Solved

Public Wi-Fi

Posted on 2014-04-25
6
308 Views
Last Modified: 2014-04-29
What are the settings to configure a laptop to protect it from attacks especially video, audio, files and folders from bee stealing over public Wi-fi ?
0
Comment
Question by:toddcares
6 Comments
 
LVL 35

Accepted Solution

by:
Kimputer earned 500 total points
ID: 40022288
Have username/ strong password installed on your PC. Always have Windows up to date. Enable Firewall (don't allow any rules for Public). When connecting to a public Wifi, your computer usually asks which profile to use, click Public.
These default settings are high enough to protect you against prying eyes.
0
 
LVL 37

Expert Comment

by:Bing CISM / CISSP
ID: 40022479
as Kimputer mentioned, it is essential to apply the LATEST updates and block ALL incoming access in order to protect your local files to be directly accessed over the public WiFi.

but that only protects PART of the surface of attack when you connect your laptop to a public WiFi. the prying eyes around you can still "see" what you are doing over the public WiFi, including, but not limited to, your web search, your online chat, your computer name, your company domain if any, your mail server and ports, and probably your private IP at home if you got a network printer on home LAN. the even dangerous thing is, because the eyes are physically close to you, they may physically locate you, recognise you and then trace you to learn more about you in minutes. your credit card number if you used it at the cafe of the public WiFi, your car's plate number, and your photo if they like to remember you, all of these can be obtained instantly. i am not trying to scare you, that's something happening every day.

therefore, at first, having security awareness is essential; secondly, always working on secured connection is a must, whatever it is web search or chat, and of course your email. secure anything!

you also need to unbind File and Print Sharing and SMB client from your wireless adapter, also disable outgoing broadcast using your firewall. in a few words, make your computer a silent device on a public network.

does it make sense?
0
 
LVL 75

Expert Comment

by:käµfm³d 👽
ID: 40023225
Also be mindful of which networks you are connecting to. It is very easy to set up a "rogue access point" that mimics a legitimate wifi hotspot. With such a thing, you would actually be connecting to hardware controlled by an attacker rather than the actual access point you are trying to connect to. If you connect to such, then an attacker can see all of the things you do online. Always check with the owner of the wifi network to ensure what the name of their access point is, and alert them if you happen to see two names that are similar. They should be able to confirm whether or not each is authentic.
0
Backup Your Microsoft Windows Server®

Backup all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

 

Author Closing Comment

by:toddcares
ID: 40026854
How to
unbind File and Print Sharing and SMB client from your wireless adapter, also disable outgoing broadcast using your firewall
0
 
LVL 35

Expert Comment

by:Kimputer
ID: 40027866
Start > Run > ncpa.cpl (Enter)
Double click the Wi-Fi adapter, Properties, uncheck the box for Microsoft Networking.
0
 

Author Comment

by:toddcares
ID: 40029165
Thank u bro
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Is CCleaner a virus?  Do you use CCleaner? 18 209
DDOS against DYN 9 117
Changing the domain admin password 9 74
GPO not applying to designated group-- Server 2012R2 2 56
You cannot be 100% sure that you can protect your organization against crypto ransomware but you can lower down the risk and impact of the infection.
I've been an avid user and supporter of Malwarebytes Premium Version 2.x for years. It's an excellent product that runs alongside just about any Anti-Virus application without issues. It seems to have an uncanny ability to pick up many things that A…
This tutorial gives a high-level tour of the interface of Marketo (a marketing automation tool to help businesses track and engage prospective customers and drive them to purchase). You will see the main areas including Marketing Activities, Design …
Many functions in Excel can make decisions. The most simple of these is the IF function: it returns a value depending on whether a condition you describe is true or false. Once you get the hang of using the IF function, you will find it easier to us…

910 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

24 Experts available now in Live!

Get 1:1 Help Now