Call for Oracle support & training (800) 766-1884
Free Oracle Tips

Home
Corporate Oracle Training
Custom Oracle Training
Oracle New Features Training
Advanced Oracle DBA Classes
Oracle Tuning Courses
Oracle Tips & Tricks
Oracle Training Links
Oracle Training Links
Oracle Training Links

We are top for USA Oracle Training Clients

 

Free Oracle Tips


 
HTML Text AOL

Free Oracle App Server Tips


 
HTML Text

Oracle support

Oracle training

Oracle tuning

Rednecks!

Remote Oracle

Custom Oracle Training

 

   
  Oracle Tips by Burleson

Web Stalkers
Chapter 8 -
Identity Theft

War-Driving and Identity Theft

If one wants to make their WLAN SSID include their name, the person war-driving through the neighborhood can easily use a phone book and find the individualís house as well as steal their wireless network.  This SSID is also one of the pieces of information that is usually broadcast by a wireless network system.  Some configuration utilities will let users configure the wireless router to not broadcast the name.

Another setting that can be overlooked is encryption.  By default, many times encryption is disabled, which means that any communication between that computer and the wireless access point can be sniffed by anyone within range of the system.  Additionally, anyone close enough to the wireless system is capable of using that individualís Internet connection to cause trouble.  This could land the victim in a heap of trouble when a crime is investigated and the evidence points to that individualís system. 

Figure 8.3 - Wireless Encryption Settings

 

Figure 8.3 above shows a configuration screen where the encryption setting is made.  This example shows that for this system, the choices are: Disabled; 64 bits; and 128 bits.  Disabled offers no protection against hackers, 64 bits provides medium protection and 128 bits is the highest level of protection. 

There is, however, a performance impact involved with higher levels of protection.  This is because encryption requires the computer do a bit of additional work to code the transmissions before sending them over the network.  This performance impact is generally fairly minor, but if performance is critical, one may prefer to use physical network cables or a lower level of encryption.


The above text is an excerpt from:

Web Stalkers
Protect yourself from Internet Criminals & Psychopaths
ISBN 0-97-45993-9-5

by Donald K. Burleson, Stephen Andert
 

http://www.rampant-books.com/book_2004_2_stalkers.htm


Download your Oracle scripts now:

www.oracle-script.com

The definitive Oracle Script collection for every Oracle professional DBA

 
 
 

Oracle performance tuning book

 

 

Oracle performance tuning software

 
Oracle performance tuning software
 
Oracle performance Tuning 10g reference poster
 
Oracle training in Linux commands
 
Oracle training Excel
 
 
 
 

 

email BC:


Copyright © 1996 -  2014 by Burleson Inc. All rights reserved.

Oracleģ is the registered trademark of Oracle Corporation.