Precaution while using wifi

Introduction
1. Whether youre taking a much needed vacation or heading home for the holidays, youll probably want to stay connected while youre traveling from point A to point B. Public wi fi access is everywhere in cafes and even in the friendly skies. Here are some tips to protect your online security when you use a public wi fi hotspot. A public hotspot is a wireless network set up for shared Internet access. The hotspot host buys a wireless access point, connects that device to the Internet, and broadcasts its signal within a public place. Anyone with a wireless card within range can access the network and use the Internet. Most proprietors make it quick and easy for customers to use their hotspots. But by minimizing login requirements and avoiding encryption compatibility issues, they disable much of the security built into the wireless device. This is a notable tradeoff. Without encryption, your plain text data passes unprotected through the air as radio signals. Those signals can be intercepted by anyone with a receiver and some basic, widely available tools. When the hotspot youre on doesnt use encryption, someone who intercepts your data can read whatever youve sent whether its a private email or a user name and password combination. .....
Beware of Cybercriminals
2. Although its unlikely that nosy hotspot neighbors will put your privacy at risk, you should be on the alert for the most serious hotspot danger: a cybercriminal. These technically savvy hackers have the tools, skills, and patience to work around the limited protection measures some hotspot hosts take. For example, some cybercriminals have learned to use social engineering methods to con hotspot users into divulging sensitive information. By wi phishing, a cybercriminal can pre empt a hotspots wireless signal with one of his own, spoof the legitimate network name, and replace the sign up page with a look alike. Youll end up supplying your information to this evil twin, not the hotspot provider. Once youre on the spoofed hotspot, you may be redirected to other fraudulent or virus laden websites, or even be tricked into setting up a new account and providing credit card numbers or other identifying information. .....
Connect To Secure Network If Available
3. With the increase is skepticism in using Wi Fi hotspots, more and more companies and including hotels and coffee shops and are offering secure networks. Check for secure networks in the list of available networks. If you are in a hotel, the management might provide you with password so that you can use a secure network. As far as possible, connect to secure networks. Keep in mind that not every entity will give you the security option. To know if a network is secure, click on the network icon in the system tray. Hover mouse cursor over each connection to know if a network is secure and if yes, the type of security used. .....
Change to Public Network
4. When you change the current network setting from home or work to public, file sharing is disabled as is the printer sharing. This prevents your data from showing up on other computers that are probably searching for an open hard disk. To set the network to public, click on the network icon in the system tray. Then click on the Open Network and Sharing Center. In the dialog box that appears, check under network to see if the network is already public. The icon for public is a park bench while for a home network, it is a home icon. If it is home or work, click on it and from the resultant dialog box, select public network. .....
Avoid automatically connecting to Wi Fi hotspots
5. This ensures that youre connecting to the right Wi Fi hotspot, versus a malicious network set up to steal your information. Before joining any public network, look around for signs that advertise the name of the Wi Fi network provided. Don t join any other networks that may also show up on your PC as available. .....
Install a mobile antivirus and security app
6. Install a mobile antivirus and security app from your device app store and update its settings to automatically scan for viruses. Use our Lookout app for advanced security and privacy on your mobile device. . Don t use public networks to login to anything personal, even Web mail. Hackers are well aware that most people use the same passwords across everything from email to bank accounts. .....
Avoid using third party
7. Avoid using third party, communication apps, such as instant messaging and free phone calls. Some communication apps contain holes that allow hackers to access personal and private information found on your wireless device, as well as read your text messages and listen to your phone calls. .....
Use strong passwords
8. Use strong passwords. Create strong, secure passwords for any services that handle messaging, calling, voicemail, or email accessed through a Web browser from your device. Your passwords should contain upper and lowercase letters, along with a combination of numbers and/or special characters. .....
Maximum security protection
9. Connect to a Virtual Private Network (VPN) for maximum security protection. This protects your device just as if it were connected to a secure network. Change your Windows Wireless Network Connection properties from andAutomatic Connectionand (the default) to andOn Demandand to prevent your computer from automatically joining unsafe networks. .....
Verify
10. Verify that youre logging in via the Wi Fi service providers authentication page. Be aware of fraudulent Wi Fi hotspots installed near public hotspots with the same name. These evil twin hotspots encourage users to mistakenly log in to a service that resembles the authentic network login page but actually is designed to capture data as it flows to and from the Internet. .....
