Wednesday, March 20, 2013

10 tips to secure wireless network


Wireless networks are one of the growing technologies due to the increasing use and development new security threat may cause interruption. Many home users and evern professional neglect the importance of wifi security and in result they get the risk of lossing data or get infected by some malicious virus or Trojan horses. When using wifi, the security products available usually doesn’t provide complete security, that is why wireless transmission of data is not considered all that reliable. However, these security threats can be reduced by following some of the minor tips and very small precautionary measures that can save you from lots of risk. WiFi home user can use these tips to secure wireless network effectively.

   1. Randomly change or modify your network or administrator passwords

      The most frequently used tip for securing the home and commercial wireless networks is the change of the usernames or administrator’s account through which router is accessed. One can customize the page that is provided by the manufacturer of the equipment or setup of different or assigned web pages. Through these WebPages users/owner can enter into their account and can change and customize according to their need.  Along with the web page , web tool for the protections  also helps to hide the usernames and login screen form rest of the public and third party users. All users must change their passwords and usernames to avoid the security threat that can collect information and private data online.

      tips to secure wireless networks

   2. Make use of encryption technology

      All wifi setups support at least one type of encryption techniques. These encryption techniques are WPA and WEP. Encryption randomly hides and encrypts all the data that is sent via wireless networks and It's quite hard for the hacker to get the transmitted data. The encrypted data however can be red by the machine or conversion software only, not by the human intruder directly. But because of the advanced technology one should choose the strongest wifi encryption program to use in order to keep the data at the safest mode (WPA).


   3. Change all the SSID after some time

      Wireless network routers are set up using WEP / WPA encryption techniques, which we read in bullet above. After choosing one of the encryption, SSID (Service Set Identifier) is assigned to network and key is also assigned. Although key can be ignored and network can be left open but that is the worst thing you can do to wireless network. Make sure you do assign its key to lock up your network to avoid unwilling access. To avoid your SSID get hacked sooner or later, firstly keep changing the key once or twice in month, secondly to be extra careful, keep updating you SSID .

   4. Mac address Filtering

      In wireless routers there is an option for the filtration of MAC addresses for the security of network. It is done by providing physical address of the device into router for Mac filtration feature. Mac address is unique and can never be repeated in any device. When router gets request from device whose Mac address is recorded in router, it allows access to it. Mac address that is not identified by router doesn’t get access even if SSID & its key is correctly entered.

   5. SSID broadcast restriction.
      Blocking the broadcasting for SSID can also be an effective security technique in wireless networks. This way network's SSID will be not visible when device is scanning for wireless networks around. Therefore risks to networks get minmal.

   6. Restrict the auto detection of wifi around
      Another useful technique is to restrict the auto connect option for the detection of the wireless network around. This may expose your computer system to different kind of security risks.

   7. Static IP Addresses.
      This tip is useful for the home users; they should assign static IP addresses to the wifi devices. Many of them use the DHCP technique to assign the dynamic IP which is easier technique but it’s quite unsafe.

   8. Firewall
      Enabling firewall on each single attached device can also protect the wireless network integirty.

   9. Router Access Positioning
      To protect the signal leakage in Wifi networks router access points and ranges must be configured.

  10. Network turning off
      Turn of the network properly when not in use. 

10 tips for improving wireless network


In the wireless technology, there are many applications or the networking devices that are used for the sake of the benefit of humanity. Similarly wireless networks are also use in wireless technological field for the sake of communication between two places. Literally it is defined as the type of network that is used to build different types of connection between the wireless telecommunication devices for the purpose of data transmission and for communication is called as the wireless networks. Wireless networks are of different types but some important types of wireless networks are WAN, LAN and PAN.



Important Tips to Improve Wireless Networks:
As we all know that the operation of these networks depends upon the wireless technology and the components used in the wireless media such as routers etc. So little bit interruption of change in the setting of these components can change the efficiency or the performance of the wireless networks. There are many solutions that are used World wide but some techniques that are commonly used to improve the performance and working of the wireless networks are as follows.

