Call for Oracle support & training (800) 766-1884
Free Oracle Tips

Corporate Oracle Training
Custom Oracle Training
Oracle New Features Training
Advanced Oracle DBA Classes
Oracle Tuning Courses
Oracle Tips & Tricks
Oracle Training Links
Oracle Training Links
Oracle Training Links

We are top for USA Oracle Training Clients


Free Oracle Tips


Free Oracle App Server Tips


Oracle support

Oracle training

Oracle tuning


Remote Oracle

Custom Oracle Training


  Oracle Tips by Burleson

Web Stalkers
Chapter 8 -
Identity Theft

War-Driving and Identity Theft

In spite of these warnings, many wireless networks are left without encryption.  These are the targets of the hacker who is war-driving and the less encryption they find, the happier they are.  There are also some operating system settings that make an unsecured wireless network even more dangerous.  If properly configured, file and print sharing can let all of the computers in a house share printers and files.  If not properly configured, it can give anyone access to all the files with no control or security. 

If neither the operating system nor the wireless network is set up in a secure manner, the system is vulnerable to be compromised by any criminal who drives past the house.  Police and insurance companies have long said that a determined thief can steal any car, regardless of anti-theft devices and alarms present.  Nonetheless, a good reason for using these devices is to encourage the less-determined thief to pick an easier target.  Similarly, even with encryption enabled, there are programs that will allow a hacker to monitor the encrypted traffic on a network and quickly determine the encryption key.  However, the savvy user can make it more trouble than it is worth.  This will be covered in more detail in a later chapter.

Preventing Identity Theft

The saying, “An ounce of prevention is better than a pound of cure” certainly holds true in the case of identity theft.  Many of the recommendations below are free or low-cost and are certainly less stressful than dealing with a case of identity theft:

  • Shred documents with personal information before putting them into the trash.  This includes credit card offers received in the mail and even some of the reply envelopes that have personal information on them.  This will deter the identity thief from easily obtaining information about someone from their trash.

The above text is an excerpt from:

Web Stalkers
Protect yourself from Internet Criminals & Psychopaths
ISBN 0-97-45993-9-5

by Donald K. Burleson, Stephen Andert

Download your Oracle scripts now:

The definitive Oracle Script collection for every Oracle professional DBA


Oracle performance tuning book



Oracle performance tuning software

Oracle performance tuning software
Oracle performance Tuning 10g reference poster
Oracle training in Linux commands
Oracle training Excel


email BC:

Copyright © 1996 -  2014 by Burleson Inc. All rights reserved.

Oracle® is the registered trademark of Oracle Corporation.