Take Control of Wi-Fi Networking and Security

Take Control of Wi-Fi Networking and Security

Author: Glenn Fleishman

Publisher: alt concepts

Published: 2022-11-21

Total Pages: 110

ISBN-13: 1990783236

DOWNLOAD EBOOK

Get more from your Wi-Fi network Version 1.4, updated November 21, 2022 Setting up and securing a Wi-Fi network can be complicated and confusing. This book helps you over every hurdle involved in picking gateways, setting up a network, adding devices, and securing the network and connected phones, tablets, and computers. It’s useful for those who have set up networks in the past and want to replace them with new gear, as well as people who have never built a Wi-Fi network before.n Perhaps you already have a Wi-Fi network running in your home and office, but you’re dissatisfied with it. Or maybe you’re setting up a new house, apartment, business, or school room with Wi-Fi and need to know the basics about what to get and how to configure it. In either case, this book is for you. After over 16 years of writing regularly about Wi-Fi and answering reader questions, author Glenn Fleishman finds that the same issues still crop up: • How do I spend the least money to the best effect? • What’s the best place to put my Wi-Fi gateways? • How can I get both high throughput (speed) on my network and solid coverage across everywhere I want to use Wi-Fi? • What can I do to secure my network against outsiders near my house and elsewhere on the internet? • How do I add networked hard drives and printers? • Interference is slowing my network; what can I do to reduce it? • What’s the best way to extend my network to a garage, yard, or nearby building? This book answers those questions in depth, as well as many others related to Wi-Fi, including how to set up a personal or mobile hotspot with all major operating systems, how to access computers on your network remotely, and why you should use a VPN (virtual private network). If you have any question about overhauling your network, setting up a new one, or just finally figuring out something that’s never worked, this book has the answer. Covers macOS, Windows, iOS, Android, and Chrome OS.


Take Control of Your Wi-Fi Security

Take Control of Your Wi-Fi Security

Author: Glenn Fleishman

Publisher: "O'Reilly Media, Inc."

Published: 2009-06-30

Total Pages: 210

ISBN-13: 1615422544

DOWNLOAD EBOOK

Learn how to keep intruders out of your wireless network and protect your sensitive communications! It's ten o'clock—do you know who's using your wireless network? If you haven't changed the default network name or admin password someone could be eavesdropping on your email, plucking your passwords out of the air, or sending spam through your Internet connection right now! When you're using a wireless network—whether a Macintosh with AirPort gear or Windows with any Wi-Fi equipment—you're exposed to risk unless you take steps. Wireless networking experts Glenn Fleishman and Adam Engst have spent years researching and covering wireless security issues on Glenn's Wi-Fi Networking News blog and in two editions of The Wireless Networking Starter Kit. Now they've distilled that experience into this essential guide for anyone using a computer with wireless networks, whether at home, at work, or on the road. You'll learn how to evaluate your real security risks; the best way to restrict access to your network using WPA and WPS; how to secure your data in transit with PGP, SSL, SSH, and VPNs; and how to protect your computers from viruses and attacks. The book provides extra advice on how to secure small-office wireless network, including details on choosing VPN hardware and software and on setting up 802.1X for secure Wi-Fi logins. "The authors, two guys with enormous geek credibility, take the confusing tangle of Wi-Fi security issues and break it down for you in plain language. The book is a marvel of excellent technical writing for a general audience." —Barry Campbell on Blogcritics.org Read this book to learn the answers to questions like: Should I worry about someone eavesdropping on my home wireless network? What three security measures should I take immediately to lock down my wireless gateway? What common security measures aren't worthwhile? Why is WEP not worth bothering with, and what should I use instead? How do I set up guest networking on the 2009 dual-band AirPort Extreme and Time Capsule models? How do I set up WPS on Apple and non-Apple gear? What does it mean if I see green shading in my browser's URL field? Do I need a VPN to protect my sensitive work communications? What is sidejacking, and what should I do about it? Can I control access to my wireless network by user name and password? What software can I use for secure email and file transfer? How does public-key encryption work? Our office has only 15 people—can we afford the best Wi-Fi security?


