Call for Oracle support & training (800) 766-1884
Free Oracle Tips

Corporate Oracle Training
Custom Oracle Training
Oracle New Features Training
Advanced Oracle DBA Classes
Oracle Tuning Courses
Oracle Tips & Tricks
Oracle Training Links
Oracle Training Links
Oracle Training Links

We are top for USA Oracle Training Clients


Free Oracle Tips


Free Oracle App Server Tips


Oracle support

Oracle training

Oracle tuning


Remote Oracle

Custom Oracle Training


  Oracle Tips by Burleson

Web Stalkers
Chapter 8 -
Identity Theft

War-Driving and Identity Theft

If one wants to make their WLAN SSID include their name, the person war-driving through the neighborhood can easily use a phone book and find the individualís house as well as steal their wireless network.  This SSID is also one of the pieces of information that is usually broadcast by a wireless network system.  Some configuration utilities will let users configure the wireless router to not broadcast the name.

Another setting that can be overlooked is encryption.  By default, many times encryption is disabled, which means that any communication between that computer and the wireless access point can be sniffed by anyone within range of the system.  Additionally, anyone close enough to the wireless system is capable of using that individualís Internet connection to cause trouble.  This could land the victim in a heap of trouble when a crime is investigated and the evidence points to that individualís system. 

Figure 8.3 - Wireless Encryption Settings


Figure 8.3 above shows a configuration screen where the encryption setting is made.  This example shows that for this system, the choices are: Disabled; 64 bits; and 128 bits.  Disabled offers no protection against hackers, 64 bits provides medium protection and 128 bits is the highest level of protection. 

There is, however, a performance impact involved with higher levels of protection.  This is because encryption requires the computer do a bit of additional work to code the transmissions before sending them over the network.  This performance impact is generally fairly minor, but if performance is critical, one may prefer to use physical network cables or a lower level of encryption.

The above text is an excerpt from:

Web Stalkers
Protect yourself from Internet Criminals & Psychopaths
ISBN 0-97-45993-9-5

by Donald K. Burleson, Stephen Andert

Download your Oracle scripts now:

The definitive Oracle Script collection for every Oracle professional DBA


Oracle performance tuning book



Oracle performance tuning software

Oracle performance tuning software
Oracle performance Tuning 10g reference poster
Oracle training in Linux commands
Oracle training Excel


email BC:

Copyright © 1996 -  2014 by Burleson Inc. All rights reserved.

Oracleģ is the registered trademark of Oracle Corporation.