SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Pastimes : Computer Learning

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: IHateSourCream who wrote (46094)4/26/2005 1:32:47 PM
From: shadowman  Read Replies (1) of 110652
 
Also...I posted this security software a few months back. It gets good reviews and is relatively easy to use and not expensive.

otosoftware.com

Here's a write up on it by Jim Coates..a respected tech writer.(I'd include the link but it appears to be dead)

Published January 8, 2005

Wireless security a walk in the park
Wi-Fi Defense
$29.95, Oto Software Inc.

Windows 98/ME/2000/XP
www.otosoftware.com

Although millions of Internet users can surf the Web on their patio by installing a wireless router, it's safe to estimate that most of them have been concerned--if not baffled--at the security issues these splendid devices bring.

Wireless-router buyers often get little more than a start-up pamphlet and are told they must use their own Web browser to configure the wireless connections so that only authorized people may use it. This involves setting elaborate passwords to enable encryption, as well as needing to find and assign addresses to each computer.

Wi-Fi Defense from Denver-based Oto Software provides a set of wizard screens that walk a user through a simple routine of identifying each computer allowed to access the wireless network and then automatically configures the router hardware to accept it.

The software starts by scanning the entire network to spot all connected machines and displays a list of each. If a stalker happens to be on the network, his computer will appear along with the machines the buyer knows about. Setup amounts to selecting each machine and designating it as friend or foe.

After that initial setup, the software acts somewhat like a firewall by allowing only approved users to log on. All those who try to access from outside are blocked. Not only are hack attempts blocked, but the software detects details about who the intruder is, where the attack came from, and which Internet access provider was involved.

After the first setup, one can add new computers, such as visitors to the home or newly purchased machines. Another feature allows one to designate visitors as foes for future exclusion.

The software comes with a temporary disabling button for when you visit a coffee shop or other hot spot.
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext