Thursday, 13 December 2012
VIDYA BALAN will become SHIDHARTH THIRD wife tomorrow
Vidya Balan will be tied in matrimony yesterday. She is married to film distributor and producer Sidwarth Kapoor. After 24 hours, Vidya Balan, Siddharth Roy Kapur will become lore. It is getting married on December 14.Kanjivrm silk sari Vidya was very cute. The news that two people are going to get married in the temple in Chembur on Friday. From both the marriage has not said much about.
That being said, gazing at the wedding wear designer Sabyasachi Mukherjee designed silk saris. Vidya's wedding reception in Chennai. Vidya's wedding will include only two families. Significantly, the film actress Vidya Balan, UTV Motion Pictures CEO Siddharth Roy Kapur, she has been dating for a long time. Siddhartha's third wife after marriage will lore.
Siddhartha was first married to his childhood friend, but the two separated.Now it will be interesting to see what kind of career ahead of her marriage after learning supplement. Vidya's last two films 'Dirty Picture' and 'story' were hit.
Ad last week that her cancer was a girl and she's going to die in a few days, but died before he wants to marry, for which he has no money. What happened next, learn to read the news .. -
Some people lie to their objective, do not mind at all. It is a story of a woman (25) who had to resort to trickery to get married. Last year it published the news that her leukemia is cancer and she's going to die a few months later.she said that she want to marry but she dont have money.
As the news spread, and many people came forward to help him total 13 368 dollars (seven million) arrived. After getting the money she got married.after one year her hushband file for divorce and tell that she was a lier । The court sentenced as a young woman is ordered to return the money to the people concerned.
ABCD – Any Body Can DANCE Trailer INDIA'S first '3D' DANCE MOVIE
The Official Theatrical Trailer of ABCD – Any Body Can Dance (2013) starring Prabhu Deva, Lauren Gottlieb, Prince Gupta, Vrushali Chavan, Ganesh Acharya, Dharmesh Yelande, Mayuresh Wadkar.
ABCD – Any Body Can Dance Trailer
ABCD – Any Body Can Dance Movie Trailer Video Info:-
Director: Remo D’Souza
Producer: Ronnie Screwvala & Siddharth Roy Kapur
ABCD – Any Body Can Dance Trailer
ABCD – Any Body Can Dance Movie Trailer Video Info:-
Director: Remo D’Souza
Producer: Ronnie Screwvala & Siddharth Roy Kapur
Amul's paid tribute to sitar virtuoso Pandit Ravi Shankar
Amul's latest advertisment says goodbye to sitar virtuoso Pandit Ravi Shankar, who died on December 12 in San Diego. It shows the Amul girl with a sitar and looking at the stars which forms the shape of the instrument, with the tagline 'Sitaaron Ke Sitar'.
Sunny Leone is most searched CELIBRITY in 2012
'King of Romance' called first superstar of Bollywood actor Rajesh Khanna and his controversial statements Sukiryan second pick-actress
Poonam Pandey third.
Her debut film 'Student of the Year' to be enveloped by the heady acting Fourth Aliya Bhatt, the controversial religion Baba Guru Nirmal fifth of U.S. adults in the famous magazine Plebway Sherlyn Chopra nude photo Kinchakr discussion was ranked sixth.
Similarly, the late film director Yash Chopra seventh, recently Bebo 'scheduled to marry Nawab of Pataudi, Saif Ali Khan, eighth, ninth and Diana Panty former Maharashtra chief minister Vilasrao Deshmukh deceased persons to be higher in India Search In 10th place,
Google said that the range of films in 2012 in India was the Tiger 'film was the highest search. The 'Rowdy Rathore' and the third 'Jannat 2' is. According to Google, "was the Tiger" in the film world, was ranked as the seventh most searched films.
According to Google in terms of tourism, Kerala in India is the place to search. The symbol of love Taj Mahal and the third is the Wagah border. Similarly, in India before the search conducted in three cities Delhi, Mumbai, Bangalore, second and third place in the country's financial capital is called.
