Security networking simplfied



Many small business owners and home users learn about PC security and have unknowingly become computer geeks with the changes in technology and improvements. Not too long ago using the terms 'router' or 'wireless' signaled the presence of the enthusiast or professional. No longer now, routers, hubs, switches, Ethernet cards, firewalls and a bewildering array of other computer and network related buzzwords have entered the office or home.

The installation of these devices easy and inexpensive, vendors opened new sources of revenue for themselves and offered a significant value to small business and home users. Now multiple home computers could share resources without 'sneaker net' - physically transporting files or moving printer connections. Now the whole office or family could use a single network connection to the Internet, and often without having to string wires all over the building or house.

What users didn't get is what every networking and computer professional has early on - training in how to secure that gear from hackers.

But, don't panic. The settings from the vendor are often quite good. Now, for some guidance... One other note is most routers, hubs, switches have rest buttons that will restore them back to factory settings.

RFM is a common acronym known to computer professionals. For the sake of propriety I'll ignore the middle letter, but the first and last stand for Read the Manual. It'll give you common useful settings and configuration information. Now read it again.ROUTER PORTS

First, change the password and if possible rename the administrator account. The person who bought the same model you did have that information, and he may not be as trustworthy as you.

Port 80 is the standard for HTTP, needed for any web browsing. 'Ports' are network numbers used by software to distinguish traffic. Open that, but only for specific IP addresses or ranges going out. That way, only known computers can generate traffic out of your home network-security.

That tip is imperfect if you acquire an IP address automatically. I.e. use DHCP, as most do. But many providers allow you to purchase one static address for your router. That's the one that should have access out.

Why do you care about traffic going out? The answer is because you can infect other computer systems. Practice safe networking. Don't spread viruses. Also, if you have wireless - see below - you may not know who's on your network. Even if you don't and you're not home, no one can sneak in with a laptop and get out of your network-security. Yes, it's happened.

You'll have to open Port 80 for all incoming traffic, unless you want to try to track which sites have which IP address - nearly impossible.

If you use a desktop e-mail client, rather than being entirely browser based, you need to open Port 25 for outgoing mail (SMTP) and 110 for incoming (POP3, ignore the acronym meanings).And that's ALL... usually.

Manual or desktop FTP clients, which you should avoid because of their weak PC security, will need another, and specialized programs will require a few others. In most cases you'll find their numbers easily discoverable. Keep them to the bare minimum. The rule of thumb with network security is: everything closed by default, allow only those truly needed and only to those who need it.

By the way, if these sound a lot like firewall settings it's because routers and firewalls have some overlapping functionality. Routers route traffic, firewalls prevent or allow it.

WIRELESS NETWORKS

If you have wireless gear, you have more to do. Some, by default, allow anyone nearby to use them to access that network and hence the Internet security. That means not only the teenager in the upstairs bedroom, but the neighbor next door and the hacker parked at the curb can access resources inside your home. Yes, that does happen.

Lock down your wireless gear by, you guessed it, reading the manual to learn how to configure passwords and implement any other PC security features available. I would recommend at least setting up the web-key along with 64 bit encryption.

It isn't necessary to dedicate your life to becoming a network-security expert in order to safeguard your resources. But having a home network connected to the Internet via a home router, puts you at extra risk compared to dial-up or single-connection users.

If you don't spend a modest amount of time to take simple steps today, someday you may spend much more after you've been hacked and you might cost you nice amount of money.



Google

Windows related issues

Network and software firewalls Network and software firewalls how they protect your computer

Firewalls a selection of protection This section talks about firewalls offer a selection of protection

Junk Email what does it harm Junk Email and spam how they can harm you and your computer

Anti Spam software This section is about Anti-spam-Software and how to choice

Preventing PC Errors Preventing PC Errors that can occur in the Windows operating software

Spyware overview Adware also know as Spyware overview

Preventing-PC-errors Ways to preventing-PC-errors and tips to avoid them

Windows Registry 101 Windows Registry 101 - The basics and tips for Windows or Vista Registry

Malicious code / virus overview Malicious code and virus overview

Anti-spam firewall what it can do for you Anti-spam firewall how it can help protect you from programs that attack your computer



Security Networks return to Business computing guide