Avoid accessing websites
11. Avoid accessing websites or services where you provide personal or private information since hackers could be monitoring your activities. We dont advise accessing secure websites from public hotspots, such as online banking sites, portfolio management sites, or other sites containing personal data. Email access can also be at risk. .....
Ensure your Web based email is secure
12. While your connection maybe secure, youll want to make sure that your individual email message is also secure. You will know whether a site uses encryption by its address. If it starts andhttps,and then it s a secure site. Without the ands,and you re making it easy for someone to watch you enter passwords and account numbers.Https sites encrypt the information that you submit online so that eavesdroppers just see mess of letters and numbers. If you want to use an email server, make sure you have the SSL enabled so no one can see your ID, password, or emails. .....
Protect yourself
13. Protect yourself by avoiding credit card transactions while using unencrypted Wi Fi hotspotsandsuch as those offered free in many businesses and restaurants. Sharing is great at home, but it s a liability on public Wi Fi. Considering that you probably don t have password protections on all of your files, literally anyone could browse through your computer. It doesn t take any special skills. When your computer is set to share, it s basically begging for other devices to take its information. If you have a Windows operating system, you can automatically block sharing by choosing the andpublicand network setting. You can also do this manually under Change Advanced Sharing Settings. .....
Log out of the sites you visit
14. Log out of the sites you visit, and turn off Wi Fi connections when not in use. Your computer is probably already setup to use its firewall software. You can double check to make sure you have this protection. Windows users should go to Control Panel, System and Security, and Firewall. Mac users can find firewall software under System Preferences, Security. .....
Install browser security
15. For added safety, install browser security add ons or plug ins on your device, and consider using a virtual private network (VPN) that adds encryption between your device and the Internetandeven over unsecured networks. Your personal firewall isn t going to keep out a determined, experienced hacker. But it does make it harder for someone to eavesdrop. That s often enough to persuade hackers that they should find an easier target. .....
Make sure your computer has the latest firewall software
16. Finally, make sure your computer has the latest firewall software, security patches and software updates. Check with your IT administrator or computer manufacturer for more details. If you want more protection, avoid public networks by using InternetServiceProvider.net to find a reliable mobile service provider. You ll have a private connection to the Internet no matter where you go. .....
Hackers
17. Hackers can target unsecured Wi Fi networks to capture users passwords and gain access to financial accounts and other sensitive data. The has FTC warned Wi Fi users to take precautions while using public Wi Fi networks to surf the web. .....
Don t use public networks to login
18. Don t use public networks to login to anything personal, even Web mail. Hackers are well aware that most people use the same passwords across everything from email to bank accounts. Only connect to the public Wi Fi when you need to use it. If you don t need it, disconnect or turn off your device. The more time you spend on the network, the more chances you give a hacker to break in and do something bad. .....
Automatic Connection
19. Change your Windows Wireless Network Connection properties from andAutomatic Connectionand (the default) to andOn Demandand to prevent your computer from automatically joining unsafe networks. Only connect to the public Wi Fi when you need to use it. If you don t need it, disconnect or turn off your device. The more time you spend on the network, the more chances you give a hacker to break in and do something bad. .....
Disable Your Wi Fi Adaptor When Not Using The Computer
20. Many devices today come with a hardware switch to turn on or off the wireless adaptor. Since you are not using the hotspot, there is no sense it keeping the computer connected to the network. People may hack into the computer and steal your data. It is advised that once you are finished with your work, turn off the adaptor if not the computer. .....
Use Secured Pages
21. While using webmail pages, try to enter https instead of http. This will make sure that your login information is encrypted and not exposed on the wireless network. Social networks also have the option of providing you with httpspages so that you can use secured encrypted pages instead of normal ones that are not encrypted. For example, when using Twitter, use Your data would be safer this way. In case of webmail, however, they provide https only for the login page and not for the other pages that let you compose mails and view emails. You can see if the option is available by prefixing https to the URL in the address bar. If you get 404 error, the encrypted page does not exist. In such cases, it is advised you use some sort of encrypted network over the hotspot. .....
Get a VPN
22. VPN is not the safest option but is does safeguard your data from prying eyes effectively. It also depends on the type of VPN you are using. There are both regular and cloud based VPNs available that help you connect without having to worry about using your email client at Wi Fi hotspots. One of the best cloud based VPNs is Hotspot VPN. When you sign up with them, they create a virtual tunnel between your computer and their secure servers. The only thing you may not like while having to go for VPNs is their costs. With the improvements in cloud sector, I am expecting further flexibility in VPN services with relative costs going down. SpotFlux allows you to create a tunnel between SpotFlux servers and your computer so that data can transfer securely. You can read the entire review of SpotFlux on Windows Club. .....
