Another component of the internet that I see going forward is the ability to watch TV programs, on your computer, via your broadband connection (i.e. cable, DSL). Currently, one of the most recognized names in internet television, is Hulu. Hulu provides a broad array of programs and clips in a very easy to navigate site interface, with some of the content being in high definition. Hulu does not have everything, but it is a start. It is definitely a great entertainment resource and will only get better.
Ever since the start of this blog, it has amazed me the number of quality blogs and sites I have found that promote freeware, open source software and information technology.
On the right side of the blog you will see a listing of “What’s On My PC Website Favorites”. I started searching the top blog services and found 22 additional “up-to-date” sites which I have added to the listing. The criteria I look for in a blog or site is that it is being maintained and kept current. The authors of all of these blogs or sites are to be applauded for their efforts.
A techie friend of mine, whom I will refer to as Jeremiah, contacted me and suggested I write a post about the security vulnerabilities in wireless networks and how easy it is to penetrate those networks with software that is readily available on the internet.
To establish a wireless network, you need a wireless router which is available in any popular computer store. Wireless routers are actually wired routers with wireless access points built in so you can have wired and/or wireless at the same time. The most common scenario or reason for the purchase of a wireless router is that a notebook computer has been purchased with wireless capability and the user desires to use the notebook to wirelessly connect to the internet in the home. I know for fact that many of my acquaintances, who have set up a wireless router/network, followed the “basic” installation instructions to setup the router; and, with minimal hassle had the router up and running in no time. However, one of two things usually occurs. They either setup the router with no security at all OR they implement some security measures thinking their network is secure.
Many of today’s wireless routers have the capability to reach great distances outside the walls of the home, which allows outside intruders to easily connect to your network/router. To avoid a lengthy post, I opted to post information that Jeremiah provided, which provides information & tools used to infiltrate a wireless network AND then I have followed up with information on steps you should take to properly secure your wireless network. The main point in all of this is that you “need to know” how readily available this information is on the internet to exploit a network AND that there are really simple measures you can follow to prevent an intrusion.
How your wireless network can be infiltrated:
- How To Crack WEP – Part 1: Setup & Network Recon : Introduction (Tom’s Guide)
- How To Crack WEP – Part 2: Performing the Crack : Introduction (Tom’s Guide)
- Auditor Security Collection CD reviewed : Introduction (Tom’s Guide)
- Back Track (Remote-Exploit)
- Wardriving Tools, Software & Utilities (Wardrive.net)
What you can do to protect your network:
I’ve been using Google Chrome since the “beta” was introduced earlier in the month. So far, I like it… Keep in mind it is in the “early” development stages and I think it will be a top contender in the browser competition. I have posted on the sidebar, of the blog, some Google Chrome links that you can use to download and/or to follow the development of this browser. I’ve been following the reviews on the browser and right now it is a mixed bag of positive and negative comments; which, is typical of “beta” software. For a “beta” package, it has come out of the chute running.
Here is a program that I have used and have been following since its’ inception. JDVoiceMail is a program where you are prompted to record a “voice” message, using your microphone, then send the recorded message (voicemail) to an email recipient. When you record the message, JDVoiceMail generates a compressed .wav or .mp3 sound file(s). The compression ratio on these sound bites are tremendously reduced without loss of quality. The recipient of your recorded message does not need any special software to listen to the message. When the recipient receives the voicemail, via their email client, they simply double click on the sound file attachment and the default audio player installed on their system will takeover and play the message. According to the web site, “If you are lazy and don’t like typing your e-mail, this is the tool for you!”
Features (as indicated on the web site):
- Works with the Windows® bundled ACM codecs (Present in all 32 bits windows versions).
- You can select the codec of the output voice file.
- Only 32 KB for a 30 second voice message with the DSP True Speech® Codec.
- Only 50 KB for a 30 second voice message with the GSM 6.10® Codec
- Only 30 KB for a 30 second voice message with the Lame MP3® Encoder
- With the MP3 format, Linux, Mac, Pocket PC and Palm users can listen your messages too.
- Simple, minimalist and intuitive graphic interface.
- Send the voice file automatically with your favorite pop3 email client or save it in a hard disk folder for use with your web-based email account.
- Compatible with all MAPI e-mails clients (Mozilla Thunderbird®, Eudora®, Outlook Express®, etc…).
- Easily share JDVoiceMail with your friends (Less than 1,50 MB for the installer file).
- JDVoiceMail is 100% freeware, no ads, no limitations, no adware, no banners, no spyware etc….