Article Categories
» Arts & Entertainment
» Automotive
» Business
» Careers & Jobs
» Education & Reference
» Finance
» Food & Drink
» Health & Fitness
» Home & Family
» Internet & Online Businesses
» Miscellaneous
» Self Improvement
» Shopping
» Society & News
» Sports & Recreation
» Technology
» Travel & Leisure
» Writing & Speaking

  Listed Article

  Category: Articles » Technology » Computers » Article
 

Do You Have An Evil Twin?




By Lynn Chan

What you don't know can hurt you. Next time you connect to one of them, be very observant you're connecting to a legitimate one and not an evil twin.

What is an evil twin?
They are fake Internet gateways posing as a legitimate wifi hotspots. Supposing you visit the local Internet cafe who has a paid hotspot. You boot up your notebook computer, your wifi connection software seeks out available networks and gives you an option of two (maybe more) networks you can get online with. One of them is from the Internet cafe, but wait. You see one that says "Free Wifi courtesy of Wifi Hotspots Nation" or whatever. Everyone loves a deal, who do you get on with? If you chose the one from Wifi Hotspots Nation, then you may have connected to the Internet on the Evil Twin's network. Note Wifi Hotspots Nation is a fictitious name I created but that is the irony. An evil twin usually operates using a fictitious or deceptive name that's always changing. Since there is no authority governing the names of wifi hotspots, there is nowhere you go to check up on their legitimacy.

Wifi hotspots networks are like doors. In one place (hotspot) you can have many doors. Through one door, you can enter a solid brick room and do what you like since no one is watching you. Through another, you enter into a room with a two-way mirror where someone is watching and recording your activity quietly without you knowing. Both doors are marked in a way you think you're going to the same place but in reality you're not. One of them is really an evil twin; A wolf in sheep's clothing.

Enough about doors and sheep, what does this mean to you? I think you're smart enough to figure it out by now. By connecting to the evil twin, it's easy for the people running it to capture any information you're entering onto websites or even snoop around in your computer and private files. And while they're there, why not drop some kind of malicious software that'll run in the background you'll never even know was there. Who knows that they do.

Aren't these fake wifi hotspots easy to detect?
If you're the owner of the legitimate wifi hotspot, you can tell which network belongs to you or not but not to the average user because they aren't visible and it's very easy to setup wifi hotspots. You and I can do it. There are no alerts and sadly, often the people who work at these hotspots aren't knowledgeable enough to warn you either. The person sitting next to you whom you think is doing work online could be operating an evil twin, or they could be one of those duped by one.

What do you do?
In an ideal world, don't connect to wifi hotspots networks or don't get on a public wifi at all. If you absolutely must get an Internet fix, don't conduct online transactions like buying stuff, logging into your online bank or any place you'd be asked for sensitive information.

Next, disable all kinds of file or print sharing. If using WindowsXP operating system, go to Start, Control Panel and then Network Connections. Right click on the Internet connection or the Network connection and select Properties. In the General tab, locate and uncheck File and Printer Sharing. Click apply.

If you set up your notebook computer to connect automatically whenever a network is found, you'd want to disable that or change it to manual connection.

Make sure your firewall is turned on and any antivirus software is up to date.

As a good practice, if you have any sensitive files or information on your computer, consider putting them into one or several dedicated folders and then securing those folders by making them private. In WindowsXP, select the folder in question, right click on it and select properties. In the sharing tab, locate and check "Make this folder private".

These suggestions aren't fool proof but can help put stumbling blocks in an offender's path. The best protection is still being knowlegeable about wifi hotspots networks and not to connect to a suspicious network. And if you're in doubt, don't connect at all.

Sidenote: Similarly, if your neighbour offers their wifi network for you to use, make sure this is someone whom you trust.


 
 
About the Author

Lynn Chan simplifies computing and computer care issues for new notebook computer owners. Start protecting your investment, with a free notebook computer care ecourse



Article Source: http://www.simplysearch4it.com/article/14839.html
 
If you wish to add the above article to your website or newsletters then please include the "Article Source: http://www.simplysearch4it.com/article/14839.html" as shown above and make it hyperlinked.



  Some other articles by Lynn Chan
5 Things You Can Do With Flash Memory
Got flash memory cards? They aren't only for your digital camera. Probably the coolest yet overlooked ways to use your flash memory card is as floppy drive replacement. Think about it, a flash memory card ...

Wireless Home Networking - What You Should Know
Are you suffering from home wireless networking nightmare? There are so many options. 802.11a, 802.11b, 802.11g – what is all that? All ...

Backup -- But Where To?
We all know we have to backup regularly, but those backups files can get huge. Add that to your existing your files and your notebook ...

Be A Good Email Sender - 7 Habits To Cultivate
Do you ever get an email from someone, roll your eyes and think "Oh it's him again". You know the type who never stops forwarding you crass jokes or life's teachings you never read. Email ...

  
  Recent Articles
Microsoft Word. The power is under the hood
by Robert Duval

How To Select The Best Gaming Laptops
by Tim Childree

How To Select The Best Business Laptops
by Tim Childree

High-Tech Computer Rental for Business Promotion
by Michael Braganza

Managing a Worldwide Print Infrastructure from a Single Workstation in a Central Location
by Rick Ferguson

A Sneak Peek Into The World Of Refurbished Laptops
by Javier Fuller

Battery information
by goodbattery

Tell Me About Computers
by Khal Nuwar

Setting Up Your Own Internet Radio Station
by Jason Cole

Understanding Solar Energy
by Anna Stone

Mac FAXstf X Pro Faxing Program for Mac OS X Users
by Nivea David

How to Retrofit a Picture or an Image into Desktop Wallpaper for Your Computer
by Steve Dimeck

Wallpaper Choosing For Good Mood
by Dalvin Rumsey

Software Discounts
by Joe Cohen

Can't connect to database