Archive for March, 2010

The adoption of wireless devices continues to grow as they become more affordable. The rapid spread of wireless technologies among both business and personal systems has improved interoperability and accessibility. However, this very ubiquity has also led to an increase in the number of threats to computer networks. Wireless technologies have given attackers new ways to steal sensitive information, tamper with business processes, and subvert network security enforcement mechanisms. As new threats and attacks are found against wireless networks, they are addressed with changes and additions to the protocols and standards. This book will introduce the basic concepts underlying the evolution of wireless security-the threats, the exploits, and the remediation strategies.

Read the rest of this entry »

wireless signaleIf your neighbours are stealing your wireless connection, you may be able to notify from the logs on your router or  modem.

You might look for logs such as LAN users, connection or status log, or connected MAC addresses. And you can also use a tool to check the IP/MAC on your wireless network IP range.

Verify the MAC addresses

To find out who is on your network, you have to make a list of all the devices that are meant to be connected. Find out their MAC adresses and their IP addresses if they are static.

To find out the MAC and IP address on Windows OS, click the Start menu and choose Run. Type cmd and click OK. In the screen that opens, type ipconfig/all and hit Enter. The MAC address will be shown as the physical address.

Once you know the MAC addresses of each of the computers on your wireless network, you will recognise any addresses that don’t belong under the window that shows the MAC addresses of current clients.

Read the rest of this entry »