Position of Wireless 1.Access Point
Wireless access point or the wireless router is the main component of wireless networking because it is that component that accesses the whole networking of the wireless system. The location or the position of the access point of the wireless device should be placed in center because if the wireless router or the access point is not placed in the center the strength the signal are very weak and show low performance.
2.Changing the Wireless Antenna:
Wireless antenna is also an important part of the wireless devices because it is the source of the generation of the signals. Generally the antennas present with wireless routers can send signals almost in all directions, if the router is placed near to the wall then the signal of wireless device disturbed. So, use antennas that send signals in one direction.
3.Replacing the Network Adapter:
Different types of network adapters are used in the system for the sake of wireless networking. But some times some networking adapters are not compatible with the wireless networking device and show low performance. So by changing the network adapter with the suitable one we can also increase the working of the wireless networks.
4.Upgrade Adapter Driver:
Wireless networks can also be enhanced by updating the driver or the software of the networking adapter of the system. Because some times few components of the driver are not similar to the required driver of wireless devices
5.Addition of Wireless Repeater:
As different tips are used to improve the performance of the wireless network but another important tip that is used to improve the networking of the wireless network is the addition of the wireless repeater. Attach the repeater near to access point without any kind of wiring .
6.Update the network:
By updating the network we can also improve the performance pf the wireless network.
7.Same vendor:
There are so many improvement techniques of wireless network, but the common and the easy tip to improve the wireless network is that the users should buy all the cards and other wireless devices from the same vendor
8.Arrangement of Other Wireless Devices:
The other wireless devices that are present in the home should be arranged properly according to the computer such as wireless telephone sets because they can decrease the signaling power of the wireless router.
9.Away from Metal:
Wireless access points should be placed away from the floor and the metal devices.
10.Network Cabling:
A user should use the specific and the perfect cable for setting up a wireless network because it also affects the efficiency of the network.

How to prevent Wireless Network Hacking - How hackers hack wireless networks


 Wireless networks are very famous for their fast and the reliable working among the people of the modern World. But the people who do not like this technology and feel jealous with it and trying to do the activities that can hack the particular network and decode all the personal information of the users on the network. Basically wireless network hacking is defined as the set of different types of techniques or the tools to hijack the network through unauthorized mean with out the permission of any body and breaks the security of the network. Hackers use different types of hacking techniques to break the security of the wireless network and decode all the information such as passwords, MAC addresses, and many more secret things.



How Hacker hack the Wireless Network?
In the past that hacking technology was used to check the security measure either the system or the network is secured or not but nowadays people use this technology for unfair means and for hijacking purposes. There are different techniques or the methods that are used by the hackers to break the security and hack the network. But some common techniques are as follows



   1. Network Enumeration
   2. Wireless Network Spoofing
   3. Wireless Network Probing
   4. Wireless Network Sniffing



Network Enumeration:

First of all the hacking process starts with the initial step, in the first step the data and the information about the wireless network is collected wit the help of any possible way , that phenomenon is referred to as the network enumeration. Hackers use different types of applications or the software to collect the important information about the network. Some of the important applications used by the hackers to hack the wireless networks are WarXing that operates with the help of computer or the laptops. Some other applications such as Kismet or network stumbler also used for the same purpose.


Wireless Network Spoofing:

It is the type of technique that is used by the hackers to crack the security and hack whole wireless networking system. It is the very strong technique that is used by the attackers to attack on the both wired and the wireless networks security and hijack them. In this technique hackers use different types of applications and the software to locate and identify the different types of addresses pf the network such as IP or MAC by filling the particular fields with the addresses. There are different types of spoofing in which the hackers deals with the specific addresses such as MAC spoofing, IP spoofing and frame spoofing


Wireless Network Sniffing:

An important technique used by the hackers to hack the wireless networks is the wireless network sniffing. In this process sniffer is used, sniffer is the program that is used by the hackers to breaks and decodes the secret information of the wireless network traffic broadcasting. Through this program hackers are also able to hijack the wired networks also. But sniffing of the wireless networks is quite easy and convenient for the hackers as compared to the wired networks.


Wireless Network Probing:

If some amount of information is missing after spoofing and sniffing of the networks then the hackers try to use the wireless network probing technique. In this technique hackers construct the artificial data packets and spread them over the network and attacks on the specific target. It is called as wireless network probing.



