Is Free Wireless Access Safe?









This is frighteningly easy to do, by setting up a fake access point hackers can easily trap your user names and passwords without your knowledge. These hackers can also install a virus that will enable them to reconnect even when you are not on the free wireless anymore, even scarier.

What should you do? Here are some helpful tips on protecting yourself while on public wifi:

· Look for signs indicating the name of the free Wifi also known as the SSID and be sure to log onto that network, check the spelling verbatim, hackers will use a fake name that is similar.

· On Windows Vista and 7 be sure to choose "Public" as your network type this shuts down your file sharing and limits network access. On Windows XP be sure to turn off "file sharing".

· Windows XP will logon automatically so if you're not using the Internet turn off your wireless adapter, this will also save your battery life.

· Try to avoid going to Websites that require passwords like email and banking.

The best way to protect yourself is to create a secure link between your laptop and another computer, the other computer can be your home PC or any trusted server on the Internet which can be free or a pay service.

Using your home PC would be the safest and it's free but it requires a little more work. At home you will install a Secure Shell Server, this will accept a secure connection from your laptop a good "free for personal use" one is called WinSSHD, just download and install it and be sure to read the instructions. On your laptop you will install the connection software called Tunnelier this will create a secure connection between the two computers. If you have a router at home like most people do you will have to open port 22 and forward it to the PC that has WinSSHD running and you will need your home IP address so that you can tell Tunnelier where to connect to.

If you do not want to use your home PC or do not have one you can sign up for a free Secure Shell Server (SSH) access that offers tunneling or a pay SSH which is safer and more reliable. Once you find a SSH service you can use Tunnelier to connect to it which will create a secure connection also.

Now all you have to do is configure your browser to go through the secure connection and you are finished. All your Internet traffic in your browser is encrypted and the hackers will not be able to see anything you are doing. To keep this article short I skipped over the configuration details of WinSSHD, Tunnelier, Browser, and the router, all these are easily found on Google.









0 comments

  • Accounting Services There is more to accounting than filing income taxes. Proper use of accounting allows your business to create and use many useful tools to help your company grow and to understand how and where improvements can be made in your business to…
  • How to Make Money With Blogging Blogging can be one of the best jobs in the world if you're good at it - you can earn as much or as little money as you like, and you get to write about something that really interests you and that you are passionate about. If you have areas…
  • How to Monitor Accounts Receivable and Accounts Payable Home based business owners manage many tasks and accounting is one of them. Part of the cycle includes knowing how much money people owe you the products or services you provide. It also includes keeping a tally on the balances you owe to your…
  • Five Principles of Effective Communication The problem with communication is the illusion that it has occurred . George Bernard Shaw I'm sure this has happened to you: a college has just done the exact opposite of what you wanted him to do. How can that be, you ask yourself. I…
  • Tracing Cell Phone - Step by Step Method For Tracing Any Cell Phone If you need to trace cell phone to find out more information about the possessor of any cellphone number, you have to follow 3 simple steps to complete your search. Find The Right Kind Of Service First of all you have to find a good quality…