Google said that in 2012, 1,000 billion worldwide in 146 languages, which were based on the search list has been released.
Tuesday, 30 October 2012
Tuesday, 23 October 2012
Android's v2.3 mobile in only RS5900
Rs. 5,900
Micromax A87 NINJA 4.0 OverviewWith a bigger screen, faster processor & better viewing experience the A87 makes you ask, Why Y?
Presenting the A87, NINJA 4 – a next generation Superfone that helps you fast track your life. Now multitask with ease and get a fone that's as smart as you!
Presenting the A87, NINJA 4 – a next generation Superfone that helps you fast track your life. Now multitask with ease and get a fone that's as smart as you!
Technical Specifications for Micromax A87 NINJA 4.0
General
2G Network
3G Network
Display
Type
Size
Features
Memory
Phonebook
Call Records
Internal
Card Slot
Data
GPRS
EDGE
WLAN
USB
Bluetooth
3G
Camera
Primary
Video
Secondary
Sound
Alert Type
Loudspeaker
3.5mm jack
Features
Messaging
Browser
Radio
GPS
Games
Java
Colors
Battery
Capacity
Stand by time
Talk Time
Saturday, 20 October 2012
Iron man is back with IRON MAN 3
The sequel of Iron Man and Iron Man 2 is ready to be released. The trailer of Iron Man 3 is releasing on this Tuesday, October 23, 2012. The shooting of Iron Man 3 began on May 23, 2012, and it took place in North Carolina, with additional filming scheduled to take place in Florida and China. Iron Man 3 is the first film to be launched in Marvel’s “Phase Two” and the movie Iron man 3 is based on their superhero comics.
Star cast of Iron man 3
- Robert Downey Jr. as Tony Stark / Iron Man.
- Gwyneth Paltrow as Virginia “Pepper” Potts Stark’s girlfriend.
- Don Cheadle as USAF Lt. Col. James “Rhodey” Rhodes / War Machine Stark’s best friend.
- Guy Pearce as Aldrich Killian The creator of the Extremis virus.
- Rebecca Hall as Dr. Maya Hansen One of the Extremis creators.
- James Badge Dale as Eric Savin.
- Jon Favreau as Happy Hogan Tony Stark’s bodyguard and chauffeur.
- Ben Kingsley as The Mandarin The leader of a terrorist organization.
- Ashley Hamilton as Jack Tagger / Firepower.
- Wang Xueqi as Chen Lu.
- Director- Shane Black.
- Producer- Kevin Feige.
- Screenplay- Drew Pearce & Shane Black.
- Music Brian- Tyler.
- Cinematography- John Toll.
- Release date- May 3, 2013.
Wednesday, 17 October 2012
FACEBOOK ALERT ! ! To stay PRIVATELY connected with frnds
To all my FB friends,
I request you to please do something for ur privacy: I you
to stay PRIVATELY connected with frnds. However,
with the recent changes in FB, the public can now see
activities in any wall. This happens when our friend
I request you to please do something for ur privacy: I you
to stay PRIVATELY connected with frnds. However,
with the recent changes in FB, the public can now see
activities in any wall. This happens when our friend
hits "like" or "comment", automatically, their friends would see our posts too. Unfortunately, we cannot
change this setting by ourselves because Facebook
has configured it this way. Only
you can do this for yor self. PLEASE place your mouse
over my name above (do not click), a window will
appear, now move the mouse on “FRIENDS" (also without clicking), then down to "Settings", click here
and a list will appear. REMOVE the TICK on "COMMENTS
& LIKE" and "PHOTOS" by clicking on them. By doing
this, my activity amongst my friends and my family
will no longer become public. Many thanks! Paste this
on your wall so your contacts would follow suit too, that is, if you care about your privacy.
change this setting by ourselves because Facebook
has configured it this way. Only
you can do this for yor self. PLEASE place your mouse
over my name above (do not click), a window will
appear, now move the mouse on “FRIENDS" (also without clicking), then down to "Settings", click here
and a list will appear. REMOVE the TICK on "COMMENTS
& LIKE" and "PHOTOS" by clicking on them. By doing
this, my activity amongst my friends and my family
will no longer become public. Many thanks! Paste this
on your wall so your contacts would follow suit too, that is, if you care about your privacy.
