Você está na página 1de 19

Do you want to have a

convenient and direct access


in your transactions?

Sept.16 2005
Introducing…

Wireless Lan

Sept.16 2005
What’s inside

What is wireless LAN?


History of wireless LAN
Three transmission techniques
Advantages in using wireless LAN
What is war driving?
Tips in protecting WLAN from war driving

Sept.16 2005
What is wireless LAN?

Wireless LAN is a
type of local area
network that uses
high frequency radio
rather than wires to
communicate
between nodes.

Sept.16 2005
History of wireless LAN
The first radio
network technology
was developed at
University of
Hawaii in a research
project call
ALOHANET. The
ALOHANET system
allows computer
with 7 sites, which
spread out in four
islands without
using any wired
four islands
transmission links.

Sept.16 2005
History of wireless LAN

In 1980 the
hobbyists (ham)
in Canada and
US had
developed the
equipment call
TNCs (terminal
node controller). Terminal node controller

Sept.16 2005
Three transmission techniques
Spread spectrum

Is currently the most


widely used
transmission
technique for
WLAN. It was
initially developed
by the military to
avoid jamming and
eavesdropping of the Spread spectrum

signals.

Sept.16 2005
Narrowband microwave

Microwave
technology is not
really a LAN
technology. It’s main
use is to interconnect
LAN between two
building.

Narrowband microwave

Sept.16 2005
Infrared

Used infrared signals


to transmit data. This
is the same technology
used in products like
remote controls for
television and VCR’s.

Sept.16 2005
Advantages in using wireless LAN

Mobility

Installation speed and simplicity

Installation flexibility

Reduced cost-of-ownership

Sept.16 2005
What is war driving?

War driving is driving


around a city searching for
the existence of (WLAN).

It’s locating and logging


wireless access points while
in motion.

This task is automated using


dedicated war driving
software and GPS unit.

Sept.16 2005
Tips in protecting WLAN

Change the default password on your Access


point.

Use a proxy with access control for outgoing


requests (web proxy and others).

Regularly tests the security of your wireless


network, using the latest war driving tools.

Sept.16 2005
Tips in protecting WLAN
Enable strict LOGGING on all devices and
check your wireless log files regularly to see
if your security policy is still adequate.

Don’t give passwords, account nos. or credit


card details if you’re not confident that the
website is real or genuine.

Turn off or remove your wireless card when


not accessing a hot spot to deny hackers any
opportunity to get into your computer.

Sept.16 2005
summary

Using wireless LAN brought a lot of


advantages in our daily transactions.
But let us not try to forget that
there are hackers who try to
invade our computer destroying
everything. Don’t wait until
complete stranger are abusing
your computer.
Be wise…

Sept.16 2005
It’s better to be careful
rather than regretting
things at the end.

Sept.16 2005
Back up

Wireless LAN card hackers War driving tools

Access point
GPS unit motherboard

Sept.16 2005
Style:

Sept.16 2005
(2) In tree structures, a point where two or more lines meet.

e system, the cable TV system or the Internet. Fiber-optic lines are strands of optically pure glass as thin as a human hair that carry digital information over long dist
ht pulses along a glass or plastic wire or fiber. Optical fiber carries much more information than conventional copper wire and is in general not subject to electromagn

• To take or carry from one place to another; transport.


• To serve as a medium of transmission for; transmit: wires that convey electricity.
• To communicate or make known; impart: “a look intended to convey sympathetic comprehension”

A hobby is a spare-time recreational pursuit. An activity or interest pursued outside one's regular occupation and engaged in primarily for pleasure.

• To change keys within a piece of music

• To alter the function or status of something in response to a stimulant

• To "change". A signal can be transmitted via a carrier wave, by modulating the wave to represent the signal.

• The intentional transmission of radio signals in order to interfere with the reception of signals from another station.

• Deliberate interference intended to prevent reception of signals in a specific frequency band.

• The act of intentionally directing electromagnetic energy at a communication system to disrupt or prevent signal transmission.

ne who participates in eavesdropping, i.e. someone who secretly listens in on the conversations of others, is called an eavesdropper. The origin of the term is literal, f

The work or business of felling and trimming trees and transporting the logs to a mill.

• in a catalog or index, a heading that may be used to find information on an item. Common access points include author, title, and assigned subject headings.

ode in a bibliographic record under which library materials may be searched, identified, and retrieved. In a broader sense, any unique element which serves as a poin

• Searchable fields of a record in a database used to retrieve information. These fields can include the author's name, subject, date, title, etc.

• march aggressively into another's territory by military force for the purposes of conquest and occupation; "Hitler invaded Poland on September 1, 1939"
• intrude on: to intrude upon, infringe, encroach on, violate; "This new colleague invades my territory"; "The neighbors intrude on your privacy

al digital assistants (PDAs) (or Handheld PCs in the Microsoft vernacular). The Windows CE graphical user interface (GUI) is very similar to Windows 95 so devices

DOCKING STATIONS
Sept.16 2005
model computer. When it is taken out, it becomes a portable computer again. Most importantly, the same data is accessible in both modes because it resides on the

Você também pode gostar