The The increasingly Wi-Fi-enabled ecosystem in which we operate is conducive to attackers who would set up rogue or malicious Wi-Fi hotspots in order to monitor internet communications via man-in-the-middle attacks, pilfer login credentials, infect users with malware, and perform other malicious actions. Wi-Fi-enabled ecosystem in which we operate is conducive to attackers who would set up rogue or malicious Wi-Fi hotspots in order to monitor internet communications via man-in-the-middle attacks, pilfer login credentials, infect users with malware, and perform other malicious actions.Millions of Smartphones Vulnerable to Rogue Hotspots by Default
After reading the article does it now seems prescient that I started paying $28/year for an always on VPN service from OpenDNS. I’ve been using the service for over a year and can’t imagine going without it.
Comcast’s XFININTY Internet service is in the process of rolling out a feature called “XFINIFTY WiFi.” The service relies on the modems and routers of its users. While part of your router and modem will generate the internet for your home and your private network, another part will act as a public hotspot available to anyone with a Comcast XFINITY username and password.
I am so glad that several years ago, I bought my own cable box instead of using the “FREE” one from Comcast. Not only did I save money — Comcast charges a $16/month rental fee — but I won’t have Xfinity users affecting my connection speed. Xfinity is the only broadband provider in my neighborhood.
If you don’t own, you don’t control it.
Posted via Desktop Publishing Machine
During the first few months I've worked from home more often than I did all of last year. I'm not on any official company teleworker program; it's just that we've had quite a number of storms hit the area. I think we had about three snow storms in February that left so much snow on the ground it did not melt until the rains started in early March. Last week we a "small hurricane" knocked over trees and caused streams to flood blocking the normal roadways that take me to work. Fortunately Mac OS X 10.6 has features that easily integrate with the typical corporate systems running Microsoft's and Cisco's ubiquitous enterprise technologies - Exchange, Active Directory and Cisco VPN.
Setting up my Mac to use my employer's Cisco VPN was simple but not foolproof. I had all the information I needed but I had to use a few manual steps and trial and error to get things working just right. OS X 10.6 has support for Cisco VPN built in. The settings we need to configure are in the Network section of System Preferences. Click the + to create a new service. Select VPN for the interface and Cisco IPSec for the VPN Type. Change the service name to something meaningful and clock OK. If you have VPN connections for different things (e.g you are a consultant with many clients), you can name each VPN connection accordingly so that you can keep track of what you are connecting to.
Once the service is created it is time to enter the connection specifics. Select the service and enter the server address and your account login name. Server address can either be a fully qualified domain name or an IP address.
Click "Authentication Settings". Enter your shared secret and group name information. If your employer uses certificates then set that up. My employer uses shared secrets instead of certificates so I won't provide any more guidance on that.
If you employer uses a web gateway (web proxy) clicked Advanced to enter that information. It might be convenient to have the VPN connection controls easily available so go ahead and click "Show VPN status in menu bar". When you enable that check-box a small icon will appear in your menu bar. Clicking that icon pops up a small menu from which you can control the VPN connection. It is also convenient when you need to rapidly switch from one VPN connection to another.
VPN Client error: Uploaded with plasq’s Skitch