IT tutorials
 
Windows
 

Windows 7 Wireless Networking : How Do I Know if a Wireless Network Is Secure?

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
12/21/2012 11:30:41 AM

How Do I Know if a Wireless Network Is Secure?

There is no way to guarantee complete security on a wireless network. However, you can take some precautions to help minimize security risks when you use a wireless network.

Whenever possible, connect only to wireless networks that require a network security key or password or have some other form of security, such as a certificate. The information sent over these networks is encrypted, which can help protect your computer from unauthorized access. When you view available wireless networks on the Connect to a Network window, wireless networks that have not enabled security will be identified with a yellow icon (see Figure 1).

Figure 1. The yellow icon clearly identifies wireless networks that are not secure.


Before you connect to a network provided by a wireless Internet service provider (ISP), such as a public network in a coffee shop or an airport, read the privacy statement carefully and make sure that you understand which files, if any, are saved to your computer and what type of information the network provider collects from your computer.

Your best guarantee of privacy, however, is to be vigilant about what’s allowed to enter your computer. Remember the oft-repeated warnings about not opening email from any source you don’t recognize, and be extra careful about responding to any request for personal information, including entering a user ID and password upon logging in. If the yellow icon has appeared for the network you’re logging in to, at least you’ll know that you are on a public network, and you can take appropriate precautions. Make sure your antispam and anti-malware software is up-to-date when logging on to coffee shop and other public networks.

What Makes a Home or Work Network Safe to Connect To?

Not all home or work networks are safe. One or more of the other users of your home network may, for instance, have accidentally downloaded a keylogger while playing an online game or downloading some clip art.

To help ensure that a home or work network is safe to connect to, make sure that it has the following:

  • For wireless networks, a wireless connection encrypted with Wi-Fi Protected Access (WPA or WPA2). (WPA2 is preferred because it is more secure than WPA.)

  • For all networks, a firewall or other device with network address translation (NAT), which is connected between your computer or wireless access point and your cable or DSL modem (see Figure 2).

    Figure 2. Make sure that your network has a firewall between your computer or wireless access point and your modem,

Many modern cable and DSL modems include both NAT and wireless capabilities, built in. Wireless routers, in addition, are also often capable of acting as NAT devices. Our recommendation is that, if you have a broadband connection, you have some form of NAT capability between the modem and your computer—either directly (built in to the cable/DSL modem) or as a standalone device.

In Figure 10.4, you can see an example where the NAT device and the wireless router are separate from the cable/DSL modem.

How Windows Firewall Affects Network Locations

One difference between your home or work networks and a public network is how this affects the protection levels on your computer. At home, or on a work network, you should be able to count on a hardware firewall, such as a NAT router, protecting your computer from prying eyes. When you are on a public network, however, you don’t have that option and you are forced to rely on a software firewall to protect your computer.

So, when you are on your home or work networks, you are generally more willing to allow various programs to run and access the Internet. Why? Because you are already protected from unauthorized access.

The public network location blocks certain programs and services from running to help protect your computer from unauthorized access while you’re connected to a network in a public place. If you’re connected to a public network and Windows Firewall is turned on, some programs or services might ask you to allow them to communicate through the firewall so that they will work properly.

When you allow a program to communicate through the firewall, it’s allowed for every network with the same location as the network you’re currently connected to. For example, if you connect to a network in a coffee shop and choose Public network as the location and then you unblock an instant message program, that program will be unblocked for all public networks that you connect to.

If you plan to unblock multiple programs while you’re connected to a public network, consider changing the network location to home network or work network. It might be safer to change this one network than affect every public network you connect to from that point on. But remember that if you make that change, your computer will be visible to others on the network, and this can be a substantial security risk.

 
Others
 
- Windows 7 Wireless Networking : Setting Up a Wireless Network, Viewing and Connecting to Available Wireless Networks
- Windows 8 : Getting Help - To access the Help home page
- Windows 8 : Upgrading to Windows 8, Sleep, Shut Down, and Restart
- Setting Up and Using Home Server Storage : Working with Server Backup Drives
- Setting Up and Using Home Server Storage : Understanding Storage in Windows Home Server 2011
- Windows Vista : Registry Tasks and Tools (part 5) - Prevent Changes to a Registry Key, Back Up the Registry
- Windows Vista : Registry Tasks and Tools (part 4) - Export and Import Data with Registry Patches
- Windows Vista : Registry Tasks and Tools (part 3) - Create an Interface for a Registry Setting
- Windows Vista : Registry Tasks and Tools (part 2) - Find the Registry Key That Does
- Windows Vista : Registry Tasks and Tools (part 1) - Search the Registry, Search and Replace Registry Data
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us