Translate This Blog

Tuesday, April 8, 2008

Improve the security of your wireless home network with Windows XP

Published: May 15, 2007

Wireless networks are a great way to share files, printers, and your Internet connection to any computer in your home. With a wireless network adapter installed on your portable computer, you are no longer tied to your desk. You can communicate with friends, read the news, and surf the Web anywhere you can receive a wireless network signal.
The risks

Wireless networks don't stop at the walls of your home. In fact, wireless networks often extend more than 300 feet from your wireless router. If you live in an apartment, dorm, or condominium, you may have dozens of neighbors who can access your wireless network. If you live in a house, your neighbors and even people on the street may be able to connect to your network.

It's one thing to let a neighbor borrow your lawn mower, but you should think twice about allowing anyone to access your home network. There are several good reasons for this. People who can connect to your wireless network might be able to:


Slow down your Internet performance.


View files on your computers and spread dangerous software.


Monitor the Web sites you visit, read your e-mail and instant messages as they travel across the network, and copy your usernames and passwords.


Send spam or perform illegal activities with your Internet connection.

By setting up security features on your wireless network, you can make it very difficult for uninvited guests to connect.
Top of pageTop of page
How to protect your wireless network

Most wireless networks are completely unprotected when you first set them up. However, in just a few minutes, you can protect your wireless network by using the same method banks use to protect your password when you log on to their Web sites: encryption. Encryption scrambles data on your wireless network so that only computers that have the encryption key can read your communications.

You have several choices for wireless encryption:


64-bit WEP (Wired Equivalent Protection). The original wireless encryption standard, it is now outdated. The main problem with it is that it can be easily "cracked." Cracking a wireless network means defeating the encryption so that you can establish a connection without being invited.


128-bit WEP. An updated, more secure version of the original WEP. However, skilled attackers can still crack 128-bit WEP in a few hours or less, giving them access to your network.


WPA-PSK (also known as WPA-Personal). A more secure alternative to WEP, but because it is newer, it is not as widely supported. Microsoft Windows XP with Service Pack 2 supports WPA, so this type of encryption is the best choice if you plan to connect only Windows XP computers to your wireless network. However, if you have wireless devices that don't support WPA, such as media extenders or wireless cameras, you'll have to use WEP on your network instead.

You might also see the security method called "WPA-Enterprise." As the name suggests, this method of network encryption is designed for business use. Setup for WPA-Enterprise is more complex than for other types of encryption, and it requires special network infrastructure.


WPA2. The newest type of wireless encryption, WPA2 provides the highest level of encryption available. WPA2 encryption should be your first choice if your wireless router and all of your wireless computers and devices support it.

Even though one type of encryption may be better than another, any type will dramatically improve your network's security by making you a more difficult target.
Tip

Tip: To learn the quickest and easiest way to protect your wireless network, read Set up a wireless network and follow the steps in the sections "Configure your wireless router" and "Connect your computers and devices." The article walks you through the process of configuring your network to use 128-bit WEP.
Top of pageTop of page
Can wireless encryption be "cracked"?

The short answer is, "Yes." Any encryption can be cracked. An individual with knowledge of computers and networking, and who is willing to spend a few hours researching free "hacking" tools, can crack encryption in a few hours (or less). However, most users who want to connect without authorization lack the expertise to crack wireless encryption, even relatively weak 64-bit WEP. In a crowded neighborhood with numerous unprotected networks, anyone looking for a free connection will likely choose the unprotected network rather than spend the time to crack your wireless encryption. Therefore, even WEP encryption offers better protection than not having encryption enabled at all.
Top of pageTop of page
Wireless security tips

Follow these tips to keep your data safe when using wireless networks:


If you use WEP encryption, change your encryption key once a month. If someone manages to learn your key, they will be locked out again when you change it.


Don't connect to unprotected wireless networks—it's possible for someone to monitor your Internet usage and even record your passwords.


If you do connect to an unprotected wireless network, don't visit a Web site that requires a password unless the Web site is encrypted. To find out if it's encrypted, look for a lock symbol in the lower-right corner of your browser.

SSL secured Web site icon


If you use WPA-PSK to encrypt your network, set a long passphrase of at least 20 random characters. Better yet, use the full 63 characters by typing a sentence you can remember—just don't make it something that's easily guessed, like a line from a movie.

