blue_bna-ga:
Thanks for your question!
I am going to answer your question using a combination of my own
personal knowledge, as well as some references to general information
you can view online.
As you may have already heard from other sources, way too many people
buy wireless routers and adapters at their local big-box electronics
store, bring it home or to the office, plug it in, and never change
the configuration from the default, un-secured settings. This is
analogous to leaving the front door of your house unlocked and
standing wide open.
In your case, you have set up a basic WEP key to keep the casual
visitor out. This is analogous to locking your doors and windows.
Enough to keep out accidental intrusions and amateur hackers, but not
enough to keep out anyone who has both the desire and the skill to get
past the basic protection of a WEP key, in order to get into your
network. That said, in much the same way that the vast majority of
home-owners can feel safe enough by just locking their doors and
windows, the vast majority of PC and network owners can feel safe
using just a WEP key... there are many targets out there that are a
lot easier than your WEP key-protected system.
So, what happens when you want to take advantage of a public hotspot,
which does not use a WEP key? Well, to continue abusing the analogy,
think of a hotspot as a boarding house. If you were sharing a house
with a bunch of strangers, you most likely would want to have a lock
on your room door, to keep others from looking inside even if they can
freely roam throughout the rest of the house. The computer equivalent
of this lock on your room door would be a good software firewall
program. Now, Microsoft has included a basic firewall with Windows XP,
called the Internet Connection Firewall. In spite of the criticism
that they have received over the inadequate protection that the ICF
provides using its default settings, it is still better than not
having a firewall at all. If you have Windows XP, you can read more
about setting up the Internet Connection Firewall here:
Microsoft: Use the Internet Connection Firewall
http://www.microsoft.com/windowsxp/using/networking/learnmore/icf.mspx
You can also try a 'better' firewall by using third-party software. My
personal favorite is Zone Alarm, which has a free version available.
However, in their current release (version 5.x), there have been some
compatibility issues reported (especially with XP Home users). So, be
aware of this in case you run into problems after installing it; if
you find that your computer freezes or hangs, best to uninstall ZOne
Alarm and try another program.
Zone Alarm Free Version
http://www.zonelabs.com/store/content/catalog/products/sku_list_za.jsp
- when installing, read everything carefully as the installer will
want to install the trial version of Zone Alarm Pro (paid version)
instead of the basic Zone Alarm Free Version; while I would definitely
encourage you to consider buying the paid version should you find Zone
Alarm to your liking, I suggest you start with the free version first.
Other free firewalls include:
Sygate Personal Firewall
http://smb.sygate.com/products/spf_standard.htm
Agnitum Outpost Firewall
http://www.agnitum.com/download/outpost1.html
Kerio Personal Firewall 4
http://www.kerio.com/kpf_download.html
Regardless of which firewall you use, that is simply one layer of
protection that you should add. It's like having multiple locks and
chains on your house doors. So, additional layers you should add
include:
Pop-up Ad Blocker:
For blocking pop-up ads, there are several approaches. Some firewalls,
such as the paid version of Zone Alarm, include pop-up blocking. Some
web browsers also include pop-up blocking as an integrated feature. If
you are using Internet Explorer on a Windows machine, then the
simplest and easiest tool to block pop-ups with is the Google Toolbar:
http://toolbar.google.com/
Anti-virus Software:
If you do somehow get attacked, it will most likely be by a virus in
the form of a worm or trojan. The most readily protection for this is
to use a good anti-virus program, and to regularly update its virus
signature database. The usual programs that you will find in the
stores include products from Symantec (Norton Antivirus) and Network
Associates (McAfee Antivirus). If you are interested in a free
solution, then I suggest you check out:
AVG Free Version
http://www.grisoft.com/us/us_dwnl_free.php
Anti-spyware Applications:
Finally, one of the more annoying scourges of the Internet today is
spyware. To provide yourself with some protection against the more
common spyware, you should download and use the following:
Ad-Aware Free Version
http://www.lavasoft.de/software/adaware/
SpyBot Search & Destroy
http://www.safer-networking.org/index.php?page=mirrors
Spyware Blaster
http://www.javacoolsoftware.com/spywareblaster.html
The first two, Ad-aware and SpyBot Search & Destroy, will search your
system for any existing spyware and safely remove them (at least, the
known ones). The third, Spyware Blaster, will help guard against the
entry of any known spyware.
You also asked whether your data transmissions are freely
interceptable when you use a non-WEP-encrypted hotspot. Technically,
yes, they are. However, while tools to do this can be found online, it
is not as simple as, for example, picking up a telephone extension to
listen in on a conversation. If you are very concerned about this,
though, then you may want to consider subscribing to a VPN (virtual
private network) service that will allow you to encrypt your data no
matter whether you are using WEP or not for the wireless
transmissions. Normally, a VPN is set up by a company or organization
that can afford the necessary hardware and bandwidth to handle the
load. With a VPN, all traffic from all users must first go to the VPN
server (as encrypted traffic) before it then goes on to its final
destination. There are, however, some businesses that have been
offering VPN services as a subscription service for private
individuals such as yourself. These businesses include:
Boingo Wireless
http://www.boingo.com/whatisboingo.html
- "Personal VPN Service" embedded in their Boingo Wireless client software
HotSpotVPN
http://www.hotspotvpn.com/
For more information on wireless security, and the risks that you may
face (although I do advise taking it all with a grain of salt), pay a
visit to:
http://www.practicallynetworked.com/security/
I hope that this helps you!
aht-ga
Google Answers Researcher |