Consider Encryption
23. There are several open source software that can encrypt your files as well as entire hard disks. I suggest TrueCrypt, a free software that encrypts your entire hard drive so that none can access it without breaking your password. So if you are using encryption, use a good one, create a good password and do NOT forget the password else it will be trouble decrypting. Bitlocker comes with Windows 7 and provides encryption to each of your hard drives and partitions. You may set up BitLocker to decrypt the drives automatically or using a key. Here is an article explaining Bitlocker In Windows 7. .....
Keep Your Firewall Active
24. You get a free firewall when you install Windows OS. By default, the Windows firewall is active and protecting your data. If you are using Windows Vista or Windows 7, this firewall should be sufficient to create a layer of protection for your data. If you are using any other operating system or a Windows version prior to Vista, you can download and install either ZoneAlarm or Comodo firewalls. Both are good and free to use. I recommend ZoneAlarm if you are not much into computer terminology and if you are confident of knowing what different alerts would mean, you can go for the Comodo firewall. .....
Keep An Eye On Access Points
25. Access points are the points that your computer uses to connect to the Internet. In cases where different networks are overlapping, you may see different access points. You need to know if you are connecting to the correct one and so that your data does not travel on an unknown network. If you are using Windows 7, the operating system alerts you as soon as it finds a new network and asking you if you wish to use and name it. If you know the network, you can name it and set a category for it before using it. If you do not know the network, you can disregard it. This means that you do not have to worry if you are using Windows 7 or higher versions of Windows. In case you are using some other operating system, please refer to its documentation to know about detecting access points. .....
Turn OFF Printer and File Sharing
26. For Homegroups on Windows, Printer and File Sharing is turned ON by default. If you are at a public place, you should disable the Printer and File Sharing. This you can do by selecting Public Network when you are prompted to add the Wi Fi hotspot to your list of wireless networks. If you did not get that dialog box asking you to confirm whether you wish to place the new network into Home or Public group, you can manually check and disable File and Printer sharing. .....
Safe Browsing Habits
27. As said earlier, use browsers to check your email and other tasks. Browsers reduce the data theft risk by providing encrypted connection between your computer and service providers servers. Most of the websites come with HTTPS option and you should make it a habit to use the secure versions of websites. .....
Use Additional Security If Available
28. You should not access banking services and other financial institutions while at a public spot. If it is urgent, consider the security measures offered by your banks. Some banks send PIN to your cellphones that you need to enter before you can access your accounts online. See what all security options are available beforehand so that you are not stuck without security later. These were some tips for secure Wi Fi usage. If you have any more, please leave it in the comments section and we may add it to the article. You can also checkout this post on how to protect your data when using public Wi Fi or unsecured wireless networks. .....
Conclusion
29. Public wi fi hotspots can be both friend and foe during your travels, unless you take precautions. Its up to you to protect your computer, your data, and your privacy with good tools and cautious computing habits. We hope the tips we offered in this article help you to do just that. .....
Only Use Encrypted Websites
30. Anyone with some basic hacking experience can steal information from other computers on a public network. You can make it considerably harder by only using encrypted sites. You will know whether a site uses encryption by its address. If it starts andhttps,and then it s a secure site. Without the ands,and you re making it easy for someone to watch you enter passwords and account numbers. Https sites encrypt the information that you submit online so that eavesdroppers just see mess of letters and numbers. If you want to use an email server, make sure you have the SSL enabled so no one can see your ID, password, or emails. .....
Don t Share Anything
31. Your home network should let you share files and devices easily. That way, you can do things like use your tablet to access files on your desktop computer. Sharing is great at home, but it s a liability on public Wi Fi. Considering that you probably don t have password protections on all of your files, literally anyone could browse through your computer. It doesn t take any special skills. When your computer is set to share, it s basically begging for other devices to take its information. If you have a Windows operating system, you can automatically block sharing by choosing the andpublicand network setting. You can also do this manually under Change Advanced Sharing Settings. .....