Top CS IT companies FOR jobs(IF LOW PERCENTAGE) but high SALARY
TOP CS/IT COMPANIES ARE:
1.
Oracle India | Hardware and Software, Engineered to Work Together
2.
4.
6.
7.
8.
Tuesday, 9 October 2012
Salman Khan To Adopted Real Tigers
Actor Salman Khan recently has got a new names as ‘Tiger’ because of his recent movie ‘Ek Tha Tiger’ super success. Seems like Salman Khan is taking the name Tiger very serious.Buzz is that,Salman is planning to adopt Real Tigers.
According to the sources,Salman has been approached by the Lucknow Zoo with a request to adopt their tigers. It is believed that the Director of Lucknow Zoo has written a letter to the actor requesting him to adopt the royal animal in order to create awareness about their sinking population.
Saturday, 6 October 2012
GOVINDA and PRIYANKA upcoming movie 'DEEWANA MAIN DEEWANA' FIRST LOOK
Banner
- Sangeeta Pictures
Status
- Completed
Release Date
- 28 Sep 2012
Genre
- Comedy,Romance,Thriller
Producer
- Amit Kumar Bokadia
Star Cast
- Govinda
- Priyanka Chopra
- Nazir Khan
- Kader Khan
- Prem Chopra
- Johny Lever
- Shakti Kapoor
Story / Writers
- K C Bokadia
Music Director
Bappi LahiriBappa LahiriLanguage
HindiDirector
K C BokadiaLyricist
Maya GovindK C BokadiaEditor
Govind DalwadiCinematography
Amit RoyAction
Mahendra VarmaStudio
- Filmcity
Music Company
- T-Series
English Vinglish review: MUST WATCH
English Vinglish review: MUST WATCH
AS I WATCH ENGLISH VINGLISH and i am very thankful of english vinglish they improve the carreer of
shri devi .
After a 15 years, Sridevi has returned to do a meaty role in ‘English Vinglish’ and post watching the film, I have just one word for the actress - FLAWLESS!
Overall, ‘English Vinglish’ is a complete family entertainer and worth every penny! Yes, Sridevi is back!
Rating: 4(* * * *) cheers to Sridevi, perfect job!
out 5
AS I WATCH ENGLISH VINGLISH and i am very thankful of english vinglish they improve the carreer of
shri devi .
After a 15 years, Sridevi has returned to do a meaty role in ‘English Vinglish’ and post watching the film, I have just one word for the actress - FLAWLESS!
Overall, ‘English Vinglish’ is a complete family entertainer and worth every penny! Yes, Sridevi is back!
Rating: 4(* * * *) cheers to Sridevi, perfect job!
out 5
Thursday, 4 October 2012
Brand new MARUTI Alto 800 rivals
Brand new MARUTI Alto 800 rivals
Maruti Suzuki the indian & japanese companies now come with brand new ALTO 800 launching on 16 OCT 2012 hit in the INDIAN market they and auto guru expetcted to have a BIG HIT ACROSS country
however the company started pre-booking of ALTO 800.
Maruti Suzuki the indian & japanese companies now come with brand new ALTO 800 launching on 16 OCT 2012 hit in the INDIAN market they and auto guru expetcted to have a BIG HIT ACROSS country
however the company started pre-booking of ALTO 800.
Gearing up to take advantage of increased sales during the upcoming festive season, Maruti SuzukiIndia Limited (MSIL) will be launching their new Alto 800 next month. Maruti Alto 800 next gen is expected to be priced below Rs.2 lakhs, which will make it compete with the likes of Tata Nano and HyundaiEON. Alto 800 small car will take the place of MSIL best seller, current Alto, as the company comes out with a cheaper and highly fuel efficient vehicle which will also be offered with a CNG option.