Take Control of Wi-Fi Networking and Security, 2nd Edition

Take Control of Wi-Fi Networking and Security, 2nd Edition

Author: Glenn Fleishman

Publisher: alt concepts

Published: 2024-01-16

Total Pages: 90

ISBN-13: 1990783465

DOWNLOAD EBOOK

Get more from your Wi-Fi network Version 2.0, updated January 16, 2024 Setting up and securing a Wi-Fi network can be complicated and confusing. This book helps you over every hurdle involved in picking gateways, setting up a network, adding devices, and securing the network and connected phones, tablets, and computers. It’s useful for those who have set up networks in the past and want to replace them with new gear, as well as people who have never built a Wi-Fi network before.n Perhaps you already have a Wi-Fi network running in your home and office, but you’re dissatisfied with it. Or maybe you’re setting up a new house, apartment, business, or school room with Wi-Fi and need to know the basics about what to get and how to configure it. In either case, this book is for you. After over 18 years of writing regularly about Wi-Fi and answering reader questions, author Glenn Fleishman finds that the same issues still crop up: • How do I spend the least money to the best effect? • What’s the best place to put my Wi-Fi gateways? • Is a mesh network a good idea—and if so, what do I need to know? • How can I get both high throughput (speed) on my network and solid coverage across everywhere I want to use Wi-Fi? • What can I do to secure my network against outsiders near my house and elsewhere on the internet? • How do I add networked hard drives and printers? • Interference is slowing my network; what can I do to reduce it? • What’s the best way to extend my network to a garage, yard, or nearby building? • What’s different about the latest standards—Wi-Fi 6E, Wi-Fi 7, and 802.11be? This book answers those questions in depth, as well as many others related to Wi-Fi, including how to set up a personal or mobile hotspot with all major operating systems, how to access computers on your network remotely, and why you should use a VPN (virtual private network). If you have any question about overhauling your network, setting up a new one, or just finally figuring out something that’s never worked, this book has the answer.


Take Control of Your Online Privacy, 5th Edition

Take Control of Your Online Privacy, 5th Edition

Author: Joe Kissell

Publisher: alt concepts

Published: 2024-05-28

Total Pages: 136

ISBN-13: 1990783503

DOWNLOAD EBOOK

Learn what's private online (not much)—and what to do about it! Version 5.0, updated May 28, 2024 Nearly everything you do say or do online can be recorded and scrutinized by advertisers, data brokers, and a long list of other people and organizations—often without your knowledge or consent. When your personal data falls into the wrong hands, you risk theft, embarrassment, and worse. But you can take steps to greatly improve your online privacy without sacrificing all your convenience. Nowadays, online privacy is extremely hard to come by. Corporations, governments, and scammers alike go out of their way to gather up massive amounts of your personal data. The situation feels bleak, but you have more control than you may realize. In this book, Joe Kissell helps you to develop a sensible, customized online privacy strategy. No matter what devices or operating systems you use, you’ll find practical advice that ordinary people need to handle common privacy needs. The massively revised fifth edition of Take Control of Your Online Privacy is packed with information that helps you get a handle on current topics in online privacy, including data breaches, hardware bugs, quantum computing, two-factor authentication, how ads can track you, and much more. You’ll receive savvy advice about topics such as these: Why worry? Find out who wants your private data, why they want it, and what that means to you. Determine your personal risk level, learn which privacy factors are most important to you, what you can and can't control, and what extra steps you can take if you're at a high risk of being personally targeted. Hear some good news (five steps you could take that would massively increase your online privacy)…and some bad news (why some of those steps may be difficult or infeasible). Remove personal information from Google and data brokers, though the process comes with limitations and gotchas. Discover Apple-Specific Privacy Features for users of Macs, iPhones, and iPads. Manage your internet connection: Secure your Wi-Fi network and keep your data from leaking out. Find advice on why and when to use a VPN or a network-connected privacy appliance, plus why you should be skeptical of VPN reviews. Browse and search the web: Avoid bogus websites, control your cookies and history, block ads, browse and search anonymously, and find out who is tracking you. Send and receive email: Find out how your email could be intercepted, learn techniques for encrypting email when necessary, get tips for sending email anonymously, and know when email is not the best way to communicate. Watch your social media: Understand the risks of sharing personal information online (especially on Facebook!), tweak your settings, and consider common-sense precautions. Talk and chat online: Consider to what extent any phone call, text message, or online chat is private, and find tips for enhancing privacy when using these channels. Protect your smart devices: Address privacy issues with "Internet of Things" devices like smart TVs, smart speakers, and home automation gear. Think mobile: Ponder topics like supercookies, location reporting, photo storage, spear phishing, and more as you decide how to handle privacy for a mobile phone or tablet. Help your children: As a parent, you may want to take extra steps to protect your children's privacy. Find a few key tips to keep in mind.


