Call for Oracle support & training (800) 766-1884
Free Oracle Tips

Home
Corporate Oracle Training
Custom Oracle Training
Oracle New Features Training
Advanced Oracle DBA Classes
Oracle Tuning Courses
Oracle Tips & Tricks
Oracle Training Links
Oracle Training Links
Oracle Training Links

We are top for USA Oracle Training Clients

 

Free Oracle Tips


 
HTML Text AOL

Free Oracle App Server Tips


 
HTML Text

Oracle support

Oracle training

Oracle tuning

Rednecks!

Remote Oracle

Custom Oracle Training

 

   
  Oracle Tips by Burleson

Web Stalkers
Chapter 9 - Self Protection on the Web

Online Security Measures

The story at the beginning of this chapter describes a new hobby called war-driving.  While this book is written to help non-computer experts, the subject covered in this chapter is a bit more technical.  If there is a wireless network in the house or the plan is to acquire one, press on even if the subject is challenging.  Each user owes it to himself or herself and their safety to know what the danger is and how to protect themselves and their loved ones.

When discussing wireless access, this chapter is referring to the technology that is called 802.11.  There are a couple flavors of this technology currently available.  802.11b is the older version and has a lower capacity and speed than 802.11g.  Besides the increased performance that is possible from 802.11g, there are security enhancements that make it the better choice if a user is buying or upgrading equipment.

There are other methods of wireless access, including “air cards” that use the cellular phone networks to provide Internet access.  However, these methods will not be covered in detail in this book.

Risks of Wireless Communications

Wireless technology brings convenience and danger.  Know what the risks are and protect against them.

One of the vulnerabilities that comes with the use of wireless technology is the Service Set Identifier (SSID).  Simply stated, the SSID is the name of the wireless network.  The default or factory setting is a piece of information that is simple for a hacker to acquire or guess.  For example, WLAN, short for Wireless LAN, is a common name that is easy to guess.


The above text is an excerpt from:

Web Stalkers
Protect yourself from Internet Criminals & Psychopaths
ISBN 0-97-45993-9-5

by Donald K. Burleson, Stephen Andert
 

http://www.rampant-books.com/book_2004_2_stalkers.htm


Download your Oracle scripts now:

www.oracle-script.com

The definitive Oracle Script collection for every Oracle professional DBA

 
 
 

Oracle performance tuning book

 

 

Oracle performance tuning software

 
Oracle performance tuning software
 
Oracle performance Tuning 10g reference poster
 
Oracle training in Linux commands
 
Oracle training Excel
 
 
 
 

 

email BC:


Copyright © 1996 -  2014 by Burleson Inc. All rights reserved.

Oracle® is the registered trademark of Oracle Corporation.