The Indian auto sector has been witnessing falling sales due to high interest rates, rising fuel prices and hard-hitting market conditions, which have made auto companies sit up and take notice. MSIL are banking on their new Alto 800 to boost sales for the company's small car segment which has suffered falling sales in the period April to August 2012. During this time, sales of Alto have declined by 34.83% to 89,000 units as compared to 1.22 lakh units sold in the same period in 2011.
MSIL is hopeful that their upcoming Alto 800 will attract its fair share of customers specially due to the fact that it offers improved fuel efficiency of 22.74 kmpl which is 15% higher than the Alto. Besides this increased cabin space, improved gear shift and a brand new design should also appeal to buyers.
Tuesday, 2 October 2012
IIT JEE Advanced 2013 Exam Pattern
Examination Pattern of IIT JEE Main 2013
Subject combination for each paper and type of questions in each paper are given in the table below.
Course | Papers Required | Subjects | Type of Questions | Duration |
B.E or B.Tech | Paper I | Physics, Chemistry & Mathematics | Objective type questions with equal weightage to Physics, Chemistry & Mathematics | 3 Hours |
B.Arch or B.Planning | Paper II | Mathematics – Part I Aptitude Test – Part II Drawing Test – Part III | Objective type questions Objective type questions questions to test Drawing Aptitude | 3 Hours |
Syllabus for JEE-Main 2013 Exam
The syllabus for JEE Main 2013 exam is given on JEE Main site www.jeemain-edu.in. It is same as last year AIEEE syllabus. For the syllabus of JEE (advanced) please refer JEE-Advanced site jee.iitd.ac.in.
Negative Marking in JEE
There will be objective type questions with four options having single correct answer. For each incorrect response, one fourth (1/4) of the total marks allotted to the question would be deducted. No deduction from the total score will, however, be made if no response is indicated for an item in the answer sheet
No of attempts in JEE(Main) Exam
The number of attempts which a candidate can avail at JEE(Main) shall be limited to 3 (three) uniformly for all the candidates in consecutive years. The candidates passed +2 exam in 2011 or 2012 or appearing in +2 in 2013 are only eligible to appear in JEE Main 2013. Candidates passed +2 in 2010 or before or appearing in 2014 are not eligible to appear in JEE 2013.
Medium of JEE Main and Advanced
Hindi and English are the Medium of JEE Exam. The JEE Main examination will also be conducted in the Regional Languages of the State(s) on the requests of such State(s) who are participating in JEE (Main) for their State Engineering Colleges/ Universities.
The JEE Advanced will be conducted in English and Hindi medium only.
IIT advanced forms available from NOVEMBER 2012
The JEE Main online application forms will be available from 1st Nov 2012. The online forms will be available on JEE-Main website www.jeemain-edu.in.
JEE Main Onine Application Start Date | 1st Nov 2012 |
JEE Main offline Exam | 7th April 2013 |
JEE Main online Exam | Between 8th April to 30th April 2013 |
Last Date to Register for JEE Advanced | 13th May 2013 |
Pay Registration fee for JEE Advanced | 8th and 13th May 2013 |
JEE Advanced Exam Paper I | 2nd June 2013 9.00 - 12.00 A.M |
JEE Advanced Exam Paper II | 2nd June 2013 2.00 - 5.00 P.M |
Application cost
The cost of the JEE Main application will be updated after the announcement.
JEE Advanced Online Applications 2013 Details
After the results of JEE Main Exam 2013, the Top 150000 students are required to register online atjeeadv.iitd.ac.in to appear for JEE Advanced Exam.
Registraion Fee
- Rs.1800/- for General GE students.
- Rs.900/- for SC, ST, PD students.
- No Fee for all female (girl) students.
The registration fee has to be deposited between 8th and 13th May, 2013 in any branch of State Bank of India having Core Banking Services.
Hrithik and Katrina movie KNIGHT and DAY first look
Fox Star Studios is looking forward to make the Bollywood remake of the Hollywood film - 'Knight and Day'.
The 2010 romantic comedy directed by James Mangold starrer Tom Cruise and Cameron Diaz.
