How secure are wireless internet cafe's?
-
i am going to new york city next week and i want to use a wireless internet cafe while i am there, i remember hearing that while you are on wireless internet people can see what websites you are visiting and get card details from this? also can they gain access to files and documents?
-
Answer:
Not unless you have file and printer sharing enabled Start > control Panel > Network Connections > (right click over your wireless connection) > Properties > De select File and printer sharing. Password protect and encrypt your stuff. People have been fired when a Laptop has been stolen that contains sensitive stuff. Search on http://:support.microsoft.com Encrypt.
Gowrie at Yahoo! Answers Visit the source
Other answers
Start > control Panel > Network Connections > (right click over your wireless connection) > Properties > De select File and printer sharing. We have secure wireless access to our corporate network. We have been asked to provide an Internet Cafe in our cafeteria, which would allow public access to ... Download: Try the Sybase iAnywhere secure wireless email solution now! http://www.nytimes.com/ ny business traveler who has logged on to a wireless network at the airport, printed a document at a hotel business center or checked e-mail messages at a public terminal has probably wondered, at least fleetingly, “Is this safe?” Skip to next paragraph Kevin Moloney for The New York Times Potential computer security hazards are everywhere, including airports, where travelers connect to the Web on laptops. Although obsessing about computer security is a bit like worrying about a toddler — potential hazards lurk everywhere and you can drive yourself crazy trying to avoid them — the fact is, business travelers take certain risks with the things they do on most trips. “If you go into the average hotel and sit down in the business center and have a look at their computer, I’m sure you’ll find some interesting things that people shouldn’t have left behind,” said Paul Stamp, a security analyst with Forrester Research. “The first step companies need to do is to educate people about how valuable the data is and also how small the circles are in which they travel,” he said, noting how loudly many people discuss business on cellphones, without a thought for who may be nearby. Or what may be in the air. Robert Vamosi, a senior editor with the online technology publisher CNET, said wireless networks at airports — or for that matter, hotels or cafes — are not as secure as most people think. “Someone may have some software on their computer that allows them to look at all the wireless transactions going on around them and capture packets that are floating between the laptop and the wireless access point,” he said. These software programs are called packet sniffers and many can be downloaded free online. They are typically set up to capture passwords, credit card numbers and bank account information — which is why Mr. Vamosi says shopping on the Web is not a great way to kill time during a flight delay. “Where I’d draw the line is putting in your bank account information or credit card number,” he said, adding that checking e-mail messages probably is not that risky, but if you want to be cautious, change your password once you are on a secure connection again. That said, if you gain access to your corporate network through a V.P.N., or virtual private network, you are safer using public hot spots, because your data is encrypted as it travels between Gate 17 and your office’s server, where it is decoded before going to its destination. In other words, your communications are automatically encoded by software on your computer so the data looks like gibberish to anyone trying to intercept it. If your company does not offer a V.P.N. for employees working away from the office, there are services you can subscribe to for about $10 a month that do the same thing. Michael Sellitto, a graduate student studying international security at Harvard, said that even though he encrypted any sensitive data on his laptop, he planned to sign up for a service like HotSpotVPN to add another level of security when he is traveling, especially when using poorly protected networks at cafes and hotels. “The problem is, the really good people have written sniffer programs so that the less-sophisticated people have access to the same technology,” Mr. Sellitto said. “Say a Microsoft Word document gets transmitted. The sniffer program will collect that and someone could open it up on their computer.” While it is hard to say how likely it is that someone is lurking on a public network, many public networks do not have adequate security. Last fall, InfoWorld magazine published an article about a security researcher who managed to collect more than 100 passwords, per stay, at hotels with lax security (about half the hotels she tested). Gathering reliable statistics about security breaches is notoriously difficult, since companies are reluctant to reveal this information. Still, the most recent computer crime and security survey, conducted annually by the Computer Security Institute with the Federal Bureau of Investigation, found that the average loss from computer security incidents in 2005 was $167,713 per respondent (based on 313 companies and organizations that answered the question). As Jim Louderback, editor of PC Magazine, noted, the statistics may not