Protect Yourself from Online Fraud

The good folks at our sister site, Wi-Fi Planet really know how to spotlight fraud protection. In honor of Global Consumer Fraud Protection Month, they’ve gathered these ten tutorials. Herein you’ll learn ways to protect yourself and your customers from a range of digital evildoers.

A Tale of
Two Passwords

[March 5, 2008] Learn the secrets to savvy password

Ask The
Wi-Fi Guru

March 4, 2008] In this new monthly column, Aaron Weiss, our
resident Wi-Fi Guru, will answer your burning questions about small-scale Wi-Fi
deployments. In this episode, he covers bridging robots, hotspot sharing, and
DD-WRT repeaters.

Malware on Your Windows Hosts with netstat

[February 11, 2008] netstat
gives you some of the tools you need to spot and eliminate any malicious
software listening for network connections on your Windows hosts.

and Linux for Your WLAN

[February 5, 2008] Best of ENP: Part Two—RADIUS
and Linux can be a potent combination for WLAN security. Here’s how to get it

Safety for Business Users

[February 1, 2008] The only reliable way for
employers to manage the associated risk for mobile workers is to define,
monitor, and enforce hotspot acceptable use policies. Here, we show you how.

When ‘Free
Public Wi-Fi’ Is Bad

[January 21, 2008] Just as you shouldn’t accept a
package from a stranger before boarding a plane, you shouldn’t accept “free
public Wi-Fi”–at least not without protecting yourself first.

Your WLAN with Aircrack-ng

[December 27, 2007] Rogue access points and
weak passwords are the bane of any network administrator’s life: all it takes is
one user setting up a consumer-grade wireless router in the cube farm so he or
she can use a PDA or whatever and you’ve got yourself a potentially serious
security risk.

Guide to WPA

[December 13, 2007] To help you gain a better understanding
of what WPA is, how it works, and why you should be using it, we’ve gathered
together our best tutorials on the subject.

The Caffe
Latte Attack: How it Works—and How to Block It

[December 12, 2007] By
exploiting driver flaws, exposed fileshares, and user mistakes, one can easily
and invisibly attack Wi-Fi laptops and phones in public venues like airplanes,
hotels, and cafes. We show you how to protect yourself.

Phished: Why SSID Spoofing (Still) Matters

[January 29, 2007] Phony
access points (APs) that use spoofed service set identifiers (SSIDs) to lure
wireless users are nothing new. Also called evil twin or honeypot rogue APs,
these look-alikes have grown common in venues frequented by business executives,
including airports and hotels. We show you how to guard against them

Adapted from

Do you have a comment or question about this article or other small business topics in general? Speak out in the Forums. Join the discussion today!
Small Business Computing Staff
Small Business Computing Staff
Small Business Computing addresses the technology needs of small businesses, which are defined as businesses with fewer than 500 employees and/or less than $7 million in annual sales.

Must Read

Get the Free Newsletter!

Subscribe to Daily Tech Insider for top news, trends, and analysis.