Wireless routers are extremely common these days because of the convenience and flexibility they provide. For the most part a wireless router allows you to connect pretty much anywhere within range without wires. The wireless capable routers are being provided by Internet providers and many times wireless is enabled by default. If you are lucky the WEP (Wired Equivalent Privacy) is set so it is more difficult for someone to access your network and steal bandwidth. But, this is about the extent of security that is set by default and WEP has been proven to be easy to crack. Just Google "cracking wep" and you will see several results showing how to crack WEP secured networks.
It isn't enough that it is made simple by the Internet provider to access the wireless network. Wireless Network Interface Cards (NIC) are now standard in most laptops and the operating system will automatically detect a wireless network. Then, walk you through setup process. In essence you could be completely computer illiterate and get onto an unsecured wireless network and possibly be unaware.
There are simple three things you can do to your wireless network to help make it more secure and difficult for people to hijack.
Encryption
Encryption does not allow people immediate access to your network and also keeps data from being sent from computer to router (or vice versa) unencrypted. WEP is very weak, but better than nothing. WPA2 is more secure.
Hide the Service Set IDentifier (SSID)
Hiding the SSID makes it so WAR drivers or neighbors can't just see your network ID by doing a simple network search. Along with hiding the SSID, make it something that is difficult for someone to guess. Preferably something random and completely unrelated to you or your family.
Limiting Access To Specific Media Access Control (MAC) Addresses
Set your router to accept only MAC addresses associated with the computers you want to access your network. This helps keep someone that cracked your encryption and guessed your SSID off your network because the MAC address of the NIC does not match any you have set into the list of acceptable MACs on your wireless network.
These three things can go a long way to keeping your home wireless network secure and not visible to possible hijackers. Keep in mind, that wireless is not all that secure and even with applying the few steps it can take someone who knows what they are doing to hi-jack your wireless network and steal your data in an unencrypted state in less than an hour. So, if you have sensitive proprietary information it is advisable to use software to better encrypt your information before it gets sent across the network.
For step-by-step instructions on how to set and manage these settings please check out WebTechTorial.
Michael Zaun - www.webtechtorial.com
Even with the methods used by the on-line poker room to secure their systems, finances, and, most importantly, their players, there are still steps that the player can take to insure even greater security on their machine. The most simple security concepts and methods, possibly so simple they are OFTEN overlooked, are proper password formatting, user accounts on the computer, firewalls, and routers (not necessary if only one computer and not using wireless in the home). The actual details of every possible configuration and instructions, due to length, cannot be discussed here. But, instructions for software usage and/or hardware usage should be on the player's current computer and is generally very easy to setup.
Passwords are always discussed regarding computer security, almost ad nauseum, yet, almost all attacks or personal information being obtained unwittingly could have been prevented with the use of proper passwords. The longer the password, the better, because there are more combinations the more characters there are. 7-10 characters should be sufficient though. NEVER use dictionary words, names, birth dates, etc. This is not even an option if lower case and upper case letters, numbers, and special characters are used in the password. And to make remembering the password easier, but still apply the above techniques, a passphrase can be used. For example, "I always sign up for rakeback to receive more money!" Then use the first letter of each word, "Iasufrtrmm!" (not including the quotes), to make it even more secure substitute 'for' with '4', 'to' with '2', and 'money' with '$'. The passphrase will now be "Iasu4r2rm$!". There is no real discernible rhyme or reason to the password AND the passphrase can be written down somewhere where it appears 'in context'. The above password rules should be used for all passwords, but especially for poker accounts (or rakeback accounts when you have to choose a payment method).
Controlling access to the computer is a little better now with Windows than in the past, but it is currently not at the level of Linux. This won't stop somebody, though, from following the rule of 'least privileges'. In a nutshell, for Windows users, do not use an administrator account (whether the account is the actual 'Administrator' or the user(s) account that has administrator privileges) for daily use. The limited account does not have as many privileges as the administrator account does and cannot make as many changes, such as deleting or writing to important system files AND installing software. By using the limited account, the poker player will greatly decrease a virus or any form of malware being installed on the computer, because they do not have permissions to install software. An administrator account will still be necessary, but for listening to music, playing poker, etc. a limited account is preferred and more stable. The administrator accounts and user accounts need strong passwords just like any other account created.
