Senin, 09 November 2009

Protection Wi-Fi, Danger if not wearing protective

WiFi

Call it Sigit. Single young professionals who also is experiencing problems with smart phones. One time, he discovered a nesting vrus Locknut on his mobile. In addition, he was also a little surprised when the data changes. there seems to be people who lead by cell phone while he was working on one hundred percent sure never to lend his cell phone to someone else. He also never turn his bluetooth connection, Usut have investigate, he mengakaui that Wi-Fi to send an e-mail when you hang out at the cafe.

Like in a public toilet, we will interact with many people even though we have felt in the private room alone. Similarly, the term hotspot. There, we were like being melakuakn private communication. However, unconsciously, we went on as public roads which are also used by many people. The more widespread the hotspots that provide guidance is due to the communication needs of increasingly mobile people. Not limited using a laptop or peronal Digital Assistant (PDA), mobile Internet access using Wi-Fi networks also have enjoyed the plural in using mobile phones.

The wireless connection is not without danger. Internet access at hotspots using uumum very vulnerable to interference and interruption that comes from outside. In addition, we are also vulnerable to attacks by hackers, viruses, spyware, spam AAU thousands. Not only prankster who wants to interrupt the interests of others. Now, more and more malicious intentions who want to take advantage of these open facilities. It was included Cybercriem password attack, keyloger, and which is now increasingly widespread, phishing. With the entry in the Wi-Fi network, the crime is increasingly finding fertile ground for the security system, namely Wireless Encryption Protocol (WEP), are relatively easy public so broken.

Not Enough WEP

Conventional security systems that mengadalkan WEP dirasakantidak mencukup again. These security systems have often conceded semakain. The cyber criminals or cacker can learn how the Internet simply and then break the encryption system. encryption system needs a more sophisticated and can be applied for any device that uses Wi-Fi.

Mincullah Wi-Fi Protected Accsess (WPA). Encryption-based security system has been memingkinkan using dynamic keys and is compatible with the user's username or password hotspot. Besides the evolution of development or 802.11i delivery Whoa often referred to as WPA version 2 (WPA 2). Excess WPA is increased such data encryption technique with a temporal KEY Integrety Protocol (TKIP). This technique can randomize the keywords they used, so difficult in the track.

WAP also has shortcomings

Agus opinion Parcoyo launch, a security consultant PT. Indokom Primanusa, security systems that rely on this WAP still has a weakness. First, WPA only security solution provides the wireless network data path and does not provide protection to the security system of each device used in these hotspots. Second, WPA-and WPA2-only offer protection when using a hotspot on the spot. When out of the hotspots are and go on other networks, WPA does not work anymore. In essence, protection with limited encryption protection systems on the network and does not provide protection for each device - in this discussion, the phone. many who have attacked vrus phone with Wi-Fi intermediaries. Viruses include Cabir, Win CE, Duts, Qdial, Skulls, Velasco, LOcknut, Comwar, and so on. Not only attacking your data, the virus will also hinder the performance of your phone.

Of course, now the important thing is to instill awareness of secure data communication. In addition, complete the personal equipment you view the programs that can protect themselves with programs such as Wi-Fi protection, Spyware protection, data privacy, proactive, anti-spam alerts, personal firewall, and security virus updates always been good.

some tips on safe use WI-Fi Failitas
1. Always protect folders or other data with a password.
2. choose a gadget that has a variety of protection. if you need to install, install a comprehensive protection program as you install the antivirus program.
3. Always activate the firewall system to prevent the remote accsess.
4. Do not expose to share documents that you think is important and vital. If forced to, keep the password so that only you and a few concerned colleagues who know.
5. deadly habit WI-Fi devices in public areas when not in use.

0 komentar:

Posting Komentar