Protect Yourself from Online Fraud

By Wi-Fi Planet Staff | Posted March 26, 2008
The good folks at our sister site, Wi-Fi Planet really know how to spotlight fraud protection. In honor of Global Consumer Fraud Protection Month, they've gathered these ten tutorials. Herein you'll learn ways to protect yourself and your customers from a range of digital evildoers.

A Tale of Two Passwords
[March 5, 2008] Learn the secrets to savvy password creation.

Ask The Wi-Fi Guru
March 4, 2008] In this new monthly column, Aaron Weiss, our resident Wi-Fi Guru, will answer your burning questions about small-scale Wi-Fi deployments. In this episode, he covers bridging robots, hotspot sharing, and DD-WRT repeaters.

Spot Malware on Your Windows Hosts with netstat
[February 11, 2008] netstat gives you some of the tools you need to spot and eliminate any malicious software listening for network connections on your Windows hosts.

FreeRADIUS and Linux for Your WLAN
[February 5, 2008] Best of ENP: Part Two—RADIUS and Linux can be a potent combination for WLAN security. Here's how to get it configured.

Hotspot Safety for Business Users
[February 1, 2008] The only reliable way for employers to manage the associated risk for mobile workers is to define, monitor, and enforce hotspot acceptable use policies. Here, we show you how.

When ‘Free Public Wi-Fi' Is Bad
[January 21, 2008] Just as you shouldn't accept a package from a stranger before boarding a plane, you shouldn't accept "free public Wi-Fi"--at least not without protecting yourself first.

Secure Your WLAN with Aircrack-ng
[December 27, 2007] Rogue access points and weak passwords are the bane of any network administrator's life: all it takes is one user setting up a consumer-grade wireless router in the cube farm so he or she can use a PDA or whatever and you've got yourself a potentially serious security risk.

Wi-FiPlanet Guide to WPA
[December 13, 2007] To help you gain a better understanding of what WPA is, how it works, and why you should be using it, we've gathered together our best tutorials on the subject.

The Caffe Latte Attack: How it Works—and How to Block It
[December 12, 2007] By exploiting driver flaws, exposed fileshares, and user mistakes, one can easily and invisibly attack Wi-Fi laptops and phones in public venues like airplanes, hotels, and cafes. We show you how to protect yourself.

Getting Phished: Why SSID Spoofing (Still) Matters
[January 29, 2007] Phony access points (APs) that use spoofed service set identifiers (SSIDs) to lure wireless users are nothing new. Also called evil twin or honeypot rogue APs, these look-alikes have grown common in venues frequented by business executives, including airports and hotels. We show you how to guard against them

Adapted from Wi-FiPlanet.com.

Do you have a comment or question about this article or other small business topics in general? Speak out in the SmallBusinessComputing.com Forums. Join the discussion today!

Comment and Contribute


     

    Get free tips, news and advice on how to make technology work harder for your business.

    Submit
    Learn more
     
    You have successfuly registered to
    Enterprise Apps Daily Newsletter
    Thanks for your registration, follow us on our social networks to keep up-to-date