Dear Community,
I found Toms Hardware whilst trying to check the security of my wireless network at home. I live in the UK & have a typical infrastructure type new using a Belkin 54g router, a small Belkin USB wireless adapter dongle, & the built in Atheros AR500how easy7EG wireless built in adapters in a couple of laptops.
I found the routers SSID bas being broadcast & there was no encryption by default & no admin password to access the router!
I have fixed these, but before I did I thought I'd check how easy it was to get into my Internet access. Using another laptop I could simply connect to my unsecured network & access the Internet.
My question is if someone can easily do the above & get onto my wireless network & look 'upstream' onto the Internet, how wasy would it be for them to look 'downstream' & into whats on the disk of my PC/laptops?
Could they get in & access files, view documents or even alter files. If so, what common utilities would be needed?
I've turned on encryption to secure the wireless, hid my SSID & enabled XP's firewall. I have setup MAC address filtration also, which I guess will only permit machines that I know the MAC codes for can connect.
Hope someone can help,
Thanks,
Simon
I found Toms Hardware whilst trying to check the security of my wireless network at home. I live in the UK & have a typical infrastructure type new using a Belkin 54g router, a small Belkin USB wireless adapter dongle, & the built in Atheros AR500how easy7EG wireless built in adapters in a couple of laptops.
I found the routers SSID bas being broadcast & there was no encryption by default & no admin password to access the router!
I have fixed these, but before I did I thought I'd check how easy it was to get into my Internet access. Using another laptop I could simply connect to my unsecured network & access the Internet.
My question is if someone can easily do the above & get onto my wireless network & look 'upstream' onto the Internet, how wasy would it be for them to look 'downstream' & into whats on the disk of my PC/laptops?
Could they get in & access files, view documents or even alter files. If so, what common utilities would be needed?
I've turned on encryption to secure the wireless, hid my SSID & enabled XP's firewall. I have setup MAC address filtration also, which I guess will only permit machines that I know the MAC codes for can connect.
Hope someone can help,
Thanks,
Simon