||Oracle Tips by Burleson
Chapter 9 - Self Protection on the Web
The story at the beginning of this chapter
describes a new hobby called war-driving. While this book is
written to help non-computer experts, the subject covered in this
chapter is a bit more technical. If there is a wireless network in
the house or the plan is to acquire one, press on even if the
subject is challenging. Each user owes it to himself or herself and
their safety to know what the danger is and how to protect
themselves and their loved ones.
When discussing wireless access, this chapter
is referring to the technology that is called 802.11. There are a
couple flavors of this technology currently available. 802.11b is
the older version and has a lower capacity and speed than 802.11g.
Besides the increased performance that is possible from 802.11g,
there are security enhancements that make it the better choice if a
user is buying or upgrading equipment.
There are other methods of wireless access,
including “air cards” that use the cellular phone networks to
provide Internet access. However, these methods will not be covered
in detail in this book.
Risks of Wireless Communications
Wireless technology brings convenience and
danger. Know what the risks are and protect against them.
One of the vulnerabilities that comes with the
use of wireless technology is the Service Set Identifier (SSID).
Simply stated, the SSID is the name of the wireless network. The
default or factory setting is a piece of information that is simple
for a hacker to acquire or guess. For example, WLAN, short for
Wireless LAN, is a common name that is easy to guess.
Download your Oracle scripts now:
definitive Oracle Script collection for every Oracle professional DBA