Wednesday, April 2, 2008

Isu MB Terenganu: “Comedy of Error” Yang Memalukan

Isu MB Terenganu: “Comedy of Error” Yang Memalukan

A Kadir Jasin

[PERINGATAN: Komen menggunakan pengenalan anonymous tidak akan dilayan. Sila gunakanlah nama sebenar atau nama samaran yang sesuai. Ulasan yang mengandungi unsur fitnah, hasutan, perkauman dan bahasa kesat atau lucah tidak akan disiarkan. Ulasan yang terkeluar daripada tajuk tidak akan diberi keutamaan.]

AHMAD Said yang pelantikannya sebagai Menteri Besar Terengganu dianggap “bercanggah dengan perlembagaan” oleh Perdana Menteri, Abdullah Ahmad Badawi, hari ini mengangkat sumpah jawatan.

Dia berbuat demikian di hadapan Pemangku Sultan, Tengku Muhammad Ismail Tuanku Mizan Zainal Abidin, di Istana Maziah, Kuala Terengganu.

Beberapa hari lampau, Abdullah dengan lantang berkata tindakan melantik orang lain selain daripada Idris Jusoh sebagai Menteri Besar “adalah bercanggah dengan Perlembagaan” – unconstitutional.

Serentak itu Ahmad Said “dipecat” daripada Umno dan 22 ADUN Umno yang “menyokong’ Abdullah dan “mahukan” Idris mengumumkan pemulauan majlis mengangkat sumpah Ahmad Said sambil mengancam akan meletakkan jawatan.

Sekonyong-konyong, sekitar Rabu lalu, Abdullah mengubah rentak dengan mengumumkan penerimaan pelantikan Ahmad Said. Seolah-olah tidak ada apa yang terjadi, dia mengumumkan isu itu selesai.

Hari ini, turut hadir di hadapan Putera Mahkota Terengganu yang berusia 10 tahun itu adalah 22 ADUN Umno yang sehingga tiga hari lalu enggan menyokong pelantikan Ahmad Said.

Inilah cerita kacau-bilau, kelam-kabut dan kucar-kacir apabila yang diberi mandat dan amanah gagal menggunakan akal, kebijaksanaan, pengetahuan dan budi bicara.

Dengan izin, “comedy of error” ini tidak sepatutnya berlaku kerana pelantikan Menteri Besar bukanlah perkara baru.

Walaupun pada amalannya Perdana Menteri boleh memberi nasihat dan pandangan, kuasa melantik Menteri Besar adalah di tangan Raja. Raja boleh melantik sesiapa sahaja yang pada pandangan Baginda mempunyai keyakinan majoriti anggota Dewan Undangan Negeri.

Akibat tindak-tanduk Perdana Menteri dan para penasihatnya itu, perkara berikut telah berlaku:-

1. Kerajaan Negeri Terengganu lewat ditubuhkan. Ia sepatutnya berlaku pada 10 Mac;

2. Hubungan antara Istana dengan kepemimpinan Umno dan Kerajaan Pusat tercemar;

3. ADUN Umno Terengganu dijadikan bahan percaturan yang merendahkan martabat mereka dan mencetuskan kemarahan rakyat Terengganu;

4. Tidak fasal-fasal mereka dituduh “kurang ajar,” “biadab” dan “derhaka” kepada Raja;

5. Akhirnya mereka terpaksa menelan ludah sendiri kerana terlalu taasub kepada pemimpin walaupun dia ternyata silap; dan

6. Memberi modal percuma kepada pari-parti lawan bagi memesatkan lagi propaganda mengenai keangkuhan, kelemahan dan kecelaruan kepemimpinan Umno.

Bagi Abdullah, seperti kata bekas Perdana Menteri Tun Dr Mahathir Mohamad di Pulau Pinang hari ini, dia bukan sahaja kehilangan Kedah, Pulau Pinang, Perak, Selangor dan Wilayah Persekutuan Kuala Lumpur malah dia juga “kehilangan” Perlis, Terengganu dan, mungkin juga, Johor di mana calon-calon Menteri Besar pilihannya ditolak oleh Raja-Raja.

Dr Mahathir yang berucap di mesyuarat agung tahunan Persatuan Melayu Tanjung (Permata) meneruskan rayuannya kepada ahli dan pemimpin Umno agar menukar kepemimpinan parti demi menyelamatkan Umno daripada ditolak secara mutlak oleh orang Melayu.