Setup Wireless Networking



             


Saturday, March 8, 2008

Bluetooth GPS: Where PC And Position Meet

Technology has brought about many ingenious devices. It drives on. The Personal Computer began limited programming tools that could do much, but required programming that wasn't available. That changed dramatically over a quarter of a century.

Along the way many wireless technologies such as Blue tooth came that make it even handier than ever; eliminating mounds of wires that made up computer systems all over. The GPS unit has done the same in respect to stacks of maps to spill coffee on and lose to water damage over time.

GPS and Blue tooth technologies have met, and life will never be the same! Blue tooth GPS features make the best of both worlds. On one side you have an interactive device that is highly specialized in being on the move. Maps, position, and even finding resources wherever you are among the benefits. It has storage limits and of course is specialized and compact.

While the PC has connected to many GPS units at some level, today without wires the interoperability has exploded in capability thanks to Blue tooth wireless technology.

What Makes The Blue tooth GPS Tick Usefully?

Blue tooth technology is a revolutionary medium for small-area networking. With a Blue tooth GPS data is passed to your computer via this wireless network without requiring your involvement. No longer do you have to figit with connectors that ultimately wear out where they screw in to put your latest travels in for use with your favorite programs. Just come in range of your Blue tooth network signal with your GPS and a number of advanced features occur automatically. It's just as easy to send data into your GPS as well.

It's wise to understand how the Blue tooth technology works, so you can understand configuration parameters that keep your information yours; though like any technology today there have been privacy considerations. Understanding is wise to be sure you authorize what goes where.

Getting Your Own Blue tooth GPS

New models of Blue tooth GPS are added monthly as old ones are pulled from the market. Popularity has made it move that fast. They range in features with price tags that move accordingly. When shopping for a Blue tooth GPS you should spend adequate time to become familiar with all the features and models; then decide what is best for your situation.

A great place to start is the manufacturer's websites. There you will see all of their latest offerings and usually with full details. You can also find many user experiences and reviews of the same on many sites. A great place to look for all of this is where you are now browsing. Have a look at all there is to offer and the links elsewhere that may even take you further.

In the end, probably your largest concern is whether a Blue tooth GPS will give you an advantage or sit in your closet. That probably should be the number one buying concern as they aren't the cheapest GPS you will find; though they offer time savings that you can spend more on your treks if you have a Blue tooth GPS.

To find out more about your Gps Device please visit the GPS Tracking System Site. Benjamin thoroughly recommends this site so be sure to check it out today here: - http://www.gpstrackingsystemsite.com For comprehensive and helpful GPS information.

Labels: , , , ,

Friday, January 18, 2008

Sony Ericsson K510i - A Bluetooth compatible camera mobile from Sony Ericsson

Mobile phone users have been a hard to satisfy lot. Their needs and requirements have evolved with time and as of now, they are not satisfied with simple connectivity any longer. They want their handsets to be sleek in their looks as well as versatile in their capabilities. Camera mobile phones, 3g mobile phones as well as phones with mobile music options are the latest rage among phone users both in the UK as well as in other parts of the world.

The Sony Ericsson K510i is one such mobile handset model that has left an undeniable impact on the psyche of phone users worldwide. In this article, we explore the reasons behind this trend.

First and foremost, it needs to be said that the Sony Ericsson K510i is a Bluetooth compatible mobile handset model that also comes with advanced imaging capabilities. This Sony mobile phone is equipped with a 1.3 megapixel digital camera, which can be used to take quality photos as well as to record video clips. As an owner of this mobile phone model, a person can be sure of capturing all the memorable moments of his life; all that he has to do is to bring out his handset and he can then click some of the most precious moments of his life for posterity. The color screen is another key feature of the Sony Ericsson K510i, which enhances the pleasure of a person in using it.

An owner of the handset can then share the images and video clips so taken with others as multimedia messages or send them by attaching them to their emails. They can send emails from their handsets; the Sony Ericsson K510i supports standard push mail. This means that emails that a person receives would be forwarded to his or her mobile phone. In addition, this Sony mobile phone can be connected to other Bluetooth compatible devices such as Bluetooth phones, headsets and laptops. For latest hands you are free to visit our latest mobile phones page.

Grace Lewis is an internet marketing professional. He maintains Mobile Phone Shop for online internet related businesses and services. For Cheap contract phones visit direct phone shop. You can find best mobile phone deals at phone shop uk.

Labels: , , , , ,

Friday, November 30, 2007

Road Warrior At Risk: The Dangers Of Ad-Hoc Wireless Networking

As a network security consultant, I travel quite frequently. At times, it seems like the airport is my second home. I actually like to fly, it's a moment in time where no one can reach me by e-mail, or mobile phone.

As a network security consultant, I travel quite frequently. At times, it seems like the airport is my second home. I actually like to fly, it's a moment in time where no one can reach me by e-mail, or mobile phone.

