Posted by Michael Horowitz Post a comment
* Share
If there was ever a place for Defensive Computing it's at a hacker conference. So today, while attending The Last HOPE conference a number of my previous postings came to mind.
First there was the list of available Wi-Fi networks (see below) at the conference which, at times, showed four computer-to-computer networks (using the Windows XP terminology). These networks, also known as ad-hoc networks, are not governed by a router. While they may be set up on purpose, they are more likely to be accidental creations on the part of non-technical computer users, or, a purposeful trap set by someone with ill intentions. I wrote about this back in May, see A Warning About Free Public Wi-Fi.

Everyone knows not to send anything sensitive, such as a password, over a wireless network. At a hacker convention, even a wired Ethernet connection to the outside world should be treated with caution. Not to pick on hackers, at any convention or at any hotel, a wired Ethernet connection deserves the same caution as a public wireless network. Back in January, I wrote that "Wired connections to the Internet in a hotel are not, by their very nature, more secure than wireless connections." See Ethernet connections in a hotel room are not secure.
What to do? Rent a personal VPN.
The classic use for a VPN is an employee of a company using it to make a secure, encrypted connection to the home office. But, someone without a corporation, can rent a VPN that offers a secure connection to the VPN provider. Once data gets to the VPN company, they dump it, unencrypted, on the Internet with everything else. The point being to encrypt everything coming into and out of your computer to protect it from any local bad guys.
The down side is speed. The speed test at Speakeasy.net showed that while I was connected to my VPN, the speed dropped by over half compared to using the Internet in an unprotected way.
The laptop I had with me was running the Online Armor firewall instead of ZoneAlarm and, as I noted a few days ago, I really missed not being able to see a log of intrusion attempts on my machine. At home, behind a router on my personal LAN, this isn't very interesting, but at a hacker conference, using a shared Wi-Fi network, it would have been fascinating to see who, if anyone, was knocking on my virtual door.
What to do? Rent a personal VPN.
The classic use for a VPN is an employee of a company using it to make a secure, encrypted connection to the home office. But, someone without a corporation, can rent a
No comments:
Post a Comment