The Notebook Review forums were hosted by TechTarget, who shut down them down on January 31, 2022. This static read-only archive was pulled by NBR forum users between January 20 and January 31, 2022, in an effort to make sure that the valuable technical information that had been posted on the forums is preserved. For current discussions, many NBR forum users moved over to NotebookTalk.net after the shutdown.
Problems? See this thread at archive.org.

    Security for free Wifi hot spots...

    Discussion in 'Networking and Wireless' started by Hiker, Jan 29, 2007.

  1. Hiker

    Hiker Notebook Deity

    Reputations:
    448
    Messages:
    1,715
    Likes Received:
    1
    Trophy Points:
    56
    I expect to do quite a bit of traveling this summer using free Wifi hot spots. Are there any special measures I should take? As it is now, I have NOD32 and only use the Windows Firewall since I have one with my Linksys router. I'm thinking I should get the free Zone Alarm firewall and disable the Windows one.

    Think I'll be fine? Anything else I should be weary of? :confused:
     
  2. Greg

    Greg Notebook Nobel Laureate

    Reputations:
    7,857
    Messages:
    16,212
    Likes Received:
    60
    Trophy Points:
    466
    ZA does pretty well, though you're biggest threat is from someone snooping on your traffic. Most people won't even bother to try. I'd say just buff up your security a little bit (see ZA) and you'll be fine.
     
  3. Hiker

    Hiker Notebook Deity

    Reputations:
    448
    Messages:
    1,715
    Likes Received:
    1
    Trophy Points:
    56
    Thanks Night...
     
  4. RedSensiStar

    RedSensiStar Notebook Deity

    Reputations:
    178
    Messages:
    897
    Likes Received:
    0
    Trophy Points:
    0
    In addition to ZA get Tor. Tor is perfect. Also run your chat programs through encryption and overseas proxies.
     
  5. RedSensiStar

    RedSensiStar Notebook Deity

    Reputations:
    178
    Messages:
    897
    Likes Received:
    0
    Trophy Points:
    0
    Also check out: http://www.vidalia-project.net/index.php

    Also remember laptops by Dell & HP (Broadcom driver issues) are more easily hackable because its possible to exploit the OS kernel, which of course gets past AV, firewall, etc etc.
     
  6. Guest

    Guest Notebook Evangelist

    Reputations:
    594
    Messages:
    367
    Likes Received:
    45
    Trophy Points:
    30
    Tor is a what??????????????
     
  7. grumpy3b

    grumpy3b Notebook Evangelist

    Reputations:
    270
    Messages:
    683
    Likes Received:
    0
    Trophy Points:
    30
    In addition to the suggestions already made...if you are really needing hotspot security setup a VPN. There are also pay for use VPN services if you search online but then you are adding a potential security black hole to the process. You can then connect securely to your VPN and through that out to the web. Everything is then encrypted.

    There have been plenty of tutorials here and elsewhere online on how to setup a VPN.

    Best bet is to try and not do anything important via public access hotspots w/o encryption.
     
  8. RedSensiStar

    RedSensiStar Notebook Deity

    Reputations:
    178
    Messages:
    897
    Likes Received:
    0
    Trophy Points:
    0
  9. blue68f100

    blue68f100 Notebook Virtuoso

    Reputations:
    1,020
    Messages:
    3,439
    Likes Received:
    0
    Trophy Points:
    105
    3des is not easy to get through. But security is only good as its key. I always use the maximum allowed, in my case my vpn key is 42 chr random generated with all printable chr, do the math. Good luck on trying to break in. Not likely. I do the same on anything requiring security keys. So if you are only using common names or words that are in a dict very poor security. Yes they can be broken easily. WEP can be broken eaisly, WPA not. Most will not bother since most just move a few feet and pick up open system.

    In public hot spots you need to make sure you are not set to connect to ANY Device ( adhoc). What happens is someone will be sitting in the coffee shop surfing, but have a dual AP. One in adhoc the other bridged to shop. Anything that goes through is pc is captured, PW, KEYS etc... YOU get the idea.