April 2005
Network Tip:
Wireless Network Security
Networking makes it easy to share Internet access and data.
But you wouldn't want to share your information with just
anyone. With a wireless network, your information is traveling
through the airwaves—not physical wires, so anyone within range can
"listen in" on your network. Here are essential security
measures you should take to secure your wireless
network.
- Change the default SSID (network name).
- Disable the SSID broadcast option.
- Change the default password needed to access a wireless
device.
- Enable WPA/WEP encryption.
- Enable MAC address filtering.
Change the default SSID Your wireless devices have a
default SSID set by the factory. The SSID is the name of your
wireless network, and it can be anything you wish. Wireless
products often use the product name as the default SSID.
Hackers know these defaults and can try them to join your
network. Change the network's SSID to something unique, and
make sure it doesn't refer to the networking products you use.
As an added precaution, be sure to change the SSID on a regular
basis, so any hacker who may have figured out your network's SSID in
the past will have to figure out the SSID again and again.
This will deter future intrusion attempts.
Disable SSID broadcast By default, most wireless
networking devices are set to broadcast the SSID, so anyone can
easily join the wireless network. But hackers will also be
able to connect, so unless you're running a public hotspot, it's
best to disable SSID broadcast.
Change the default password needed to access a wireless
device For wireless products such as access points and
routers, you will be asked for a password when you want to change
their settings. These devices have a default password set by
the factory. Hackers know these defaults and will try them to
access your wireless device and change your network settings.
To thwart any unauthorized changes, customize the device's password
so it will be hard to guess.
Enable Wi-Fi Protected Access™ (WPA) Security Wi-Fi
Protected Access (WPA), the latest high-security standard for
wireless networking, increases the level of data protection and
access control for wireless networks. WPA provides several
benefits to enhance security. It keeps out unwanted users by
checking for the proper permission and password before allowing
network access. It is also more robust than the security
standard it is replacing, Wired Equivalent Privacy (WEP), which
provides basic protection for home networks and limited protection
on public networks. WPA improves data encryption so attackers
will not be able to view or alter any data traveling to or from your
wireless network.
WEP uses 64- or 128-bit encryption keys, but WPA offers up to
256-bit encryption keys, which are exponentially harder to
decode. Also, while the WEP key is static, the WPA key is
dynamic—it automatically changes as often as you want it to, such as
every 50 minutes. This foils would-be hackers' attempts to
figure out the WPA key by eavesdropping on your network
traffic. By the time they can decode your old WPA key, your
network has already switched to a new WPA key, so WPA is
significantly better than WEP, which uses the same WEP key
repeatedly.
There are two different modes of WPA, one for home use and one
for corporate use. The mode most suitable for home use is
called the WPA-Personal mode, also known as Pre-Shared Key mode
(WPA-PSK). It's easy to use—just select this mode and enter
the same password on every network device to activate WPA security.
The mode most suitable for office use is called the
WPA-Enterprise mode, also known as WPA-RADIUS (Remote Authentication
Dial-In User Service) mode. To secure a corporate wireless
network, this mode requires each device to be authorized according
to a master list held in a special authentication server (usually a
RADIUS server).
If you're shopping for wireless products, look for the WPA
logo. The privacy and security of your home or small office
wireless network is worth it. If you already have Wi-Fi
certified wireless products, but they don't offer the WPA feature,
check the product support website for your wireless devices to find
out if there are firmware or software upgrades available.
Enable MAC address filtering If your wireless
products—such as access points and routers—offer it, enable MAC
(Media Access Control) address filtering. The MAC address is a
unique series of numbers and letters assigned to every networking
device. With MAC address filtering enabled, wireless network
access is provided solely for wireless devices with specific MAC
addresses. This makes it harder for a hacker to access your
network using a random MAC address.
There are other security measures you can take as well, but these
are the most essential.
Trading Tip:
TD Sequential Indicator by Howard Arrington
Tom DeMark describes this trading tool as looking for at least
nine consecutive closes less than the close four trading bars
earlier for a buy setup and at least nine consecutive closes greater
than the close four trading bars earlier for a sell
setup. This establishes a context that helps a trader
determine whether they should be buying or selling the market.
This tool is designed to anticipate a trend reversal.
The indicator counts the bars in the sell setup and
labels the count in blue above the high of the bar. The
down counts in the buy setup are shown in red below the low of the
bar. Ensign's Design Your Own™ study was used to
construct the indicator.
This DYO property form implements the Up
count. Line A reads the Bar Close values so that Line B
can calculate a 4 bar Momentum of the closes. This
Momentum is stored in Global Variable [4].
Line C tests the Momentum to be above zero, and when
this is True, Line D increments the Up counter in GV[1] and shows
this count as a marker in Blue in the Color Band Position of Above
High 2.
Line E tests for when Momentum is not above zero, and
conditionally resets the counter in GV[1] to zero via Line F.
The down count in Red is implemented using the
following DYO. The primary reason a second DYO is used
is so the Color Band Position for the marker can be the Below Low 2
selection.
The Momentum from the first DYO is still available in
GV[4], and thus does not need to be recalculated. Line A
tests for the Momentum to be below zero, and conditionally
increments the down counter in GV[2]. When Momentum is
not below zero, Line C and Line D reset the counter in GV[2] to
zero.
This example is available as the DemarkCount template
and can be downloaded from the Ensign web site using the Internet
Services form.
Click this link to learn more about the TD Sequential
Indicator. |