Wi-Fi Hotspot Security


You've set up your Boingo account, you're hanging out at the Home Turf sports bar in LAX and you figure you'll do a little business or check your e-mail while sipping a Chardonnay. Well, that's the point of Wi-Fi hotspots; being able to take care of a few things while in a relaxing atmosphere.

Don't, however, get so relaxed that you ignore security and give all your confidential information to some unscrupulous hacker. Yeah, you see the guy. He's over in the corner wearing that fake nose and glasses with the ridiculous Bozo the Clown cap. Yep, drinking a Blatz. Dead give away.

Sorry, they won't be that obvious, I doubt they ever drink Blatz and very seldom wear clown caps. When you're thinking back, trying to remember who was around when your password was stolen, you probably won't remember the woman in the tastefully tailored business suit, and if, by chance, you do, she won't be the one you suspect. The best defense is to implement some simple security practices and measures that will safeguard your business and personal information.

Hot Spot Security: Simple Stuff

Be aware of those around you.

When you're considering Wi-Fi security in public places one of the first safeguards is anything but high tech. Remember a few years ago when people were getting huge phone bills because someone was watching as they keyed in pass codes? It's still happening to Wi-Fi network subscribers. Do what you can to keep prying eyes from your keyboard and screen. You pay good money for your monthly subscription and there's no reason to let anyone piggyback or steal your credit card number as you sign up for a daily use fee at Starbucks.

Speaking of passwords:

Those of us who toil and travel are prime targets for those who may be of the persuasion to purloin. In other words, it's quite possible to be targeted for laptop theft. Use a complex password to protect your files, folders and laptop from access by those villains of concourse and lobby.

Don't Share!

Yes, I know, mothers have been telling us to share for centuries but, at least while using a Wi-Fi hotspot, make sure you disable file sharing. It might be great for the home and good at the office but it's disaster in the making at your favorite coffee house.

Use a Personal Firewall.

If you're using a corporate laptop make sure you talk to your IT department before you install any firewalls but if the laptop you're using is your own let me suggest downloading a copy of ZoneAlarm. There are others of course but, for personal use, since ZoneAlarm is free and seems to test better than the rest I can't see a reason to recommend another.

Most of the reasons for using a firewall should be self-evident but, to say the least, you'll want to be made aware of any traffic coming or going and any unusual communication between applications.

Hot Spot Security: Less Simple Stuff

Beware the Evil Twin

Otherwise known as 'Rogue Hotspots' or the 'soft AP attack' this Wi-Fi version of the e-mail Phishing scam is perpetrated by hackers who jam and mimic the signal and SSID of a legitimate hotspot. They then serve up a sign-in page garnering usernames, passwords and, in some cases, credit card numbers. If they go so far as to allow a connection to the Internet they're then in the position to intercept unencrypted traffic as well as any files open to sharing (Don't Share!).

There are a few things you can do to protect yourself from 'Evil Twins':

  • Don't set your Wi-Fi card to allow automatic connection to any available network.

  • Check the list of available SSIDs to make sure you're connecting to the right one.

  • Turn off the ad-hoc mode allowing other clients to connect directly to you.

  • Turn off your Wi-Fi card entirely as soon as you're finished.

  • Use the personal or enterprise version of 'AirDefense', whichever may be appropriate.

  • Although a firewall won't keep you from connecting to an 'Evil Twin' it will help to safeguard your information should you inadvertently fall victim.

Encrypt Confidential Information

Data that's transmitted between yourself and a secure Web site can be counted on to be safe from the Starbucks Snidely Whiplash so when you're purchasing goods, or banking on-line, you can do so without fear. When you're logging onto the secure portion of the site, however, you may be doing so without the protection of security so be careful to note whether or not the sign in page is secured (https).

When sending e-mail there are a few things you can do to safeguard yourself. For example, instead of using Outlook or Thunderbird, take advantage of your ISP's Web interface which, in most cases, will be secure and should protect your data during transmission.

If you frequently encounter the need to send large files via e-mail then using a compression program will meet your need to reduce the size of the file and most compression programs will also secure the data with encryption.

Another option is to use a free encryption program like Cryptainer LE. Cryptainer LE can encrypt any or all the files stored on your hard drive, protecting them in case your laptop is stolen or compromised, as well as allow you to e-mail them with the security of encryption. Cryptainer PE is also offered for enterprise applications.

Use a Virtual Private Network

Think of a virtual private network (VPN) as a solid conduit, or tunnel, between your laptop and your company's network. By using a VPN your communications will be as secure as they would be if you were sitting at your desk.

Mac OS X?, Windows? 2000 and Windows? XP have built in VPN clients and if you're a user of Windows? 98, ME or NT you can download the free Microsoft® L2TP/IPSec VPN Client from Microsoft®. If you're a Linux user you can download the free S/WAN VPN client.

While the use of a VPN is one of the best ways to protect your confidential data when you're using a Wi-Fi hotspot it is, unfortunately, limited to communication between your laptop and your company's server. If you want to conduct personal business with similar security levels the best solution may be the award winning GoToMyPC software.

Use Anti-Virus Software

It's somewhat surprising that so many people are aware of the dangers of 'net borne viruses and, yet, so many either fail to incorporate anti-virus programs like McAfee & Norton or fail to keep them up to date. When you're using a public hotspot it's more important than ever to have anti virus software installed.