It never fails that something interesting happens to me at the airport. I've even met some famous people during my travels. A few months ago, I ran into Frank Bielec, from the TLC show, Trading Spaces. But one of my favorite things to do at the airport is browse the wireless Ethernet waves. I'm never really surprised at what I find. I'm just glad I know more about wireless Ethernet than the average road warrior.

The Dangers Of Ad-Hoc Wireless Networking

Most people who have wireless Ethernet at home, or the office, connect to the wireless network by attaching to a wireless Access Point, or AP. This method of wireless networking is called "Infrastructure Mode". If you have a secure wireless network configured in "Infrastructure Mode" you are using MAC address filtering, some level of encryption, and have made some additional changes to your AP in order to prevent just anyone from using it or capturing data. For more information on configuring your "Infrastructure Mode" wireless network take a look at the "Wireless Network Security" page at Defending The Net.

However, for those who are not using "Infrastructure Mode", and are configured to communicate from machine to machine, or "Ad-Hoc", there are a few things you should be aware of.

A wireless Ad-Hoc network allows you to communicate with other wireless Ethernet systems without using a wireless access point. It's kind of a peer to peer configuration and it works rather well. The problem is, most people just set it up, and forget about it. At home, it's not a huge problem, but when your on the road, it could cause you a great deal of grief. The airport is probably the best place to find Ad-Hoc networks. Business men and women, delayed once again, power up their laptops and get to work completing the days tasks, or planning tomorrows agendas.

I can't tell you how many systems I find in the airport configured this way. Not just in the terminal, but on the plane. About three months ago, just after we reached cruising altitude and were allowed to use our "approved electronic devices", I found that the gentleman two seats up from me had a laptop configured as Ad-Hoc. He walked by me about ten minutes later and commented on how much he liked my laptop. I thanked him, and asked if his laptop was on, and configured to use wireless Ethernet, he said yes.

To make a long story short, I showed him that I could see his laptops wireless Ethernet and informed him of the danger. He asked me if I could access his hard drive, and I told him that it might be possible. He asked me to see if I could, so I obliged. After configuring my laptop to use the same IP address class as his, and typing "net use * hiscomputersIPAddressc$ "" /USER:administrator", I received a notice that the connection was successful and drive Z: was now mapped to his computer. I performed a directory listing of his hard drive and the guy almost had a heart attack!

After this, he moved up to the seat next to mine and we spent the next hour or so configuring his laptop securely, starting with securing his computers local administrator account. At one point during the configuration, he made the statement that I got real lucky because his local admin account did not have a password. My response to him was, I get lucky quite often.

Who Else Has Your Client List

Just think of the possibilities. What do you have to lose if someone is able to just peruse the files and data on your laptop? Do you maintain your customer list on your laptop (Do you want this in the hands of a competitor)? How about your personal finances (Identity theft ring a bell)? So many people I talk to initially say, "I really don't have anything of great importance on this system". Then they think a little bit and start rattling of things they never really thought about before. All of a sudden, they get concerned.

The fact is, whether it be "Infrastructure Mode", or "Ad-Hoc" wireless Ethernet communications, if not properly configured and secured, can pose a significant risk. There are thousands of articles on the Internet about the dangers of improperly configured wireless networks, yet the number of unsecured networks seems to be getting greater, not less.

Strength And Posture Does Reduce Your Risks

Keep in mind that your objective should be to reduce the chances that you will become a target for computer compromise. When I was growing up in South Philadelphia, I remember my father telling me that when you walk down the street, especially in the evening, to walk tall, and project a position of strength and authority. Why, because thugs typically pick out those who look like an easy target. The same thing goes for computer security. Reduce the risks of becoming a target buy configuring your system with a strong security policy.

When I perform security assessments, I create a list of potential targets, and potential methods of compromise. I then prioritize that list by which system, with a particular vulnerability, may be easiest to compromise. Those at the bottom of the list typically never come on my radar screen; the best scenario it to keep of the radar altogether.

Conclusion

If your are using wireless Ethernet, no matter what configuration, follow a few rules and keep yourself secure against most common types of compromise.

1. Above all, make sure all your user accounts have strong passwords, especially those that have administrative control over your system;

2. Configure your wireless network to use some sort of encryption. I know there is a lot of concern about the "crackability" of WEP, but if this is all you have to work with, and then use it. It is still helpful;

3. If possible, use MAC addresses filtering to restrict unwanted systems from attaching to your wireless network;

4. Make sure the firmware for your AP's and wireless Ethernet cards are up to date. These updates can be found on your card or AP's support site.

Remember, if you are compromised over your wireless network it can be near impossible to track down where the attack came from. Worse yet, think about how many systems become compromised, and no one ever knows it?

Darren Miller is an Information Security Consultant with  over sixteen years experience. He has written many technology & security articles, some of which have been published in nationally circulated magazines & periodicals. Darren is a staff writer for www.defendingthenet.com and several other e-zines.

 

Labels: , , ,