Friday 14 February 2014

How do wireless networks work......?

As the name suggests, wireless networks, sometimes called WiFi, allow you to connect to the internet without relying on wires. If your home, office, airport, or even local coffee shop has a wireless connection, you can access the network from anywhere that is within that wireless area.

Wireless networks rely on radio waves rather than wires to connect computers to the internet. A transmitter, known as a wireless access point or gateway, is wired into an internet connection. This provides a "hotspot" that transmits the connectivity over radio waves. Hotspots have identifying information, including an item called an SSID (service set identifier), that allow computers to locate them. Computers that have a wireless card and have permission to access the wireless frequency can take advantage of the network connection. Some computers may automatically identify open wireless networks in a given area, while others may require that you locate and manually enter information such as the SSID.

What security threats are associated with wireless networks?
Because wireless networks do not require a wire between a computer and the internet connection, it is possible for attackers who are within range to hijack or intercept an unprotected connection. A practice known as wardriving involves individuals equipped with a computer, a wireless card, and a GPS device driving through areas in search of wireless networks and identifying the specific coordinates of a network location. This information is then usually posted online. Some individuals who participate in or take advantage of wardriving have malicious intent and could use this information to hijack your home wireless network or intercept the connection between your computer and a particular hotspot.

What can you do to minimize the risks to your wireless network?
Change default passwords - Most network devices, including wireless access points, are pre-configured with default administrator passwords to simplify setup. These default passwords are easily found online, so they don't provide any protection. Changing default passwords makes it harder for attackers to take control of the device .
Restrict access - Only allow authorized users to access your network. Each piece of hardware connected to a network has a MAC (media access control) address. You can restrict or allow access to your network by filtering MAC addresses. Consult your user documentation to get specific information about enabling these features. There are also several technologies available that require wireless users to authenticate before accessing the network.
Encrypt the data on your network - WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access) both encrypt information on wireless devices. However, WEP has a number of security issues that make it less effective than WPA, so you should specifically look for gear that supports encryption via WPA. Encrypting the data would prevent anyone who might be able to access your network from viewing your data.

Protect your SSID - To avoid outsiders easily accessing your network, avoid publicizing your SSID. Consult your user documentation to see if you can change the default SSID to make it more difficult to guess.

Install a firewall - While it is a good security practice to install a firewall on your network, you should also install a firewall directly on your wireless devices (a host-based firewall). Attackers who can directly tap into your wireless network may be able to circumvent your network firewall—a host-based firewall will add a layer of protection to the data on your computer .

Maintain anti-virus software - You can reduce the damage attackers may be able to inflict on your network and wireless computer by installing. Many of these programs also have additional features that may protect against or detect spyware and Trojan horses.

Security Tips By World's Most Wanted Hacker Kevin Mitnick


Kevin Mitnick came by his security expertise the hard way. In the 1990s, his electronic penetration of some of the biggest companies in the world made him a notorious tech boogieman, and ultimately landed him five years in prison.

Now free and clear, Mitnick has reinvented himself as a computer security consultant and writer. He travels the world teaching organizations how to secure their information in a world of corporate spies and younger versions of himself. He took a break from his jet-setting to share some practical security tips. Clip them and stick them on your parents' refrigerator or your IT administrator's white board.

Here is Top 10 list of steps you should take to protect your information and your computing resources from the bad boys and girls of cyberspace:

• Back up everything! You are not invulnerable. Catastrophic data loss can happen to you -- one worm or Trojan is all it takes.

• Choose passwords that are reasonably hard to guess -- don't just append a few numbers to a no-brainer. Always change default passwords.

• Use an antivirus product like AVG or Norton, and set it to update daily.

• Update your OS religiously and be vigilant in applying all security patches released by the software manufacturer.

• Avoid hacker-bait apps like Internet Explorer and disable automatic scripting on your e-mail client.

• Use encryption software like PGP (pretty good privacy) when sending sensitive e-mail. You can also use it to protect your entire hard drive.

• Install a spyware detection app -- or even several. Programs that can be set to run frequently, like SpyCop, are ideal.

• Use a personal firewall. Configure it to prevent other computers, networks and sites from connecting to you, and specify which programs are allowed to connect to the net automatically.

