Protect Yourself from Online Fraud

By Wi-Fi Planet Staff

March 25, 2008

What's the perfect gift for Global Consumer Fraud Protection Month? Information, of course. We’ve pulled together ten of our best security-related tutorials to help you defend yourself and your business against hackers and other forms of attack.

In honor of the third annual Global Consumer Fraud Protection Month (March), we’ve assembled ten of our most useful tutorials that can help you protect yourself and your business from online attacks:

A Tale of Two Passwords
[March 5, 2008] Learn the secrets to savvy password creation.

Ask The Wi-Fi Guru
March 4, 2008] In this new monthly column, Aaron Weiss, our resident Wi-Fi Guru, will answer your burning questions about small-scale Wi-Fi deployments. In this episode, he covers bridging robots, hotspot sharing, and DD-WRT repeaters.

Spot Malware on Your Windows Hosts with netstat
[February 11, 2008] netstat gives you some of the tools you need to spot and eliminate any malicious software listening for network connections on your Windows hosts.

FreeRADIUS and Linux for Your WLAN
[February 5, 2008] Best of ENP: Part Two—RADIUS and Linux can be a potent combination for WLAN security. Here's how to get it configured.

Hotspot Safety for Business Users
[February 1, 2008] The only reliable way for employers to manage the associated risk for mobile workers is to define, monitor, and enforce hotspot acceptable use policies. Here, we show you how.

When ‘Free Public Wi-Fi' Is Bad
[January 21, 2008] Just as you shouldn't accept a package from a stranger before boarding a plane, you shouldn't accept "free public Wi-Fi"--at least not without protecting yourself first.

Secure Your WLAN with Aircrack-ng
[December 27, 2007] Rogue access points and weak passwords are the bane of any network administrator's life: all it takes is one user setting up a consumer-grade wireless router in the cube farm so he or she can use a PDA or whatever and you've got yourself a potentially serious security risk.

Wi-FiPlanet Guide to WPA
[December 13, 2007] To help you gain a better understanding of what WPA is, how it works, and why you should be using it, we've gathered together our best tutorials on the subject.

The Caffe Latte Attack: How it Works—and How to Block It
[December 12, 2007] By exploiting driver flaws, exposed fileshares, and user mistakes, one can easily and invisibly attack Wi-Fi laptops and phones in public venues like airplanes, hotels, and cafes. We show you how to protect yourself.

Getting Phished: Why SSID Spoofing (Still) Matters
[January 29, 2007] Phony access points (APs) that use spoofed service set identifiers (SSIDs) to lure wireless users are nothing new. Also called evil twin or honeypot rogue APs, these look-alikes have grown common in venues frequented by business executives, including airports and hotels. We show you how to guard against them.



Comment and Contribute
(Maximum characters: 1200). You have
characters left.