It is reported that in its Bollywood version Hrithik Roshan will be seen opposite Katrina Kaif.
Last time Hrithik and Katrina were seen together in Zoya Akhtar's hit movie 'Zindagi Na Milegi Dobara' and the pairing was received quite well by the audience.
Presently both stars are busy shooting their respective films. Hrithik will be seen in the famous franchise 'Krissh 2' while Katrina is starring opposite Shah Rukh Khan in 'Jab Tak Hai Jaan'.
The Hindi version of the film will have new twists and a whole different storyline.
The Hindi version of the film will have new twists and a whole different storyline.
The film will be directed by Siddharth Anand and will go on floors next year.
We have seen Hrithik and Katrina in ZNMD, and the screen presence of both the stars was superbly commended.
Now they are coming with Sequel of Hollywood Film , Knight and Day is a 2010 Hollywood film starring Tom Cruise and Cameron Diaz. The film, directed by James Mangold, had received mixed response at the box office. And now Hrithik and Kaif will be seen in the Hindi remake of the romantic action comedy. “We are making that film in Hindi. I can`t talk much about the project as it is too early. We have signed Hrithik and Katrina for the Hindi remake of the film and it will be directed by Siddharth Anand. It will go on the floors next year.” said Vivek Krishnani of Fox Star Studios in an interview.
Sunday, 30 September 2012
Online shopping security
Security Tips |
![]() |
- Online shopping security
|
While purchasing online, look for signs that these are secure (SSL secured sites or 128 bit encryption) like shopping.rediff.com. At the point when you are providing your payment information, a golden-coloured lock appears (for SSL secured sites) on the right hand side corner of the browser or the beginning of the Web site address should change from http to https, indicating that the information is being encrypted ie turned into code that can only be read by the seller.
- Your browser may also signal that the information is secure with a symbol, such as a broken key that becomes whole or a padlock that closes.
- Carefully use credit-cards and online banking for online shopping. Check your credit card and bank statements at regular intervals. Notify the bank immediately if there are unauthorised charges or debits. Avoid using credit card details and online banking on public computers and in cyber cafes. It is very unsafe because most of them are infected with viruses, trojans and key loggers.
- Some banks have launched their services like Net Safe to create temporary credit cards with a limited value to transact online. Paypal is also a secure way to do the transactions .This way, in the worst case scenario you can minimise the impact.
|
What’s good password
- What’s good password ?
|
- Use different passwords for different Web sites. Maintain separate passwords for e-mail, work and other important Web sites and routine web- surfing.
- Use difficult-to-guess password by taking the first alphabet from each word of a phrase. What is a good password? It is a password which is at least 8 characters long, not easily guessable, contains mixture of uppercase and lowercase letters as well as numbers, and preferably contains special characters like $, *, %, !, * etc. Some examples of a good password are: &(^.3235*cRack&.^).
- Always use alphanumeric passwords with special characters and try to adopt phrasing technique to construct passwords which are easy to
remember, hard to guess and impossible to crack. Create a unique acronym. Never use a dictionary based password like guest, home etc. It takes little time for a good cracker to crack the password. |
How to protect computer from internet hackers
- How to protect your computer from internet hackers
|
You do it every day. Log into your computer, send e-mails, open attachments, shop online, transfer money using your bank's secure payment gateway, chat, and upload personal information on social networking and job Web sites. Here's a thought: what if someone was watching everything you were doing?
Just like someone who hacked into Ken Haywood's Wi-Fi connection was and sent threat mail just a few minutes before the first of many bombs went up in Ahmedababd. Given the lax security that users as well as internet service providers have cyber criminals are always on the watch out for vulnerable people whose computers could be at risks.
There's a worryingly large possibility that someone could be keeping a close watch on all your online activities. From any corner of the world, someone could get inside your computer every day, and could have access to one of the most important resources of the information age: Your Personal Data.
Personal Data can be abused to make online purchases, carry out attacks against all those on your contact list and an innumerable list of things that can harm your everyday life. Welcome to the age of hackers (these are people who try to gain access to your computer using various hacking tools and misuse your personal data) and spies lurking on the vast Internet highway.