Turn on Your Personal Firewall
32. Most contemporary operating systems come with basic firewall software that will add a level of protection to your computer. Your computer is probably already setup to use its firewall software. You can double check to make sure you have this protection. Windows users should go to Control Panel, System and Security, and Firewall. Mac users can find firewall software under System Preferences, Security. Your personal firewall isn t going to keep out a determined, experienced hacker. But it does make it harder for someone to eavesdrop. That s often enough to persuade hackers that they should find an easier target. If you want more protection, avoid public networks by using InternetServiceProvider.net to find a reliable mobile service provider. You ll have a private connection to the Internet no matter where you go. .....
Don t Leave Your Device On
33. Only connect to the public Wi Fi when you need to use it. If you don t need it, disconnect or turn off your device. The more time you spend on the network, the more chances you give a hacker to break in and do something bad. It often helps to log off as soon as you ve gotten the information that you need. That way, you have the files you want without staying online for very long. .....
Turn on the firewall
34. Fortunately most operating systems now default to the firewall being on.However when you re at home, you may use your router as your firewall and keep any software firewall on your machine disabled. That works well, as the router stops network based attacks before they ever reach your computer .....
The open Wi Fi problem
35. The problem with open Wi Fi hotspots is that the wireless radio connection between your computer and the wireless access point is notencrypted. That means any data that you don t take care to ensure is already encrypted is transmitted in the clear, and anyone within range can eavesdrop and see it. Encryption, using WPA or WPA2, prevents that. .....
An interstitial page is not encryption
36. If you connect to a hotspot and the operating system on your machine requires a password for that to work, that s not an open Wi Fi hotspot, and you re probably OK. If on the other hand you can connect, and when you fire up your browser it first takes you to a web page that says andenter a passwordand (as in a hotel) or andcheck to accept our termsand (as in most other open hotspots) that is not encrypted, it s not secure; it is an open Wi Fi hotspot. .....
Secure your desktop email program
37. If you use a desktop email program such as Outlook, Outlook Express, Windows Mail, Windows Live Mail, Thunderbird or others, you must make certain that it s configured to use SSL/secure connections for sending and downloading email. Typically, that means that when you configure the email account in your email program, you need to: 1 Configure your POP3 or IMAP server for accessing your email selecting theandSSLand, andTLSand, or andSSL/TLSand security option, and usually a different port number. 2 Configure your SMTP server for sending email selecting andSSLand, andTLSand, or andSSL/TLSand security option, and usually a different port number such as 26,465, or 587 instead of the default 25. The exact settings and whether or not this is even possible depends entirely on your email service provider; you ll need to check with them to determine the correct settings to use. How you configure these settings, of course, depends on the email program that you use. .....
Secure your web based email
38. If you use a web based email service like Gmail, Outlook.com, Yahoo or others via your browser, you must make sure that it uses an httpS connection and that it keeps on using that httpS connection throughout your email session. Fortunately most of the major email services have moved to making https the standard, and sometimes the only available connection method. Accessing email using a plain http connection might well be the source of many open Wi Fi related hacks. I expect that people simply login to their web based email service without thinking about security and as a result, the username and password are visible to any hackers in range who care to look. Be careful. Some services will use https for only your login, which is insufficient as your email conversations thereafter could be viewed by others. Other services may andfall outand of https, reverting to unsecure http without warning. .....
Secure all your other online accounts
39. Any and all web based (aka andcloudand) services that require you to login with a username and password should either be used only with https from start to finish, or should be avoided completely while you re using an open Wi Fi hotspot. With more and more services being provided on line, this is getting to be a larger problem. Using andthe cloudand is a great way to manage your digital life, but one of the key problems remains security. Using https is critical to that security when you re out and about. .....
Use different passwords
40. Finally, it s important to keep the passwords of the accounts that you access different from each other and, of course, secure. That way, should one account be compromised by some stroke of misfortune, the hackers won t automatically gain access to your other accounts that they may then learn of. .....
Consider not using free Wi Fi at all
41. As I said, it can be safe to use open Wi Fi, but it s also very easy for it to be unsafe.The solution that you used while you were at that same coffee shop (and asked me about in this question) is a very common and solid one: use your phone instead. While it is technically possible, a mobile/cellular network connection is significantly less likely to be hacked. In fact I use this solution heavily when I travel. .....
Use your mobile device
42. Many phones or other mobile devices, such as iPhones, iPads, Droids, Blackberrys and others, are quite capable email and web surfing devices, and typically do so via the mobile network. (Some can also use Wi Fi, so be certain that you re using the mobile broadband connection for this option to avoid the very security issues that we re discussing.) .....
