How seven mesh routers deal with Wi-Fi Protected Setup (WPS)

Credit to Author: Michael Horowitz| Date: Fri, 28 Apr 2017 11:20:00 -0700

The recent wave of new mesh router systems has brought with it changes besides the obvious increase in Wi-Fi range. For example, these mesh routers are more likely to insist on WPA2-AES encryption, as many have dropped support for the less secure WEP and WPA options. Not all of them, but many.

Here I take a look at another insecure router technology, WPS (Wi-Fi protected setup) and how these new mesh routers deal with it. 

WPS is an alternate way of gaining access to a Wi-Fi network that does away with having to know the SSID (network name) and password. Much of what you read about WPS is incomplete, as it supports at least four different modes of operation.

To read this article in full or to leave a comment, please click here

Read more

How seven mesh routers deal with Wi-Fi protected setups

Credit to Author: Michael Horowitz| Date: Fri, 28 Apr 2017 11:20:00 -0700

The recent wave of new mesh router systems has brought with it changes besides the obvious increase in Wi-Fi range. For example, these mesh routers are more likely to insist on WPA2-AES encryption, as many have dropped support for the less secure WEP and WPA options. Not all of them, but many.

Here I take a look at another insecure router technology, WPS (Wi-Fi protected setup) and how these new mesh routers deal with it. 

WPS is an alternate way of gaining access to a Wi-Fi network that does away with having to know the SSID (network name) and password. Much of what you read about WPS is incomplete, as it supports at least four different modes of operation.

To read this article in full or to leave a comment, please click here

Read more

How seven mesh routers deal with WPS

Credit to Author: Michael Horowitz| Date: Fri, 28 Apr 2017 11:20:00 -0700

The recent wave of new mesh router systems has brought with it changes besides the obvious increase in Wi-Fi range. For example, these mesh routers are more likely to insist on WPA2-AES encryption, as many have dropped support for the less secure WEP and WPA options. Not all of them, but many.

Here I take a look at another insecure router technology, WPS (Wi-Fi Protected Setup) and how these new mesh routers deal with it. 

WPS is an alternate way of gaining access to a Wi-Fi network that does away with having to know the SSID (network name) and password. Much of what you read about WPS is incomplete, as it supports at least four different modes of operation.

To read this article in full or to leave a comment, please click here

Read more

IDG Contributor Network: Book Review: Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems

Credit to Author: Sandra Henry-Stocker| Date: Thu, 27 Apr 2017 11:45:00 -0700

The overall equation is pretty simple: If you want to understand network traffic, you really should install Wireshark. And, if you really want to use Wireshark effectively, you should consider this book. Already in its third edition, Practical Packet Analysis both explains how Wireshark works and provides expert guidance on how you can use the tool to solve real-world network problems.

Yes, there are other packet analyzers, but Wireshark is one of the best, works on Windows, Mac, and Linux, and is free and open source. And, yes, there are other books, but this one focuses both on understanding the tool and using it to address the kind of problems that you’re likely to encounter.

To read this article in full or to leave a comment, please click here

Read more

An introduction to six types of VPN software

Credit to Author: Michael Horowitz| Date: Sat, 15 Apr 2017 15:44:00 -0700

A VPN is simply an encrypted connection between two computers, each side running VPN software. The two sides, however, are not equal.

The software that you, as the user of a VPN service deal with, is known as the VPN client. The software run by a VPN company is a VPN server. The encrypted connection always starts with a VPN client making a request to a VPN server.

There are many different flavors of VPN connections, each with its own corresponding client and server software. The most popular flavors are probably L2TP/IPsec, OpenVPN, IKEv2 and PPTP.

Some VPN providers support only one flavor, others are much more flexible. Astrill, for example, supports OpenWeb, OpenVPN, PPTP, L2TP, Cisco IPSec, IKEv2, SSTP, StealthVPN and RouterPro VPN. At the other extreme, OVPN, as their name implies, only supports OpenVPN.

To read this article in full or to leave a comment, please click here

Read more

Quantum computing advances toward the enterprise

Credit to Author: Sharon Gaudin| Date: Fri, 14 Apr 2017 12:19:00 -0700

 

Quantum computing may still sound like the stuff of science fiction, but within the next 10 years, it could be a reality

“Systems are still pretty rudimentary,” said Charles King, an analyst with Pund-IT.  “Though they perform some specific kinds of calculations faster than traditional computers, they are defined by their limitations. When true, fully operable quantum systems come online, they will force the IT industry, public and private sector organizations and individuals to fundamentally rethink certain kinds of problems and all but abandon some conventional solutions.”

To read this article in full or to leave a comment, please click here

Read more

Top 5 VPN services for personal privacy and security

Credit to Author: Paul Mah| Date: Fri, 31 Mar 2017 09:28:00 -0700

Virtual private networks (VPNs) encrypt internet connections between two points, to secure them from casual snoopers and hackers. These VPN services are particularly useful when accessing the internet from an untrusted location, such as a hotel, café or coworking space.

A plethora of modern VPN services, with dedicated connectivity apps, have put an end to the maddening manual configuration VPNs once required. No two VPN offerings are alike, however, and it can be a challenge to find the right VPN. Here’s a look at some of the top VPNs for privacy and security.

To read this article in full or to leave a comment, please click here

Read more

Review: Consider VPN services for hotspot protection

Credit to Author: Eric Geier| Date: Thu, 30 Mar 2017 13:41:00 -0700

Virtual private networks have many uses. Typically, businesses deploy VPNs so employees can securely access the corporate network from outside the office. However, we’ve seen a rise in third-party VPN services that use the same underlying technology, the encrypted tunnel, to simply provide a secure Internet connection.

Why would you ever need to do this?

When connected to a VPN service, the websites you access think you’re at the location where the VPN server is located. This can help anonymize your Internet traffic so it’s much harder for websites to track your personal browsing history.

This also allows you to access websites, services, and content that’s restricted where you are currently located, such as Netflix or Hulu when traveling overseas.

To read this article in full or to leave a comment, please click here

Read more