If a firewall is not installed on the computer one can easily be obtained for free and simply installed (It is recommended that you discuss any software modification, including a router and firewall, with a professional before making any changes*). Most firewalls require minimum configuration and prevent most intrusions. If a router is currently used on the computer, then it might already come with a firewall, since most current routers do. If a wireless router is being used, preventing others from accessing the network is very important. A few things to do to configure the router is turn off the 'broadcast signal', so others, within a close enough range, cannot as easily have access to your network. It is possible to configure the router to only allow certain computers to connect to the network using the computer's MAC address (unique number to each computer made). If a wireless router is installed, but only for guests or a computer not in use, turning off the wireless (not just the broadcast, but the ability to even connect to the wireless network) and connecting directly through the network card is another great preventative method. And, of course, the most important part, is creating a strong password (routers will actual create this for you)that will help prevent unwanted users access to the network.
A strong password, not saved anywhere on the machine, is essential for keeping those on the outside out and those that share the computer or network out of your accounts as well. If those that share the computer or network have access to your personal information, the risk of them disseminating this information, intentional or not, is much higher if they can access it. With the firewall and router installed, those trying to get in, in order to get information out are up against wall in either direction.
There are many configurations and quite a few other ways to make your machine more secure for online poker. Before making any permanent software or hardware changes, please talk with a professional about those changes to make sure you understand the effects of any of these changes. We cannot be held responsible for any mistakes made to your computer system.
*Disclaimer: The views and opinions expressed in this article are the author's alone. Rake Tracker and/or any of their affiliated companies do not endorse, assume any legal liability, or offer any warranty, implied or not, for any of the services or information found in this article.
Shannon Gilchrist is the lead editor of Rake Tracker, a site dedicated to online poker rake tracking and rakeback.
Today, securing your business' computer network is not an option as much as it is a necessity. This is an important process that needs to be handled with care and the proper planning and financial budgeting.
Many small businesses in particular lack the funds to employ a dedicated IT staff and buy the equipment needed to lock down the business computer network. However, security is crucial, and data breaches could end the business; there are threats that come from a number of sources like website breaches, downloads of illegal material and through wireless networks. These threats are a bit difficult to address given the limited resources available, but this guide should help you get a fair idea of what to do to secure your business computer network.
A major reason for security breaches are wireless networks. Wireless internet requires a broadband connection that is connected to a wireless router, which in turn broadcasts a signal into the air. Once this is done, any computer within the range can gain access to your network, which means that any hacker nearby has access to the information on the network or computer. This could be a major cause for concern unless your wireless network has been secured. A password is often not enough to ensure that your wireless network is secure, and steps must be taken to make your wireless business network completely secure. These measures include reducing the transmitting power of your router, keeping your SSID private and securing your router and your access point administration interface.
Before you begin to lock down on your business computer system, you will need to come up with an effective plan by which to build security in your business network. The first step is to come up with a checklist of items that you will need to take care of when you begin to secure your network. There are nine major checkpoints that you will have to make note of and constantly monitor when you are trying to secure your computer network. These include managing the core network and file server security, making backups, protecting remote laptops, securing internet connections and the web server, getting a VPN, wireless security, secure browsing, IM and email security and endpoint protection.
In order to begin a security routine, businesses should take further precautions that include limiting access to the office or building, and instituting a certain code of conduct with regards to passwords and virus protection.
Businesses can also use the security features that are in software applications and routers and implement a security policy to be followed by everyone in the company.
Ian works in the IT Industry and talks about ways to employ your own in-house IT team Computer Support Chippenham and Computer Support Bristol.