Tuesday, August 13, 2013

How to know a wireless network secure or not?

There is no way to guarantee complete security on a wireless network. However, there are precautions you can take to help minimize security risks when you use a wireless network.

Whenever possible, only connect to wireless networks that require a network security key or have some other form of security, such as a certificate. The information sent over these networks is encrypted, which can help protect your computer from unauthorized access. When you view available wireless networks in Connect to a Network, wireless networks that do not have security enabled will be identified with a yellow shield icon.

Before you connect to a network provided by a wireless Internet service provider (ISP), such as a public network in a coffee shop or airport, read the privacy statement carefully and make sure that you understand which files, if any, are saved to your computer and what type of information the network provider collects from your computer.

If you connect to a network that's not secure, be aware that someone with the right tools can see everything that you do, including the websites you visit, the documents you work on, and the user names and passwords you use. Make sure that you don't work on any company sensitive information or visit password protected areas of your business network while you're connected to that network.

What is Network Access Protection?

Network Access Protection (NAP) is a platform that network administrators can use to help protect the security of a network. When you connect to a corporate network that uses NAP, your computer is checked to make sure that it has the required software and settings, and that the software and settings are up to date. If anything is missing or outdated, your computer can be automatically updated. Your network access might be limited during that time, but usually this process happens quickly, after which full network access is restored.


Why should I secure my wireless network?

Wireless networks are more flexible than wired ones, but they can also be more vulnerable to hackers or malicious software (such as worms). Because wireless networks use radio waves that can pass through walls, your network's signal could go beyond the boundaries of your home.

If you don't try to secure your network, people with computers nearby might be able to access the information stored on your network computers and use your Internet connection to get onto the web. By setting up a security key on your wireless network, you can help protect it from unauthorized access.

What is InPrivate Browsing?

InPrivate browsing enables you to surf the web without leaving a trail in Internet Explorer. This helps prevent anyone else who might be using your computer from seeing what sites you visited and what you looked at on the web. You can start InPrivate browsing from the New Tab page or the Safety button.

When you start InPrivate browsing, Internet Explorer opens a new browser window. The protection that InPrivate browsing provides is in effect only during the time that you use that window. You can open as many tabs as you want in that window, and they will all be protected by InPrivate browsing. However, if you open another browser window, that window will not be protected by InPrivate browsing. To end your InPrivate browsing session, close the browser window.

While you are surfing the web using InPrivate browsing, Internet Explorer stores some information such as cookies and temporary Internet files, so the web pages you visit will work correctly. However, at the end of your InPrivate browsing session, this information is discarded. The following table describes which information InPrivate browsing discards when you close the browser and how it is affected during your browsing session:


Information                   How it is affected by InPrivate Browsing

Cookies                      Kept in memory so pages work correctly, but cleared when you close the browser.

Temporary                     Stored on disk so pages work correctly, but deleted when you close the browser.
Internet Files

Webpage history             This information is not stored.

Form data and                 This information is not stored. 
passwords

Anti-phishing                Temporary information is encrypted and stored so pages work correctly
cache

Address bar and             This information is not stored. 
search AutoComplete

Automatic Crash            ACR can restore a tab when it crashes in a session, but if the whole window
Restore (ACR)              crashes, data is deleted and the window cannot be restored.


Document Object            The DOM storage is a kind of "super cookie" web developers can use to retain
Model (DOM) storage      information. Like regular cookies, they are not kept after the window is closed.