Prevention of Wireless Network Hacking:

Where there are different techniques to hack the wireless networks, some protection techniques are also used which are as follows



   1. By encryption of the wireless traffic of wireless networks
   2. Password protections
   3. Change the default name and password of SSID

4G technology




Introduction to 4G technology

A descendant to 2G and 3G technology aiming to provide the very high data transfer rates. 4G technology provides very speedy wireless internet access to not only stationary users but also to the mobile users. This technology is expected to trounce the deficiencies of 3G technology in terms of speed and quality. 4G can be best described in one word “MAGIC”, which stands for Mobile multimedia Anytime Anywhere Global mobility support, integrated wireless and personalized services.


MAGIC of 4G Technology

So far there has been no specific definition to this successor of 2G and 3G. However it has been used often to denote a fast internet access available to mobile phone users. More over the distinguishing feature of high multimedia streaming and end to end IP configuration is judged to be its MAGIC enchantment. 3G utilized WiMax and WiFi as separate wireless technologies, whereas 4G Technology is expected to coalesce these two technologies. Hence one can evaluate how efficient it would become when combining two extremely reliable technologies. 4G can greatly anticipate in evolving and advancing the pervasive computing. The aim of pervasive computing is to attach itself to every living space possible, so that human beings remain intact with the wireless technology intentionally and unintentionally. Therefore 4G will be able to connect various high speed networks together, which would  enable each one of us to carry digital devices even in dispersed locations.   The network operators worldwide would be able to deploy wireless mesh networks and make use of cognitive radio technology for widespread coverage and access.



The image above is self explanatory, it can tell the difference within the technology (3G) we are living in right now and what thrill can we expect from 4G technology. 4g technology keeps full potential to make us forget the way we use internet today, on our laptops and on moving devices such as mobile phones and tablet devices. It is going to remove all the barriers of speed & bandwidth which will reward every user with high stream data. In 4G HD data will be made available without much of a problem over the internet. These days, websites are designed keeping internet speeds of users in mind. When 4G technology has been deployed, web will be full of High Definition (HD) content and downloading or high quality streaming will not consider any issue at all. All we have to wait & see now, when and how this technology is going to come and bring the change in our daily life internet activity.

Technologies used in 4G technology: (This paragraph is for more technologically advance readers)

4G is a multi purpose and versatile technology hence it can utilize almost all of the packet switched technologies. It can use both orthogonal frequency division multiplexing (OFDM) and orthogonal frequency division multiple access (OFDMA). OFDM mechanism splits a digital signal into different narrowband and frequencies. The reason why 4G makes use of this technology lies in its ability to minimize the intervention among symbols and channels associated to data streaming. 4G is also capable of using multiple input / multiple output technology (MIMO). This antenna technology is used to optimize the data speed and reduce the errors in the networks. Universal Mobile Telecommunication Service (UMTS) which is basically a broadband 3G technology, is also a part of 4G. This broadband technology transfers data in the form of frames or packets. Hence it is capable of carrying voice, video, text and other types of multimedia datagram with the speed of 2Mb. UMTS is part of 4G because it can enables 4G to make use of international mobile phone roaming via using GSM (Global system for Mobile Communications). Another wireless telecommunication technology known as time division synchronous code division multiple access (TD-SCDMA) provides support to 4G to transfer both circuit switched data like video and voice and packet switched data.

4G’s New Horizon of Opportunities

The telecommunication companies like NTT Docomo from Japan and Sprint Nextel were also deploying 4G wireless technologies from the early 2006 along with 3G mobile technologies. The flexibility of 4G technologies to be used in combination with GSM and CDMA has provided it an edge over other technologies. The reason is that the high broadband capability of 4G not only increases data streaming for stationary users but also for mobile users. 4G can be efficiently combined with cellular technologies to make consistent use of smart phones. The digital cameras attached in smart phones can be used to establish video blogs in scattered geographical regions. This gives the manufactures the opportunity to produce more affordable user friendly 4G compatible devices. Famous iPod is one such device that supports the working of video blogs. Hence 4G is capable of providing new horizon of opportunity for both existing and startup telephone companies.                  

3G Technology


History and Evolution of 3G Technology: 3G technology was introduced to fulfill the needs of high speed transfer of data over the smart phones. A smart phone is combination of PDA, Blackberries, i-Phones etc, and different mobile applications used by mentioned phones. NTT DoCoMo launched the first 3G network in Japan, in the year 2001. It was branded as FOMA(Freedom of Mobile Multimedia Access) and was based on W-CDMA technology. In 2005, there were 23 networks worldwide, operating 3G technology. Telenor launched the first commercial 3G network in Europe.