matter given the problems one data breach can cause. “Even if it’s 1 or 2 percent,” he said. “You don’t want to run that risk.” Using a public computer can also mean courting trouble, because data viewed while surfing the Web, printing a document or opening an e-mail attachment is generally stored on the computer — meaning it could be accessible to the next person who sits down. (To remove traces of your work, delete any documents you have viewed, clear the browser cache and the history file and empty the trash before you walk away.) “You also run the risk that somebody has loaded a program on there that can capture your log-ins and passwords,” Mr. Louderback said, recalling an incident a few years ago when a Queens resident was caught installing this type of “key logger” software on computers at several Kinko’s locations in New York. One way to foil these programs, which record what you type and can send the transcript to a hacker, is to use a password manager like RoboForm. This $30 software encrypts all your user names and passwords for various Web sites, then enters the data at the click of a mouse when you are prompted to log in. There is a mobile version that can be stored on a flash drive that plugs into a U.S.B. port — making your passwords secure and portable. There are also simple measures you can take to protect your hardware, like using a cable lock to secure your laptop in a hotel room or even a cafe (in case you leave the table for any reason), and making sure you lock your computer bag in the trunk rather than leaving it on the back seat. For travelers who do carry around sensitive data, it is worth looking into programs like Absolute Software’s LoJack for Laptops, which can help recover a missing computer. The software reports its location when connected to the Internet — and some versions can even be programmed to destroy data if a computer is reported lost or stolen. But perhaps the most common snoop that business travelers encounter is someone nearby “shoulder surfing” to see what is on a laptop, out of curiosity or mere boredom. To foil prying eyes, 3M sells a Notebook Privacy Filter, a plastic film that makes it impossible to view a laptop screen from an angle. Trevor Stromquist, a sales analyst for a manufacturing company in Minneapolis, has been using one for the last two years to dissuade nosy neighbors on the road, but he has noticed an added benefit back at the office. “To be honest, it’s kind of a nice thing when you’re sitting in one of those long drawn-out meetings,” he said. “You can do what you need to do and no one will notice.”
Nagendra M
yeah thats true because the wireless connect is intend for all access with minium serciuty so predators can easily hack ur comp.
Pursuer of Knowledge
unfortunately unsecure networks from internet cafes are not very secure. anyone with a good knowlage of PC software could easily set up a gateway you have to pass through (proxy) to access the internet. this could then require you to input credit card details etc. which would be visible to him. Basically, good for checking mail but nothing sensitive or secure.
Volvagia
Dont worry ....someone somewhere is always peeking at your System... It is possible but ..dont let it stop you surfing...I dont..
Mrs G
if its a psp no because the firewall and spyware scanners are so good im not sure anyone could hack into it an it ur running xp block ur ip an do a windows update aswell as download a free firewall
loz
Disable file sharing and install a firewall (which you should have anyway).
Stephen L
Thanks everyone for the great advice.
rosie recipe
I cant say I am an expert, but I believe as long as you have all your service packs up to date and your firewall is on, you should be ok. Turn your infrared port off if you have one.
wishiwas
Internet Cafe = unsecure, wireless or not. Idea place to access your internet details. You are completely reliant on the honesty of the cafe owners. Think of it like this, would you go on line at home , and invite a random stranger in off of the street to have a look while you log in? You have absolutely no idea what key logging software might be present.
Paul K
Related Q & A:
- How do you set up a wireless internet connection?Best solution by Yahoo! Answers
- How to get my wireless internet on Ubuntu 9.10 to work?Best solution by Yahoo! Answers
- How to connect to a wireless internet connection using my PC?Best solution by Yahoo! Answers
- How to set up a wireless internet connection with my PC?Best solution by Yahoo! Answers
- How to set up a wireless wireless internet connection?Best solution by Yahoo! Answers
Just Added Q & A:
- How many active mobile subscribers are there in China?Best solution by Quora
- How to find the right vacation?Best solution by bookit.com
- How To Make Your Own Primer?Best solution by thekrazycouponlady.com
- How do you get the domain & range?Best solution by ChaCha
- How do you open pop up blockers?Best solution by Yahoo! Answers
For every problem there is a solution! Proved by Solucija.
-
Got an issue and looking for advice?
-
Ask Solucija to search every corner of the Web for help.
-
Get workable solutions and helpful tips in a moment.
Just ask Solucija about an issue you face and immediately get a list of ready solutions, answers and tips from other Internet users. We always provide the most suitable and complete answer to your question at the top, along with a few good alternatives below.