?
Solved

Public Wi-Fi

Posted on 2014-04-25
6
Medium Priority
?
324 Views
Last Modified: 2014-04-29
What are the settings to configure a laptop to protect it from attacks especially video, audio, files and folders from bee stealing over public Wi-fi ?
0
Comment
Question by:toddcares
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
6 Comments
 
LVL 36

Accepted Solution

by:
Kimputer earned 1500 total points
ID: 40022288
Have username/ strong password installed on your PC. Always have Windows up to date. Enable Firewall (don't allow any rules for Public). When connecting to a public Wifi, your computer usually asks which profile to use, click Public.
These default settings are high enough to protect you against prying eyes.
0
 
LVL 37

Expert Comment

by:bbao
ID: 40022479
as Kimputer mentioned, it is essential to apply the LATEST updates and block ALL incoming access in order to protect your local files to be directly accessed over the public WiFi.

but that only protects PART of the surface of attack when you connect your laptop to a public WiFi. the prying eyes around you can still "see" what you are doing over the public WiFi, including, but not limited to, your web search, your online chat, your computer name, your company domain if any, your mail server and ports, and probably your private IP at home if you got a network printer on home LAN. the even dangerous thing is, because the eyes are physically close to you, they may physically locate you, recognise you and then trace you to learn more about you in minutes. your credit card number if you used it at the cafe of the public WiFi, your car's plate number, and your photo if they like to remember you, all of these can be obtained instantly. i am not trying to scare you, that's something happening every day.

therefore, at first, having security awareness is essential; secondly, always working on secured connection is a must, whatever it is web search or chat, and of course your email. secure anything!

you also need to unbind File and Print Sharing and SMB client from your wireless adapter, also disable outgoing broadcast using your firewall. in a few words, make your computer a silent device on a public network.

does it make sense?
0
 
LVL 75

Expert Comment

by:käµfm³d 👽
ID: 40023225
Also be mindful of which networks you are connecting to. It is very easy to set up a "rogue access point" that mimics a legitimate wifi hotspot. With such a thing, you would actually be connecting to hardware controlled by an attacker rather than the actual access point you are trying to connect to. If you connect to such, then an attacker can see all of the things you do online. Always check with the owner of the wifi network to ensure what the name of their access point is, and alert them if you happen to see two names that are similar. They should be able to confirm whether or not each is authentic.
0
Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

 

Author Closing Comment

by:toddcares
ID: 40026854
How to
unbind File and Print Sharing and SMB client from your wireless adapter, also disable outgoing broadcast using your firewall
0
 
LVL 36

Expert Comment

by:Kimputer
ID: 40027866
Start > Run > ncpa.cpl (Enter)
Double click the Wi-Fi adapter, Properties, uncheck the box for Microsoft Networking.
0
 

Author Comment

by:toddcares
ID: 40029165
Thank u bro
0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Provide an easy one stop to quickly get the relevant information on common asked question on Ransomware in Expert Exchange.
Envision that you are chipping away at another e-business site with a team of pundit developers and designers. Everything seems, by all accounts, to be going easily.
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
This is my first video review of Microsoft Bookings, I will be doing a part two with a bit more information, but wanted to get this out to you folks.
Suggested Courses

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question