What is 3G Technology: 3G stands for Third Generation (of mobile phones) and it enables increased data-handling rates and high speed bandwidth. 3G is a network protocol which refers to the generations of mobile phones and telecommunication equipments which are compatible with the International Mobile Telecommunications-2000 (IMT-2000) standards stated by International Telecommunication Union (ITU). Because of this technology users can use many advanced features like video conference calling, video Streaming, video calls and enhanced web browsing capabilities. The older versions of this technology were also able to carry voice but they were unable to transfer data over this network.


One of its key visions is to provide seamless global roaming, enabling users to move across borders while using the same number and handset. Our mobile phones run on spectrums which is difference between higher & lower frequencies. To use 3G technology on the cell phone huge bandwidth is needed, this bandwidth can be calculated from the difference of high and low frequencies. The most expected range of bandwidth to work with 3G technology could be as much as 15-20 Mhz. UMTS (Universal Mobile Telecommunications System) is now a day’s most famous part of 3G cell phone technologies. The highlight of 3G technology is its video telephony technology. Today this wireless technology has also enabled video broadcast and data-intensive services such as stock transactions, e-learning and telemedicine.

Birth of IMT-2000: concept of IMT was first introduced in the mid of 1980’s at ITU. From that time developers were working very hard with this technology so that its standards can be improved. Once when all the standards were approved from the authorities then it start working for next generation systems and named as IMT-2000. According to the standards of technical specifications the spectrum for 3G technology was between 400 MHz and 3 GHz which suites this technology most. IMT-2000 is the result of collaboration of many entities, inside the ITU (ITU-R and ITU-T), and outside the ITU (3GPP, 3GPP2, UWCC and so on).
Other contributors of 3G technology include
CDMA2000                  -       Code Division Multiple Access
TD-SCDMA                 -       Time-division Synchronous Code-division Multiple Access
W-CDMA (UMTS)      -        Wideband Code Division Multiple Access




Advantages of 3G Technology: all the functions performed in 3G are much faster than the previous networks. Other advantages of this technology include

   1. 3G mobile can be used as a modem for computers and then internet can be accessed at high speed on them.
   2. 3G networks use IP connectivity, which is packet based.
   3. Instant messaging with video/audio clips.
   4. Fast downloads of large files such as faxes and PowerPoint files.
   5. Access to corporate applications.
   6. The quality of voice and video calls is high in 3G technology.
   7. Users can view live TV on mobile phones.
   8. The increased bit rate improved the speed of internet and some other applications commonly used by users.
   9. Through this technology sharing of data becomes very easy.
  10. 3G allows users to be online all the time.
  11. Its mobile office services like virtual banking and online selling has improved the use of this technology.

Disadvantage of 3G Technology:

   1. The biggest issue linked with the use of this technology is cost. The maintenance of this technology is higher than the previous technologies.
   2. To access full strength of signals base station should be closer to the user.
   3. Service provider has to pay high amount for 3G licensing and agreements.
   4. High power consumption

Bluetooth technology


Blue tooth technology
Technology is the word that has significance in our lives today. Latest development and advancements has introduced some of the most useful devices and machines that have made communication easier. Bluetooth is one of such device which is frequently sued for sharing the files, photographs and other data through the wireless connection. The word was derived fro the Norway and Denmark kingdom and its logo is typical for every key device it is used for.


How bluetooth technology works

Blue tooth is the wireless data transfer device that makes use of the radio technology with the spread spectrum for the purpose of communication. First when Bluetooth is activated fro sending any file from one destination to other it is divided into the chunks of data with equivalent t size mostly up to 79 bands or one mega hertz each chunk. Although radio frequency may be short range but Bluetooth can be configured for up to 2.4 Giga hertz range most specifically for business and industrial areas. Bluetooth is a protocol that is complete based on the data packet technology with complete master slave architecture. One Bluetooth can act as master for the seven slaves at time by sharing the master clock at every device. This clock synchronizes ticks for the data transfer and timing is ser according to the data .first paring is done tow clock ticks make a pair and then other are configured for transferring the complete file. Even and odd slots are randomly or sequentially used according to structure of the main device.


Advantages

There are many advantages that this fast connecting device provides to its users some of them are listed below.