• Disable any system services you're not using, especially apps that could give others remote access to your computer (like Remote Desktop, RealVNC and NetBIOS).

• Secure your wireless networks. At home, enable WPA (Wi-Fi protected access) with a password of at least 20 characters. Configure your laptop to connect in Infrastructure mode only, and don't add networks unless they use WPA.

Today, Mitnick has been able to move past his role as a black hat hacker and become a productive member of society. He served five years, about 8 months of it in solitary confinement, and is now a computer security consultant, author and speaker.

Thursday 13 February 2014

TOP 11 COOL HACKING MOVIES OF HOLLYWOOD

In the list of Computer movies we have brought to you the top hollywood movies based on hacking. These hacker movies just show up the cool way to represent life and happenings in the life of a hacker. Thus if you are interested in hacking stuff, don't forget to have a look on these hacking movies.

1. Die Hard 4: Live Free or Die Hard (2007)

John McClane takes on an Internet-based terrorist organization who is systematically shutting down the United States.
Rating :5.9/10
Director:Len Wiseman
Stars :Bruce Willis, Justin Long and Timothy Olyphant.

2. Hackers (1995)

A young boy is arrested by the US Secret Service for writing a computer virus and is banned from using a computer until his 18th birthday.
Rating :5.9/10
Director:Iain Softley
Stars:Jonny Lee Miller, Angelina Jolie and Jesse Bradford.

3. Pirates of Silicon Valley (1999)

Pirates of Silicon Valley is a semi-humorous documentary about the men who made the world of technology what it is today, their struggles during college, the founding of their companies, and the ingenious actions they took to build up the global corporate empires of Apple Computer Corporation and Microsoft Inc.
Rating:7.1/10
Director:Martyn Burke
Stars:Anthony Michael Hall, Noah Wyle and Joey Slotnick

4. The Italian Job (2003)

After being betrayed and left for dead in Italy, Charlie Croker and his team plan an elaborate gold heist against their former ally.
Rating:6.9/10
Director:F. Gary Gray
Stars:Donald Sutherland, Mark Wahlberg and Edward Norton.

5. Untraceable (2008)

FBI agent Jennifer Marsh is tasked with hunting down a seemingly untraceable serial killer who posts live videos of his victims on the Internet. As time runs out, the cat and mouse chase becomes more personal.
Rating:6.1/10
Director:Gregory Hoblit
Stars:Diane Lane, Colin Hanks and Joseph Cross.

6. Foolproof (2003)

Kevin, Sam and Rob are founding members of a theoretical group which pulls off heists. Leo, a gangster, blackmails them into pulling off a real multi-million dollar heist. Now it's up to them to get out alive.
Rating:6.5/10
Director:William Phillips
Stars:Ryan Reynolds, Kristin Booth and Joris Jarsky.

7. Firewall (2006)

A security specialist is forced into robbing the bank that he's protecting, as a bid to pay off his family's ransom.
Rating:5.7/10
Director:Richard Loncraine
Stars:Harrison Ford, Virginia Madsen and Paul Bettany.

8. The Score (2001)

An aging thief hopes to retire and live off his ill-gotten wealth when a young kid convinces him into doing one last heist.
Rating:6.8/10
Director:Frank Oz
Stars:Robert De Niro, Edward Norton and Marlon Brando.

9. Swordfish (2001)

A secretive renegade counter-terrorist co-opts the world's greatest hacker (who is trying to stay clean) to steal billions in US Government dirty money.
Rating:6.4/10
Director:Dominic Sena
Stars:John Travolta, Hugh Jackman and Halle Berry.

10. Sneakers (1992)

Complex but lighthearted thriller about computers and cryptography, government and espionage, secrets and deception and betrayal.
Rating:7.0/10
Director:Phil Alden Robinson
Stars:Robert Redford, Dan Aykroyd and Sidney Poitier.

11. The Social Network (2010)

Harvard student Mark Zuckerberg creates the social networking website that would become known as Facebook, but is later sued by two brothers who claimed he stole their idea, and the co-founder who was later squeezed out of the business.
Rating:7.9/10Director:David Fincher
Stars:Jesse Eisenberg, Andrew Garfield and Justin Timberlake.

We hope you will like the above collection. You are most welcome with your comments if you are having some more movies like that in your mind. Enjoy people and do not forget to comment.