Tether your phone
43. Tethering means you connect your phone to your computer and usually by a USB cable, but in some cases, via a Bluetooth connection and and the phone acts as a modem, providing a mobile broadband internet connection. Avoiding online tasks that require you to enter your sensitive, personal information such as credit card numbers or passwords is best practice when on a Wi Fi network. .....
Use a dedicated mobile modem
44. Occasionally referred to as andair cardsand, these are USB devices that attach to your computer and act as a modem, providing a mobile broadband internet connection, much like tethering your phone. If you must enter this type of data when on a public network, ensure the website asking for the information uses andhttpsand before their URL in your browser s address bar. The key is the andsand in andhttpsand lets you know the connection is secure even if someone hacks a https:// session, the information they access will be encrypted. If the andsand is not present, do not enter your private information. .....
Use a mobile hotspot
45. In lieu of tethering, many phones now have the ability to act as a Wi Fi hotspot themselves. There are also dedicated devices, such as the MiFi, that when turned on, are simple dedicated hotspots. Either way, the device connects to the mobile broadband network and provides a Wi Fi hotspot accessible to one or more devices within range. When used in this manner, these devices are acting as routers and must be configured securely, including applying a WPA/WPA2 password so as not to be simply another open Wi Fi hotspot susceptible to hacking. .....
Don t forget the physical
46. Laptops are convenient because they re portable. And because they re portable, laptops are also easily stolen. Unfortunately it only takes a few seconds for an unattended and un watched laptop to disappear. That s one reason I never leave mine alone: even if I need to make a quick trip to the restroom, the laptop comes with me. There s just no way of knowing that absolutely everyone around is completely trustworthy. .....
Security and convenience are always at odds
47. As you can see, it s unfortunately easy to get this stuff wrong, since doing it securely takes a little planning and forethought. But it s important. If you re not doing things securely that guy in the corner with his laptop open could be watching all your internet traffic on the Wi Fi connection, including your account username and password as they fly by. .....
How do I stay safe in an internet caf
48. When connecting to the internet in an internet cafe, hotspot or other public connection you could be opening yourself up to serious security issues. Turn off sharing settings on Mac OS X. Click the Apple menu in the upper left corner of the screen followed by andSystem Preferencesand from the context menu. Select sharing from the System Preferences window and uncheck all of the sharing options that are currently enabled to disable them. .....
Is cellular broadband more secure than WiFi
49. Cellular is a popular internet connection alternative. As with any connection it s important to understand the security ramifications and tradeoffs. Turn off sharing settings on Windows. Navigate to Start >> Control Panel >> Network and Internet >> Network and Sharing Center. Select andHomegroup and Sharing Optionsand followed by andChange Advanced Sharing Settingsand. From within the Change Advanced Sharing Settings dialog you can disable printer and file sharing as well as Public folder sharing and network discovery. .....
Is it OK to use this random wireless network that I just found
50. When scanning for wireless connections you may find several that are unknown yet and appear open and available. Using them is risky. Very risky. If your device has an internal Wi Fi adapter, you can access Network Connections on Windows by clicking Start, typing andncpa.cpland and pressing Enter on your keyboard. Note: The process of disabling your Wi Fi card will vary from device to device. Consult your manufacturer documentation to learn more. .....
Internet Safety
51. Internet Safety is difficult and yet critical. Here are the seven key steps to internet safety and steps to keep your computer safe on the internet. Encrypting important private files and folders is a great method of keeping them from prying eyes that may have been able to access your machine through a Wi Fi network. .....
Protecting Yourself
52. If you re accessing something sensitive on public Wi Fi, try to do it on an encrypted website. The HTTPS Everywhere browser extension can help with this by redirecting you to encrypted pages when available. If you frequently browse on public Wi Fi, you may want to pay for a VPNand browse through it when on public Wi Fi. Anyone in the local area will only be able to see that you re connected to the VPN, not what you re doing on it. .....
Compromised Devices
53. Compromised laptops and other devices may also be connected to the local network. When connecting, be sure to select the andPublic networkand Wi Fi option in Windows and not the Home network or Work network options. The Public network option locks down the connection, ensuring Windows isn t sharing any files or other sensitive data with the machines on the local network. .....
Malicious Hotspots
54. Most dangerously, the hotspot you connect to itself may be malicious. This may be because the business s hotspot was infected, but it may also be because you re connected to a honeypot network. For example, if you connect to andPublic Wi Fiand in a public place, you can t be entirely sure that the network is actually a legitimate public Wi FI network and not one set up by an attacker in an attempt to trick people into connecting. .....
