivirus before opening it.Simply Right-click your disk in My computer, and select 'Scan with' - your antivirus

Run a full system scan every month. This will help removing any viruses that have crawled in.

Never turn off your anti-virus software or your firewall. Many a times people suggest turning them off.

If possible, get a security expert to analyze your computer once a month. A security expert will check your computer in great detail and will suggest you to remove any programs that may compromise your computer.

Windows update - Always use windows update and set it to automatic. Windows updates are critical system patches that escalate your system security or patch any vulnerability that was otherwise found by Microsoft security experts. Many people don't realize the significance of Windows Update,until they are infected.

User account control - User account control is a security feature in windows that should always be 'ON', it prevents the execution of malicious code.

Web Browser - Always update to a newer version of a web browser, they are better, faster and more secure. Because everything today is web-based, security of your web browser is the most important thing.

User Accounts - Always keep the guest account disabled, and create a new administrator account for yourself. Never use the default administrator account.

These are the basic steps that you can use to secure your Windows computer.




Geek-Assist.com is a leading provider of 24/7 online computer support services. Geek Assist also provides security consultation,to help users secure their computer against hackers, viruses, malware, and firewall configuration. Geek-Assist is currently solving hundreds of issues everyday while being one of the most affordable online computer support solutions. Call 888-408-5784 (toll free) Now, to get instant help. To visit geek assist online, click Here




Guide to Securing Your Business Computer Network


Today, securing your business' computer network is not an option as much as it is a necessity. This is an important process that needs to be handled with care and the proper planning and financial budgeting.

Many small businesses in particular lack the funds to employ a dedicated IT staff and buy the equipment needed to lock down the business computer network. However, security is crucial, and data breaches could end the business; there are threats that come from a number of sources like website breaches, downloads of illegal material and through wireless networks. These threats are a bit difficult to address given the limited resources available, but this guide should help you get a fair idea of what to do to secure your business computer network.

A major reason for security breaches are wireless networks. Wireless internet requires a broadband connection that is connected to a wireless router, which in turn broadcasts a signal into the air. Once this is done, any computer within the range can gain access to your network, which means that any hacker nearby has access to the information on the network or computer. This could be a major cause for concern unless your wireless network has been secured. A password is often not enough to ensure that your wireless network is secure, and steps must be taken to make your wireless business network completely secure. These measures include reducing the transmitting power of your router, keeping your SSID private and securing your router and your access point administration interface.

Before you begin to lock down on your business computer system, you will need to come up with an effective plan by which to build security in your business network. The first step is to come up with a checklist of items that you will need to take care of when you begin to secure your network. There are nine major checkpoints that you will have to make note of and constantly monitor when you are trying to secure your computer network. These include managing the core network and file server security, making backups, protecting remote laptops, securing internet connections and the web server, getting a VPN, wireless security, secure browsing, IM and email security and endpoint protection.
In order to begin a security routine, businesses should take further precautions that include limiting access to the office or building, and instituting a certain code of conduct with regards to passwords and virus protection.

Businesses can also use the security features that are in software applications and routers and implement a security policy to be followed by everyone in the company.




Ian works in the IT Industry and talks about ways to employ your own in-house IT team Computer Support Chippenham and Computer Support Bristol.




Internet Security - A Beginners Guide


The quest for convenience is a two edged sword. In our quest for speed, efficiency and walking as little as possible, we strive to make life as simple as possible. It was not so log ago that business was done face to face; meetings and paper letters were how we communicated. When we shopped we walked or drove to a store, loaded a trolley or basket and checked out.

Now, we can sit in the comfort of our own home and have face to face meetings through video conferencing, send a letter in less than a second and most importantly, shift our hard earned cash from one bank to another.

But there is a price some pay and it goes beyond the fees and any appropriate software. The more convenient we make life, the more potential avenues for theft and fraud we create.

Internet security is of paramount importance. When you live in a city, you lock your house door, lock the car, engage the alarm and leave lights on when you go out.

We speak of a ?global village?, but I think this gives a false impression. Life on the internet is not a village ? it?s a global city ? and city mentality is needed.

So how can you lock up and alarm your virtual doors?

ANITVIRUS

For some reason, there are some people out there who get kicks out of writing little programs that cause computers problems. These range from annoying little bugs to complete computer breakdown. It can either be irritating or catastrophic leading to a loss of all data.

The solution ? anti-virus (a virus killer). There are many programs that can spot a virus when it comes via a website or email ? and kill it outright ? is like cyber-bleach. These programs stay in the background, get updated with the latest threats and jump into action when needed.

SPYWARE

Although spy ware doesn?t usually cause computer meltdown, it can actually be more damaging. Spy ware are other little programs that run in the background of your computer ? the monitor you online activity and report back to the sender. The threat? If you're banking online or dealing with sensitive data, it could be under threat.

Like anti-virus software ? there is a host of good spy ware checkers and removers.

It pays to get protected before you need it ? there is no use locking the stable door after the horse has bolted. You can see the cyber locksmith at [http://online-security-solutions.com].

� 2006 Copyright Steve Holloway. You may republish this article as long as it remains unchanged and the resource box is included.







 
Support : Creating Website | Johny Template | Mas Template
Copyright © 2011. Information Computer and Technology - All Rights Reserved
Template Modify by Creating Website
Proudly powered by Blogger