Caution! Wireless Networking: Preventing a Data Disaster by Jack McCullough

By Jack McCullough

Finally, a e-book devoted to assuaging the fears that clients could have in regards to the safety in their instant domestic community. This no-nonsense advisor is for instant domestic networkers who are looking to guard their information from hackers, crackers, viruses, and worms. Written in non-technical language that is ideal for either rookies and intermediate clients, this booklet bargains a short creation to instant networking and identifies the commonest inner and exterior pitfalls-and how you can steer clear of and proper them.* the perfect reference for desktop clients with a instant community who want proof separated from fiction to benefit what's essential to defend their networks* Real-world examples aid demystify viruses, worms, cryptography, and id robbery, whereas specialist suggestion, cool strategies, and step by step directions provide readers the knowledge they should safe a WLAN and guard their privateness* Covers the newest desktop safeguard threats and countermeasures, addressing difficulties that older titles don't conceal, relatively within the components of virus safety

Show description

Read Online or Download Caution! Wireless Networking: Preventing a Data Disaster PDF

Similar organization and data processing books

Beginning ASP.NET 2.0 databases: beta preview

With support from Microsoft ASP. web insider Bradley Millington, John Kaufman covers either VB. internet and C# coding for ASP. internet databases so that you would not have to make a decision up entrance which language you will have extra and outlets now not need to deal with stock on separate language types.

Oracle Database 10g: High Availablity with RAC Flashback & Data Guard

Reach actual strategies for present availability demanding situations. in accordance with a "DBA-centric" method of excessive Availability, Oracle Database 10g excessive Availability concentrates on explaining Oracle Database 10g applied sciences and practices to database directors, masking basic availability, genuine software clusters (RAC), catastrophe making plans and restoration, and disbursed database ideas.

High Assurance Services Computing

Excessive coverage providers ComputingJing Dong, Raymond Paul, Liang-Jie ZhangService computing is a state of the art quarter, renowned in either and academia. New demanding situations were brought to boost service-oriented structures with excessive insurance standards. excessive coverage companies Computing captures and makes obtainable the latest sensible advancements in service-oriented high-assurance structures.

Extra info for Caution! Wireless Networking: Preventing a Data Disaster

Sample text

Professionals sometimes use the terms gateway and router interchangeably, indicating a device connected to two or more networks that direct network traffic among them. I draw a distinction between the two. A gateway is a device that converts data packets between protocols. A gateway can convert a TCP/IP packet into an IPX packet, allowing computers on the two different networks to “talk” to one another. A router directs traffic from one physical network to another, from Ethernet to Wi-Fi, for example, but does not translate between protocols.

44 Chapter 4: Hijacking Wi-Fi Chapter 4: Hijacking Wi-Fi 45 Hijacking Sessions Session hijacking is one class of effective attacks on networks; it isn’t difficult, and if the target access point isn’t using WEP(or WPA) encryption, then it’s extremely simple. Hijacking occurs in many forms on both wired and wireless networks. By hijacking a session, a cracker gains access to a WLAN, where he masquerades as a legitimate user. Session hijacking can also be the first step in other more complicated cracking techniques.

NAT allows you to share one public IP address (assigned by your ISP) among several computers on your WLAN. This allows each host on your network to access the Internet by sharing a single public address. NAT technology conserves Internet addresses and affords some protection to your network by acting as a sort of firewall. Only the IP address assigned to your router is visible to people on the Internet; the rest of your network’s internal addresses remain hidden behind the single IP address they are sharing (see Figure 2-12).

Download PDF sample

Rated 4.68 of 5 – based on 16 votes