Nothing Is Private on Open Wi Fi
55. Today, most tech users know how (and why) to secure their home wireless routers. Windows 7 and Vista now pop up a dialog box to warn you when youre connecting to unencrypted wireless networks. In a coffee shop, an airport lounge, or a library, however, people frequently connect without thinking twice and though using an unencrypted connection to check a baseball score or a flight status might be acceptable, reading e mail or performing any Web activity that requires a login is akin to using your speakerphone in the middle of a crowd. .....
An Alternative to Using Unsecure Public Wi Fi
56. Following the above tips should keep you pretty safe while you re using free Wi Fi, but if you are a regular traveller and often find yourself at coffee shops surfing the internet, we recommend a Wi Fi AC750 Portable Router. Not only will you be able to transform a public Wi Fi connecting into your own personal Wi Fi hotspot , you ll be able to use it as a full router, including the added bonus of setting up WPA encryption just as you would any other router. Wondering why you would want a full router while you re getting work done at your local coffee shop? Two words: firewall features. With those features you don t have to worry as much about your information being compromised while browsing the web so you can surf freely. As an added bonus, the WiFi AC750 Portable Router features 11AC technology for fast/dual band Wi Fi. Frequent travelers, I know you re in love. .....
Set up your phone s security
57. Switch off the wireless connection when you re not using it. Also, don t forget that your device, especially if it s an Android, is vulnerable to malicious software. Norton, ESET, and Sophos all offer good mobile security and antivirus apps for smart phones. .....
Use long and strong passwords
58. Make your passwords difficult to hackandand unique, so if one is stolen it can t be used to unlock other accounts. Use a digital password manager if you have trouble remembering them all; Lyne recommends 1Password and LastPass. .....
Make sure the network is legit and encrypted
59. Don t assume that a hot spot is real just because the name that pops up in your phone looks correct. If you re at a hotel or cafand, ask a manager to confirm the name of its networkandand that the network is encrypted (i.e., locked and password protected). While online, stay on encrypted channels by using the website prefix https(rather than http). .....
Use a VPN
60. Even if you re on a password protected network, there s still the possibility that someone will intercept your transmissions. To ensure absolute privacy, use a VPN service, which basically creates a network within a network just for you. Boingo offers a VPN through its subscription plans (from $9.95 a month) that lets you access more than 500,000 global hot spots. The new Norton Hotspot Privacy service ($49.99 a year) will also route all your traffic through a private connection. .....
Buy a data plan
61. Buy a data plan. As a general rule (unless News of the World had you in its sights), your cellular network is secure. Both ATandT and Verizon have recently introduced affordable global data roaming packages: ATandT gives you 120MB for $30 a month; Verizon offers 100MB for $25. So when in doubt, stick to your wireless carrier. .....
Wi Fi Protected Setup
62. Wi Fi Protected Setup is an optional feature that simplifies and standardizes the process of configuring and securing a Wi Fi network. It configures the network name (SSID) and WPA2 security for the gateway and client devices on a network and makes adding a new device to your network as easy as pushing a button or entering a personal information number (PIN). Products certified for Wi Fi Protected Setup are available at major electronics retailers and display this identifier mark on their packaging. .....
Securing a new network
63. 1 Change the network name (SSID) from the default name. 2 Change the administrative credentials (username and password) that control the configuration settings of your Access Point/Router/Gateway. 3 Enable WPA2 Personal (aka WPA2 PSK) with AES encryption. 4 Create a network passphrase that meets recommended guidelines. 5 Enable WPA2 security features on your client device and enter the passphrase for your network. .....
Checking security on an existing network
64. When you add a new device to your Wi Fi network, it s a great time to make sure you re taking advantage of the highest level of security. Take the opportunity to ensure your network is configured for WPA2. If your network was set up some time ago, or a service provider (e.g consultant or cable provider) configured your home network, it may be worth checking that it s configured for the highest level of security. If your network is configured for an older generation of security (WEP or WPA), Wi Fi Alliance .....
Passphrase quality and lifespan
65. A secure network passphrase greatly enhances network security, so it is important to select an effective passphrase. In general, increasing length, complexity and randomness all improve the quality of a passphrase. Wi Fi Alliance recommends that a passphrase is at least eight characters long, and includes a mixture of upper and lower case letters and symbols. A passphrase should not contain a word found in a dictionary and should not include personal information (identification number, name, address, etc). .....