If that got you worked up, breathe. There are many ways in which you can defend yourself against hackers -- even though when it comes to security, nothing can give you 100 per cent guarantee. A host of new tools and exploits are developed every single day, so updating the knowledgebase to counter them must be a regular process.
|
General computer security
General computer security
|
Install the latest Antivirus Software on all your computers and never disable them. Popular antivirus softwares include Kaspersky, Bit Defender, Nod32, Antivir, Grisoft AVG and Quickheal. Also install a personal firewall and an anti-spyware solution. Popular firewalls include Antivir, Grisoft AVG, Quickheal, 3Com and Sonicwall.
Update antivirus/ anti-spyware/ firewall at least every 15 days. Carry out a complete system scan with your anti-virus at least once a week, or better, auto-schedule it to run every Friday.
There are a few free online antivirus scanners available at Trend-Micro, Kaspersky and F-Secure.
Don't download or open attachments from unknown senders. Even if the sender is trusted, ensure that the content is relevant. Even non-executable files like *.doc files can contain macro viruses and Trojans. There are some dangerous programmes called worms, which don't need human interaction. You can be infected by simply opening an e-mail or by visiting a Web site and that's it. So always stay alert. Avoid opening e-mail attachments that contain .vbs, .scr, .exe, or .pif file extensions. Files that end in these extensions are most likely to contain some sort of viruses.
Latest Web browsers such as Firefox, IE 7 & Opera offer innovative new security features, so it is necessary to update old browsers to their latest versions.
Never download any files especially executable files over P2P sharing networks (peer-to-peer), as you can never be absolutely certain as to what they really are. P2P file sharing programmes can lead to the installation of a lot of adware and spyware. Try downloading executables from authentic and well-known Web sites; don't download files from any random Web site.
Try not to visit warez, porn sites or Web sites that provide cracks and serials because most of them have a lot of spyware, trojans and viruses. A single visit and you are most likely infected with hundreds of malicious programmes.
Be familiar with the programmes installed on your computer. If you notice that a new programme is installed without your permission, possibilities are that it might be something malicious.
Read the installation agreements carefully when you download something from the Internet. Pay attention to the terms and conditions or EULA (end-user license agreements) of the programme being installed. Reference to third party installation should be given more attention. Some EULA's tell you that, if you install the programme, you have to also agree to install some spyware with the software. Check the independent sources, because some EULA's do not mention about the spyware.
Back-up your computer on a regular basis, at least weekly. Copy your important documents and files onto a USB drive, CD or a DVD for safekeeping. Don't wait for the disaster to happen, take the precautions beforehand. Create system restore points periodically.
Never respond to unsolicited e-mail. To those who send spam, one response or 'hit' from thousands of e-mails is enough to justify the practice. Additionally, it validates your email address as active, which makes it more valuable, and therefore opens the door to more spam.
Beware of phishing attacks. Sites like AntiPhishing offer latest updates on phishing along with some good security tips.
Don't chat with strangers or accept any file, especially executables from an unknown person on chat. Don't click on any links given by someone you don't know.
Do not accept links or downloads from strangers even if it is tempting. There have been cases where spyware like trojans and key-loggers have been hidden in simple picture files with .jpg extensions. You never really know what is contained inside a file which looks attractive.
Be cautious while displaying your profile, especially your personal details, photographs, videos and contacts on social networking sites. Your profiles and contacts may be misused by other people.
Install parental-control or filtering softwares like those from Websense (LINK) that helps you choose what can be seen on the Internet and monitor the activities of any users
|
INTERNET SECURITY TIPS
- Securing your wireless network
| ||
The whole aspect of security of wireless networks has become very important ever since terror e-mails were sent to media by alleged terrorists. Terrorists used unsecured wireless networks to hack into an individual's Wi-Fi network and sent e-mails just before bombs went off in Ahmedabad and New Delhi.
