Wi-Fi word of caution
Apr 24, 2011 21:46:04 GMT
Post by CharlieChomper on Apr 24, 2011 21:46:04 GMT
For many people out there, wireless (wi-fi) may offer a great convenience to them--it also may appear somewhat intimidating to set up properly (much less try and secure it--with wireless, there really is no such thing as "secure", however) or people might not think to password-protect it.
Then every so often articles like this appear in the news (albeit, I've rarely seen them in the mainstream news--usually only the tech/techie news) as a reminder about some of the issues with wireless.
The gist of the article actually covers two main issues--the first being why it's important to password protect a router running wireless (although, I did notice it left out the part about how all major encryption schemes for it have been broken--WEP historically is the weakest as it's about as effective as a "keep off the grass" sign in keeping someone out, whereas WPA and WPA2 are stronger (WPA2 more so than WPA) and the higher the encryption, typically the better. However, as I mentioned leading into this, their encryptions have been broken--meaning they're out there and available for anyone who wants to go looking for them to find). It also brings up why it's equally important to reset the router password (as I mentioned in a previous topic, the default passwords are all out there for anyone to find--and sadly, even now, not many people think to change them...).
The other main issue that the article hints at, but doesn't mention specifically are a group and activity known as "war drivers"/"war driving". "War Drivers" typically drive around, mapping wireless access to use (many working under the assumption that if it's broadcasting and out there, it's free to use and that they supposedly have the owner's permission to do so--many router owners, however, are not aware that they are broadcasting and therefore allowing others access to their router).
The problem comes into play as there is a segment of the "War Driving" community that are into it due to more nefarious reasons, which do get hinted at in the article (ie things like breaking into other people's systems to steal information or using the networks as a launching point to engage in some other illegal activities or downloading things illegally or things I'm not going to mention but are mentioned in this article as someone mentioned in the article as having gotten into trouble for).
The frightening thing is that their numbers within that community are growing (especially those downloading subject matter of a disturbing nature that get brought up in this article).
However, as it typically gets traced via the ISP down to the router, it's often the owner of that router who initially gets suspected of whatever the crime is.
Then every so often articles like this appear in the news (albeit, I've rarely seen them in the mainstream news--usually only the tech/techie news) as a reminder about some of the issues with wireless.
The gist of the article actually covers two main issues--the first being why it's important to password protect a router running wireless (although, I did notice it left out the part about how all major encryption schemes for it have been broken--WEP historically is the weakest as it's about as effective as a "keep off the grass" sign in keeping someone out, whereas WPA and WPA2 are stronger (WPA2 more so than WPA) and the higher the encryption, typically the better. However, as I mentioned leading into this, their encryptions have been broken--meaning they're out there and available for anyone who wants to go looking for them to find). It also brings up why it's equally important to reset the router password (as I mentioned in a previous topic, the default passwords are all out there for anyone to find--and sadly, even now, not many people think to change them...).
The other main issue that the article hints at, but doesn't mention specifically are a group and activity known as "war drivers"/"war driving". "War Drivers" typically drive around, mapping wireless access to use (many working under the assumption that if it's broadcasting and out there, it's free to use and that they supposedly have the owner's permission to do so--many router owners, however, are not aware that they are broadcasting and therefore allowing others access to their router).
The problem comes into play as there is a segment of the "War Driving" community that are into it due to more nefarious reasons, which do get hinted at in the article (ie things like breaking into other people's systems to steal information or using the networks as a launching point to engage in some other illegal activities or downloading things illegally or things I'm not going to mention but are mentioned in this article as someone mentioned in the article as having gotten into trouble for).
The frightening thing is that their numbers within that community are growing (especially those downloading subject matter of a disturbing nature that get brought up in this article).
However, as it typically gets traced via the ISP down to the router, it's often the owner of that router who initially gets suspected of whatever the crime is.