On the go
66. Once users have experienced the convenience and freedom of working wirelessly, they want to take their Wi Fi devices on the road. Here are some tips for securing your Wi Fi devices when using them away from your home network.Enable WPA2 security: All of your Wi Fi client devices (laptops, handsets, and other Wi Fi enabled products) should use WPA2. Configure to approve new connections: Many devices are set by default to sense and automatically connect to any available wireless signal. Configuring your client device to request approval before connecting gives you greater control over your connections.Disable sharing: Your Wi Fi enabled devices may automatically enable themselves to sharing / connecting with other devices when attaching to a wireless network. File and printer sharing may be common in business and home networks, but you should avoid this in a public network such as a hotel, restaurant, or airport hotspot. .....
Rules to play High Jump
Jumping. high Jumpers tend to practice jumping 1 2 times a week. Approaches, or run throughs, are repeated sometimes up to 6 8 times per session. Short approach jumps are common for jumpers to do, as it allows for them to work on specific technical aspects of .....
Myth about Alcohol
Its no one elses business how much I drink I can handle it. IF youre drunk and then lose your keys and then have to pound on the door until your roommate wakes up to let you in, that affects your roommate. In fact, studies show that one persons drinking habits can affect an average of five people other than t .....
Funny Things To Do This Winter
Find some culture. Around Christmas, a number of cultural institutions and events such as museums, galleries, concerts, live performances etc. are free and open to the public. .....
World Carnival
Festival of the Sun Peru. Inti Raymi (Festival of the Sun) is celebrated in indigenous cultures throughout the Andes. Celebrations involve music, colorful costumes (most notable the woven aya huma mask) and the sharing of food. In many parts of the Andes, this celebration has .....
Healthy Neck
Strategically place ice on certain areas of the body. Neck pain may also be joined by nagging headaches and numbness and tingling in the back of the head, neck, shoulders and hands. Some forum members suggest putting ice on different areas of the body (between the thumb and index finger, on the bone 1.5 .....
Benefits of Sapodilla fruits
Kidney Stones. The smashed seeds have got a diuretic action and therefore are believed to discharge bladder and also kidney stones. Sapota is one of those fruits which are great for health besides being extremely delicious, thanks to the wide array of nutrients con .....
Ebola Virus
WHO response. WHO provides expertise and documentation to support disease investigation and control.Recommendations for infection control while providing care to patients with suspected or confirmed Ebola haemorrhagic fever are provided in Interim infection contr .....
Step to finding your perfect man
Make sure youre compatible. This is crucial for the survival of any serious relationship. Your man may look great on paper, but you should also be compatible when you're together. This means laughing easily, having great conversations without hardly ever running out of things t .....
Simple Tips To Living Longer
Dont eat and sleep. Eating just before sleeping is definitely not recommended. Ideally, you should finish your last meal at least 3 hours before you hit the bed. This is so that you do not go to bed on a full stomach. Sleeping on a full stomach can cause you to have dis .....
Astrology
Love Compatibility between Cancer and Virgo. Cancer and Virgo - Love Compatibility Profile : When Cancer and Virgo make a love match, a strong, down-to-earth relationship with staying power is the happy result. This is a relationship with great potential to get better and better over the passin .....
Beautiful National Parks Around the World
Manuel Antonio National Park Costa Rica. Manuel Antonio National Park is a small National Park located on the Pacific coast of Costa Rica. It is well known for its beaches and hiking trails. .....
Romantic Valentines Day Cocktails
Cupid Arrow Hot Chocolate. Kids and adults alike will love this fun twist on a classic winter treat. Dress up hot chocolate with heart shaped marshmallows and a paper straw arrow for the finishing touch. .....
Astrology
What Leo Needs. Leo ( Jul 23 - Aug 22 ) What Leo Needs : What the King/Queen of the Jungle wants more than anything else is to be fawned over. Being a devoted sort, the Lion will return this gesture in kind, making a partner feel special, indeed. A lover with the .....
Ways Your IT Team Makes You Look Like a Hero
They keep the business safe and operational. The old answer to how does your team make you look like a hero was by keeping you out of the news and keeping a low profile, said Davi Ottenheimer (@daviottenheimer), president, flyingpenguin. That still holds true, continued Ottenheimer, but simply .....