Once you've got the software up and running make sure that it's updated on a regular basis and update it anytime you hear about a new virus or a new version of an old virus. If you've got an auto-update feature built into your program make sure you take advantage of it.

Conclusion

By following these security measures you should be able to enjoy, with the confidence that your private information will remain private, your favorite Wi-Fi hotspots around the world.

Phil Haley is a technical writer and the editor of Refurbished Laptop Computer Info. For more information regarding buying, maintaining, upgrading or enjoying a laptop computer visit Refurbished Laptop Computer Info where you'll also find the complete Great Wi-Fi Guide.

More Resources

Unable to open RSS Feed $XMLfilename with error HTTP ERROR: 404, exiting

More Broadband Internet Information:

Related Articles

A Cheap Alternative To Broadband?
Are you a dial-up user looking for a faster connection,but don't like Broadband prices? If so, you should take a look at a new service called OnSpeed, which has received rave reviews in Internet technology publications.What OnSpeed does is to re-route web pages and email viaits own servers, compressing the data on the fly prior to sending it onwards to your PC.
Ka Band -Affordable Satellite Internet On The Way!
Ka Band VSAT* satellite internet technology has enormous possibilities for telecommuters, rural locations and eventually for Motor Home users around the U.S.
ICMP Protocol - Internet Control Message Protocol
The Internet Control Message Protocol communicates errors messages between systems that require attention. This error is not usually at the user level, the error is handled by the application layer.
Wireless Network Hammerin
The wireless network in my house went haywire. It worked on three PCs, one had a horrible connection, and one can't connect.
Beta Testing First Mobile Internet Satellite Broadband, Part I
Being on the road has its advantages; the freedom is the biggest one. One draw back was the Internet Service, but having done much study on the mobile Internet Satellite Systems and future technologies; I was able to become a beta tester of the MotoSat system in 1999.
Whois Protocol - TCP/IP Suite
The Whois protocol is an information service not unlike the finger service. The Whois protocol provides the client or user with information about the owner of a domain or specific IP address.
What is Broadband?
Defining broadband can get complicatedThere are many different takes on how to actually define the word: broadband. The first and most obvious way to define it is a transmission medium that allows for multiple pathways and types of data, far exceeding simple voice communication devices.
How to Secure your DSl / Cable Internet Connection Against Malicious Attacks
Securing your Windows Xp computer is done by achieving two main tasks.The first, is to prevent unauthorized users sitting at your computer and logging in through your keyboard.
Broadband - Will it Affect Your Online Marketing Future?
The coming age of general Broadband use bearing down uponus, minute by minute, is going to leave many changes in its wake. Some will be welcome; others will demand all we can do, just to keep up!Of course, items like high quality graphics, streaming videoand movies on demand will be commonplace.
Wifi Hotspot Locations for Sale..is that a Good Thing?
Recent companies have been advertising wifi hotspot locations that are 'turnkey' (they can run themselves), and only cost between $13,000 and $20,000 to start. Is that good?First of all, if it's so turnkey then why aren't they just popping off wifi hotspot locations left and right for themselves, is it their newfound generosity that has them 'sharing' the opportunities they have available.
Chat-less
Are you suddenly chat-less now that Yahoo has shut down many chat sites, due to complaints? One complaint was that people where using chat rooms to lure under age kids for sex. While others say the chat rooms were used to promote underage sex.
Wanadoo: 17.99 Pounds 1Mbps Service
Wanadoo 17.99 pounds 1 mbps service getting good reviews.
3G EV-DO or How the Internet Got Its Wings!
The Internet, as most people know it, is history.It just seems like yesterday the Internet was just onebig mass of wires and cables; a glorified file sharing warehouse with more than a few too many lines sticking out.
BT Broadband
Approximately 4 million people in the UK use ADSL with an extra 2 million using a cable connection, meaning 6 million people in the UK have an always-on internet connection. Of these over 1.
Unlimited Bandwidth and Overselling
One of the most controversial topics surrounding web hosting is the practice of overselling bandwidth, and rightfully so. The practice of overselling has enormous potential for disaster - ask any webmaster who has ever woken up to a cold, unforgiving "Bandwidth Exceeded" message where his or her site should be.
Its On! (Free Internet TV - Watch TV Online)
Get ready because "there's going to be television out the wazoo!" This according to Jonathan Klein, the president of CNN - U.S.
How Peer to Peer (P2P) Works
Peer to Peer (P2P) Technology- How it works:Ever wondered how P2P works? This guide will run down most of the major P2P services and how they work. Peer to Peer technology lets people share files over a network on the internet.
Finger Protocol - TCP/IP Suite
The "finger" protocol is used to return information on users on a specific host. Information that can be gained by using the finger is to see if someone is actively logged on to a server, or find a valid username.
Broadband
Broadband is the name given to a high-speed Internet connection that provide large bandwidth. It is a quick connection, typically "always-on" and capable of transmitting data at a much faster rate than a standard dialup modem connection.
Mind Machine Interfacing
SQUID:In 1984 I was partnered with a Cable TV engineer and founding father by the name of Ray Osborne. He was working with people developing oscillating noise loop broadband technologies.