Saturday 21 June 2014

What is Wireless Network Security. Learn The Basics

Keep your wireless network safe from prying eyes at all times

Hackers are becoming more and more sophisticated each day and making use of some of the most thought-bred effective tools that guarantee complete attack and kill! While everyone can't be a tech-buff so as to know all about protecting yourself, there are some basics that you should know so you don't end up in trouble anytime soon.

Basic Terminology

1.Service Set Identifier (SSID)

Case sensitive, 32 alphanumeric character unique identifier attached to the header of packets sent over a wireless local-area network (WLAN) that acts as a password when a mobile device tries to connect to the basic service set (BSS); a component of the IEEE 802.11 WLAN architecture.

2.Wireless Access Point (WAP)
A wireless Access Point (AP) is a device that allows wireless devices to connect to a wired network using Wi-Fi, or related standards. The AP usually connects to a router (via a wired network) as a standalone device, but it can also be an integral component of the router itself.

3.Basic Service Set Identifier (BSSID)
A unique 48 bit key that forms the MAC address of WAP or wireless router.

4.Beacon frame
One of the management frames in IEEE 802.11 based WLANs that contains all the information about the network. Beacon frames are transmitted periodically to announce the presence of a Wireless LAN. Beacon frames are transmitted by the Access Point (AP) in an infrastructure BSS. In IBSS network beacon generation is distributed among the stations.

5.Wireless Equivalent Privacy (WEP)
An encryption scheme used to encrypt the WiFi data streams comprising of an encryption key and Initialisation Vector (IV). It uses a 64bit or 128bit key.

Securing Your Wireless Network


1.MAC filtering
MAC Filtering refers to a security access control method whereby the 48-bit address assigned to each network card is used to determine access to the network. MAC addresses are uniquely assigned to each card, so using MAC filtering on a network permits and denies network access to specific devices through the use of blacklists and whitelists.

2.Hiding SSID
Wireless devices can only connect to WAP via a known SSID. Therefore it's ideal you hide SSID. 

3.Encryption Keys
WEP is easily cracked within minutes even by the most mediocre of hackers out there. Those of you who were under the contention that WEP was really safe, well, think again! It is high time that you set your wireless routers up and change your wireless encryption from WEP to WPA2 security which is new and much stronger. 

4.Intrusion detection system
Intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station. IDS come in a variety of “flavors” and approach the goal of detecting suspicious traffic in different ways.


Best Online Data Backup & Synchronization Tools

Hard disks and flash drives are passe. This is the era of the cloud. Make full use of it.

Hard disks and flash drives are passe. This is the era of the cloud. Make full use of it! 

We live in the era of cloud technology and big data to say the least is the increasing talk of the town. Backing up your crucial files online is the way to go today with both the average user as well as bigger organisations making full use of technology. Here are 10 online data backup and synchronisation tools for you. 

1.CX.com
The CX storage infrastructure is designed to run from any datacenter and storage environment. CX uses the Amazon Simple Storage Service (S3) due to its carefully engineered design that meets our requirements for scalability, durability, speed, low-cost, and simplicity.

2.MyPC Backup
MyPCBackup takes the security and privacy of your data very seriously. All your files are encrypted with the same security as banks use.

3.iDrive
Online backup for unlimited PCs, Macs, iPhones, iPads, Android devices and Facebook pictures into a single account.

4.CloudMe
CloudMe is a free and open service to store and make all your files available in the cloud through an easy to use Blue Folder.

5.SugarSync
SugarSync's cloud storage works in the background so your most important data is always backed up online and available to you รข€” regardless of your location or the computer you are using. 

6.Syncplicity
Syncplicity is an enterprise-grade online file sharing and mobile collaboration solution. Backed by EMC, it provides users with an experience they love and gives IT the security and control it needs.

7.Duplicati
Duplicati is a free backup client that securely stores encrypted, incremental, compressed backups on cloud storage services and remote file servers. 

8.BuddyBackup
BuddyBackup gives you unlimited online backups of your files for free, by allowing you to easily and securely backup your data onto your buddies.

9.CrashPlan
Only CrashPlan offers totally free local and offsite backup. A subscription to our cloud backup service gets you continuous backup, mobile file access and lots more. 

10.Comodo Backup
You can try 10 GB of highly secure, online storage which you can access from anywhere and sync between computers.



How to Dual-Booting With Windows 8 And Linux

Here are six ways to set up multi-booting with Windows 8 and Linux:

1. Install the Linux GRUB bootloader
-Install the Linux GRUB bootloader as the default boot object.

-The catch here is you need to have a UEFI-compatible Linux distribution (openSuSE, Fedora, Linux Mint and Ubuntu).

-When you install a UEFI-compatible Linux distribution and everything works well, you will get the GRUB boot menu after a reboot. You can then choose either Linux or Windows 8 to boot from it. 

2. Use the BIOS Boot Select Key
-There's a possibility that doing everything of the above still gets you nowhere, and you're still getting Windows rather than Linux after reboot.

-In that case you can use the BIOS Boot Selection option (activated by pressing a special key that varies between systems during the power-on or reboot process.) 

-Pressing the special key will interrupt the Windows boot process and you will get a list of available operating systems (Windows 8 and Linux).

3. Enable 'Legacy Boot'
-Some systems make it difficult to enable Legacy Boot. The option might be well hidden in the BIOS configuration, or require a BIOS password before they will let you change it. 

-Legacy Boot allows you to install more or less any Linux distribution, without worrying about UEFI compatbility.

4. Try a workaround
-There is a "next boot" option available, which specifices a one time boot configuration. 

-If it is set the system will try to boot that item first, and will also clear that setting so that on the next boot it goes back to using the default boot sequence list. 

-The next boot configuration can be set from Linux using efibootmgr -n XXXX, where XXXX is the item number from the boot list.

-Add the efibootmgr command to the Linux startup scripts. Every time you boot Linux, it would reset the value so that it would boot Linux again the following time.

5. Trick the default boot process
-Put the Linux shim.efi (or grubx64.efi) image where the Windows Boot Manager is normally located. This is a cleaver trick to trick the default boot process. 

6. Install a different Boot Manager 
-rEFInd has the advantage of being able to boot almost anything - Windows, Linux, MacOS. It automatically finds whatever might be on the disk and then presents you with a boot selection list. 

Source: ZDNet