Benefits of Ginger
Tones Skin. Ginger is known for its aphrodisiac, antioxidant and toning properties which contribute to radiant skin. You can prepare a simple mask by mixing 2 grated gingers with 2 tablespoons honey and 1 teaspoon lemon juice and refrigerate it for at least 30 m .....
Munshi Premchand
Writing style. The main characteristic of Premchands writings is his interesting story telling and use of simple language. His novels describe the problems of the rural peasant classes. He avoided the use of highly Sanskritized Hindi (as was the common practice amo .....
Cutest Animal Facts
Parrots give their offspring names. propaganda enforced by pirate movies tells us, not all parrots are named Polly. Researchers have determined that soon after the parrot chick hatches from the eggs, its parents will give him a name which will also constitute the signature call of the .....
Never seen Water Like This
Water like glass. This shot was taken at sunset at the Ouachita Whitewater park in Malvern, Arkansas. .....
Tips to get ready for New Year
Do not forget to adjust your feng shui. This is a critical part of the Chinese New Year festivities making sure your home is ready to welcome the auspicious annual energies and stop negative energies from coming into your house. Small feng shui changes can ward off a variety of problems f .....
Major Dhyan Chand
Olympic fame. Indian hockey team made its Olympic debut in 1928 Amsterdam Olympics and went on to won the countrys first ever Olympic gold medal. Major Dhyan Chand was the top scorer of the tournament with 14 goals in just 5 matches with his brilliant piece of gam .....
Benefits of Nutmeg
Flavor. Nutmeg, or Jaiphal as it is called in Hindi, is a very popular flavoring agent in making sweets in India. It is also used in baked goods, sauces, ice cream, and custards. Certain coffee drinks, including cappuccino, are flavored using nutmeg and cinn .....
Precautions while using Washing Machine
Measure your detergent. Read the appliance instruction manual to make sure you use the correct type and amount of detergent for your machine. Too much soap can leave residue on your clothes and cause excess wear and tear on your washer, and high efficiency washers require a .....
What to Eat in Bihar
Date palm. Is a palm in the genus Phoenix, cultivated for its edible sweet fruit. Although its place of origin is unknown because of long cultivation, it probably originated from lands around the Persian Gulf. The species is widely cultivated and is reportedly .....
Surprising ways youre ruining your Hair
INSANE FACTS ABOUT HAIR 12. Did you know that blonde hair was associated with prostitution in ancient Greece? .....
Most Powerful Bikes
Ducati Monster 600. Its been two decades since the Monster appeared in 600cc form, and even more than the earlier 900cc version its responsible for a transformation of Ducati into a brand synonymous with style to both motorcyclists and nonbikers. Back in the 90s, the Mo .....
How to Remove Dark Circles Tips
Get your beauty sleep. Get plenty of sleep nightly. Its not entirely clear why inadequate sleep results in dark circles under the eyes, but lack of sleep tends to cause the skin to become paler (thus increasing the appearance of darkness under the eyes), and reduces circu .....
Most Popular New Years Resolutions
Learn Something Exciting. Coming from an education background, learning is fun Its an exciting process we go through when we learn something. Theres even science to back it up, telling us that humans enjoy the process of learning. So, with science at our backs, why not start .....
Vasant Panchami
The Foundation of Education. The most significant aspect of Vasant Panchami is that it is also the most auspicious day to begin laying one .....
Swami Vivekanand
The Parliament of Religions. At Porbandar, where he arrived after visiting Verawal and Somnath (Prabhas), he stayed for eleven months, and helped the Dewan of the place, Pandit Shankar Pandurang, in translating the Vedas. He completed his study of the Mahabhashya, and learnt Fre .....
Best types of nuts for your health
Horse chestnut. buckeye: the inedible nutlike seed of the horse chestnut. .....
Mouthwatering Foods to Try
Chicken Shakuti. Native to Goa, this curry is a mixture of various traditions. It is a hot and spicy chicken curry and tastes best with rice. .....
Crazy Bike Designs
Run. Or maybe we should run. .....
Benefits of Kale
Antioxidant Related Health Benefits. kale has been studied more extensively in relationship to cancer than any other health condition. This research focus makes perfect sense. Kales nutrient richness stands out in three particular areas: (1) antioxidant nutrients, (2) anti inflammatory .....
Accessories For Savvy Travelers
Personal Navigator. Although there are numerous GPS devices out there, the Asus Personal Navigator is not only jam packed with features like bluetooth and an FM transmitter, it is also compact enough to fit in your pocket so you can easily take it with you when you get .....
Chourishi Systems