    * Bluetooth is one of the safest way to connect and exchange the data of different types over the wireless connections with may devices and hardware s such as laptops, mobile phones, telephones, fax machines, Pc, printers GPS receivers ,digital photo camera  and video games console controllers.
    * It is available in almost every high quality branded hand set. Many mobile manufacturer circuit Bluetooth as an additional feature to there mobile phones.
    * Doesn’t consume large portion of time for transferring the data.
    * Bluetooth doesn’t cost a single penny from their user for sharing the data files.
    * Flexible and most reliable data transfer tool .
    * No wrong file can be transferred without entering the pairing code from master and slave fro assuring the secure data and legal access to the file.
    * Also provides the facility to be controlled with the help of wireless technology.

  
Bluetooth Specifications

Typical standards and set of specification have been deigned for utilizing the Bluetooth feature efficiently.

   1. A first connection for blue tooth must be established or to or more piconets type scatter net in which some of the device assist as a bridges and on the other hand it must also play the role as the master to the other paired salves to its master.
   2. Many dongle and USB wit blue tooth technology are also available in the market but they use less powerful Bluetooth mechanism as compared to the direct devices. These dongles have limited transmission capacity.


 Applications

There is a big list of applications blue tooth

          o Data sharing from te memroy cards or direct memory from hand set to hand set.
          o Handfree hand set controll while driving the cars.
          o Its also used for the wilres collarbartion and commuciation with inputs and ouptt device of the computer system.suhc as mouse,printers etc.
          o Fullfleged replacement of the traditional file transfer system with more efficeint speed and relaible results.

Types of wireless technology - Wireless technology types


Wireless technologies are very famous and have taken over our lifes in daily to daily task, and it is popular among the techno people and the modern researchers. The time wireless technology was discovered, it had all the potiential of the world to take over many previous technologies working with help of wires. It has been breakthrough in computing networking technology, and versatility of this technology has cause it to deversify in many other feilds which are not even directly related to computers. There are lots of wireless technologies now being into use which helps us to compete in the race of computer networking and be up to date in this technological World.


Computer networking is a very vast and advanced field which has been implemented on many aspects of technology. In computer networking, there are so many devices which are used for networking purposes. Wireless technologies really provide the convenient and easy approach to communications between different areas that are far behind from the different types of the modern and the latest technologies. Types of wireless technologies were designed by the scientists because people who are away from their homes, they can avail such opportunity of using the internet at very high speed and be in touch with others for the sake of their business enhancement in the best possible ways of communication between two places.

Different types of Wireless Technologies:


Due to the easy approach to the networks and also in many appliances of the daily life wireless technologies are of many types and almost all the technologies that are used in the present era for the sake of better working are designed wirelessly. Some important types of wireless technologies are as follows


Wifi Technology :

WiFi is commonly called as wireless LAN, it is one of those networks in which high frequency radio waves are required for transmission of data from one place to another. WiFi operates on several hundreds feet between two places of data transmission. This technology only works on high frequency radio signals. Otherwise, it will not work properly. Nowadays this technology is used as office or home network and in many electronic devices. Wireless LAN or WiFi is divided into three main parts on which its whole working depends and all of its applications also depend on these parts i.e. infrastructure mode, ad hoc network and mixed network.


Zigbee technology :

A type of low cost, low power and wireless technology which is used for the different purposes at ultra low power is known as Zig bee technology. Low power radios on the basis of standard personal wireless networking are used by a protocol to enhance the technology. It offers excellent wireless control path network. It was not proposed or designed for the excellent or high speed data transfer rate applications. But it was designed for working on excellent long battery timings at low cost and also at ultra low power consumption. It is an ideal technology which operates at low power and low cost and used for wireless monitoring and control.

Wimax technology :

One of the important wireless technologies another technology is present that is called as Wimax technology. It is defined as a type of the wireless networking technology that is required to transmit the information in the form of microwaves through different type of methods of wireless networking from point to point or multi point access top the devices which are portable in nature. Wimax technology is categorized into two types that are Fixed Wimax and the mobile Wimax.


Voice communication (Voip ):

Voice communication is also the types of wireless technologies. In this types all the types of technologies related to the communication through the voice is included such as communication through different types of cell phones, through different types wireless internet technologies etc


Bluetooth technology :

Other important type of wireless technology is the Bluetooth technology that is used to transmit the data from one device to another device with the help of mobile phone technology.