Take Control of Your Domain Names

Take Control of Your Domain Names

Author: Glenn Fleishman

Publisher: "O'Reilly Media, Inc."

Published: 2009-06-30

Total Pages: 144

ISBN-13: 1615422536

DOWNLOAD EBOOK

Register, configure, and manage your domain names like a pro! Having your own domain name - like takecontrolbooks.com - is fun for individuals and essential for organizations, but the details of managing a domain name can be perplexing. Networking expert Glenn Fleishman demystifies the jargon and tells you everything you need to know, beginning with how domain names work behind the scenes. He then explains the best ways to decide upon and find an available domain name, register it, configure it with a DNS host, and use it for your Web site and email address. Additional sections cover using dynamic DNS; special problems and troubleshooting; explain how to change your registrar, DNS host, Web host, or email host; and offer tips for buying or selling a registered domain name. Read this book to find answers to questions such as: What can I do with a domain name? How do I learn what domain names are available? What features does a good registrar offer? What is DNS and what should I do about it? I hate my registrar. How can I switch to a new one? What should I look for in a Web- or email-hosting service? How can I run a Web server if my ISP gives me a dynamic IP address? How do I set up an email service at my domain for family members without running my own mail server? Help! My Web site is dead and I'm not getting email. What should I do?


Take Control of Passwords in Mac OS X

Take Control of Passwords in Mac OS X

Author: Joe Kissell

Publisher: "O'Reilly Media, Inc."

Published: 2006-10-30

Total Pages: 204

ISBN-13: 1615422595

DOWNLOAD EBOOK

Create and manage strong passwords that keep your data safe without taxing your memory! Suffering from password overload or anxiety? Set your mind at ease with friendly assistance from Mac expert Joe Kissell! You'll learn how to assess risk factors and devise a personal plan for generating different types of passwords, using Joe's special system for creating strong passwords that are easy to remember but virtually impossible to crack. The book also explains how to work with all the different passwords on your Mac (account login, master, root, firmware, email, AirPort, keychains), teaches you how to use Apple's Keychain Access password manager, provides pointers for using passwords on the Web, and includes tips for preventing password-related problems. For those who want to go beyond Keychain Access for features like higher security or PDA syncing, Joe describes likely options and provides money-saving coupons. Read this ebook to learn the answers to questions such as: Can my Mac automatically log me in to Web sites? What are good ways to generate new passwords? How can I come up with strong but easily remembered passwords? What are good techniques for tracking impossible-to-remember passwords? How should I set up the passwords that control access to my Mac? What are the best ways to use Apple's Keychain to manage passwords?


Handbook of Electronic Security and Digital Forensics

Handbook of Electronic Security and Digital Forensics

Author: Hamid Jahankhani

Publisher: World Scientific

Published: 2010

Total Pages: 708

ISBN-13: 9812837043

DOWNLOAD EBOOK

The widespread use of information and communications technology (ICT) has created a global platform for the exchange of ideas, goods and services, the benefits of which are enormous. However, it has also created boundless opportunities for fraud and deception. Cybercrime is one of the biggest growth industries around the globe, whether it is in the form of violation of company policies, fraud, hate crime, extremism, or terrorism. It is therefore paramount that the security industry raises its game to combat these threats. Today's top priority is to use computer technology to fight computer crime, as our commonwealth is protected by firewalls rather than firepower. This is an issue of global importance as new technologies have provided a world of opportunity for criminals. This book is a compilation of the collaboration between the researchers and practitioners in the security field; and provides a comprehensive literature on current and future e-security needs across applications, implementation, testing or investigative techniques, judicial processes and criminal intelligence. The intended audience includes members in academia, the public and private sectors, students and those who are interested in and will benefit from this handbook.