It is in this environment protecting your unsecured Wi-Fi network becomes very important lest somebody misuses the same.
Here are 10 simple ways in which you can secure your wireless network :
| ||
1. Change default administrator usernames and passwords :
Most routers or access points come enabled with a default set of username / password combinations. These combinations are well documented and available online for hackers to use. If a hacker can access your device's administrative pages they can modify the configuration and control all aspects of your device. These username / password combinations can be changed from the administrative panel and should be set to something difficult to guess. Keep a password which is difficult to guess and not easy to crack. A good password is 8 characters long, not easily guessable, contains mixture of uppercase and lowercase letters as well as numbers and preferably contains special characters like $,*,%,!. | ||
2. Turn on encryption :
All wireless devices support some form of encryption. Encryption technology scrambles messages sent over the air and ensures that they cannot be intercepted by hackers. Several encryption technologies exist for wireless communication today. WPA is the strongest commonly available encryption technology for home devices. While WEP can also be used cracking WEP is just a matter of few minutes. We would advice corporates to go for WPA with EAP Authentication, TKIP / RC4 Encryption or WPA 2 with EAP Authentication, AES-CCMP encryption for better security. | ||
3. Change the default SSID :
Access points and routers all use a network name called the SSID. Manufacturers normally ship their products with the same SSID set for all routers. For example, the SSID for Netgear devices is normally 'NETGEAR'. The default SSID can be changed from the administrative panel and should be set to something unique. | ||
4. Enable MAC Address filtering : Each wireless device possesses a unique identifier called the physical address or MAC address. Access points and routers keep track of the MAC addresses for all devices that connect to them. Wireless routers offer the option to key in the MAC addresses of your home equipment so as to restrict the network to only allow connections from those devices. It ensures that rogue users cannot connect to the wireless router without using advanced MAC spoofing techniques. | ||
5. Disable SSID Broadcast : The wireless access point or router typically broadcasts the network name (SSID) over the air at regular intervals. This feature was designed for businesses and mobile hotspots where wireless clients may roam in and out of range. For the home user, this roaming feature is unnecessary, and it increases the likelihood someone will try to log in to your home network. Fortunately, most wireless access points allow the SSID Broadcast feature to be disabled by the network administrator. Your SSID name can be manually entered into your devices to prevent the need for SSID Broadcasts to be enabled. | ||
6. Do not auto-connect to open wireless networks :
Connecting to an open wireless network such as a free wireless hotspot or your neighbour's router exposes your computer to security risks and attacks. Although not normally enabled, most computers have a setting available allowing these connections to happen automatically without notifying the user. This setting should not be enabled except in temporary situations. | ||
7. Assign static IP addresses to devices : Most home wireless devices use dynamic IP addresses. DHCP technology is indeed easy to set up. Unfortunately, this convenience also works to the advantage of network attackers, who can easily obtain valid IP addresses from your network's DHCP pool. Turn off DHCP on the router or access point, set a fixed IP address range instead and then configure each connected device to match. Using a private IP address range (like 10.0.0.x) prevents computers from being reached directly from the Internet. | ||
8. Enable firewalls on each computer and router : Modern network routers contain built-in firewall capability, but the option also exists to disable them. Ensure that your router's firewall is turned on. For extra protection, consider installing and running personal firewall software on each computer connected to the router. | ||
9. Position the router or access point safely : Wireless signals normally reach to the exterior of a home. A small amount of signal leakage outdoors is not a problem, but the further this signal reaches, the easier it is for others to detect and exploit. Wireless signals often reach through neighboring houses and into streets. When installing a wireless home network, the position of the access point or router determines its reach. Try to position these devices near the centre of the home rather than near windows to minimise leakage. Many routers allow you to reduce the range of your router from the administrative panel to prevent the signal leakage. | ||
10. Turn off network during extended periods of non-use : The ultimate in wireless security measures, shutting down your network will most certainly prevent outside hackers from breaking in! While impractical to turn off and on the devices frequently, at least consider doing so during travel or extended periods of downtime. |
Subscribe to:
Posts (Atom)