Mac Security Bible

Mac Security Bible

Author: Joe Kissell

Publisher: John Wiley & Sons

Published: 2009-12-17

Total Pages: 1085

ISBN-13: 0470616490

DOWNLOAD EBOOK

Your essential, no-holds-barred guide to Mac security threats and solutions Myth number one: Macs are safer than PCs. Not really, says author Joe Kissell, named one of MacTech's "25 Most Influential People" in the Mac community for 2008. In this timely guide, he not only takes you beyond the myths, he also delves into the nitty-gritty of each potential threat, helping you weigh the pros and cons of the solutions you might choose. Learn to measure risk versus inconvenience, make informed decisions, and protect your Mac computers, your privacy, and your data with this essential guide. Explains the security threats to Macs, including data in transit from your e-mail or network, and malware such as viruses, worms, and Trojan horses; these threats, formerly the exclusive worry of PC users, now increasingly threaten Macs Explores physical security and hardware barriers, software settings, third-party solutions, and more Shows Mac OS X users how to develop and enforce security policies Covers security for Windows running on a Mac with Boot Camp, virtualization software such as Parallels Desktop or VMware Fusion, and more Learn the full range of options you need to consider to make your Mac safe. Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.


Take Control of Home Security Cameras

Take Control of Home Security Cameras

Author: Glenn Fleishman

Publisher:

Published: 2020

Total Pages: 151

ISBN-13:

DOWNLOAD EBOOK

Are you thinking about installing a home security camera (or several!) or a smart-home security and sensor system that includes cameras? This book guides you through the many decisions about quality, features, privacy, and security that will help you find just what you want. If you own one or more home security cameras already, you'll learn much more about options, configuration, and changes you can make-and how you might expand your system or replace parts of it. (This book could even convince you that the time isn't right to purchase a home security camera given tradeoffs you don't want to make, especially on privacy and security!) In Take Control of Home Security Cameras , networking and security expert Glenn Fleishman shows you how to make smart choices about buying and configuring cameras that take into account technical details, video quality, system integration, your own privacy and that of others, and internet security. As you read this book, you'll: Figure out which features are right for you Configure your system securely to ensure that you and people you authorize are the only ones with access to live and stored video Find out how to build a system entirely offline, in which no video or live streams make their way to the internet at all Understand the different kinds of cloud-based storage of video, and which you might be comfortable with Learn about Apple HomeKit Secure Video, a new option available for iPhone and iPad users and certain camera systems (including Logitech Circle 2) that provides the highest level of privacy currently available in cloud storage Get to know features found in home security cameras, and how they affect the quality and nature of video you capture Set your system so that alerts only appear for the kinds of motion, sound, or other triggers that meet your threshold Avoid becoming part of the surveillance state-or opt into a limited and controlled part of it with a fuller understanding of what that means Learn about the legal aspects and limits of recording audio and video, and how they might (or might not) help catch criminals Get in-depth insight into over 10 of the most popular home security video cameras and systems, including Amazon Blink and Ring, Google Nest, NETGEAR Arlo, Logitech Circle, and several others Figure out whether you want a multi-camera system that records video on your network or smart cameras that stream events or continuous video to the internet.


Take Control of Home Security Cameras

Take Control of Home Security Cameras

Author: Glenn Fleishman

Publisher: alt concepts

Published: 2023-04-28

Total Pages: 102

ISBN-13: 1778043968

DOWNLOAD EBOOK

Make your home safer! Version 1.4.1, updated April 28, 2023 Are you thinking about installing a home security camera—or several? This book guides you through the many decisions about quality, features, privacy, and security that will help you find just what you want. Or do you own an existing system and want to swap out parts, expand it, or upgrade it? You’ll learn options for cameras you own and what interoperates. The book explains the role of Apple’s HomeKit Secure Video, and how to make its highest-level security work for you. In Take Control of Home Security Cameras, networking and security expert Glenn Fleishman shows you how to make smart choices about buying and configuring cameras that take into account technical details, video quality, system integration, your own privacy and that of others, and internet security. As you read this book, you'll: • Figure out which features are right for you • Configure your system securely to ensure that you and people you authorize are the only ones with access to live and stored video • Understand the different kinds of cloud-based storage of video, and which you might be comfortable with • Learn about Apple HomeKit Secure Video, an option available for the Apple ecosystem that lets you access video and control cameras from several manufacturers in a highly secure way from your iPhone, iPad, or Mac, including Logitech’s Circle View • Get to know features found in home security cameras, and how they affect the quality and nature of video you capture • Set your system so that alerts only appear for the kinds of motion, sound, or other triggers that meet your threshold • Avoid becoming part of the surveillance state—or opt into a limited and controlled part of it with a fuller understanding of what that means • Learn about the legal aspects and limits of recording audio and video, and how they might (or might not) help catch criminals