Storming the Firewall Wirelessly
- HACKING INN. Lewis, Peter // Fortune International (Europe);1/26/2004, Vol. 149 Issue 1, p26
Reports on security deficiencies in protecting computers from being hacked in hotel environments. Vulnerability of the computers of business travelers linked through hotel Internet connections; How hackers can break into the computers; Advice about protecting computers linked to public networks.
- HACKING INN. Lewis, Peter // Fortune;1/26/2004, Vol. 149 Issue 2, p46
Reports on security deficiencies in protecting computers from being hacked in hotel environments. Vulnerability of the computers of business travelers linked through hotel Internet connections; How hackers can break into the computers; Advice about protecting computers linked to public networks....
- Safety net. Frary, Mark // Business Travel World;Sep2003, p45
Focuses on the security concerns over the use of the Internet or wireless systems by business travelers to access their corporate networks. Findings of the 2002 Wireless Security Survey, which explored the security risks of wireless access points that are operating in London, England; Terms...
- Security Tips for Business Travelers. // Professional Safety;May2014, Vol. 59 Issue 5, p72
The article offers computer security advice for business travelers, including the use of security software, backing up of data, and clearing personal information when using public computers.
- Intrusion Prevention Systems. Sequeira, Dinesh // Business Communications Review;Mar2003, Vol. 33 Issue 3, p36
Focuses on the concept of intrusion detection systems (IDS) in the U.S. Importance of the system for network security; Role of IDS in identifying security threats; Advantages of anomaly detection. INSET: Seven Key Definitions.
- SAFE! (FOR NOW). Henricks, Mark // Entrepreneur;Mar2003, Vol. 31 Issue 3, p34
Focuses on the reliability of Wi-Fi Protected Access (WPA) in ensuring the security of Wi-Fi networks. Capacity of WPA to stiffen encryption to block hackers from reading intercepted messages; Authentication and encryption capacity of WPA; Need to replace Wi-Fi card.
- EYES WIDE OPEN. McKenna, Ted // Telecommunications - Americas Edition;Sep2002, Vol. 36 Issue 10, p19
Reports the cyberspace security among carriers and customers in the U.S. Threat of hack site on information in telecom networks; Impact of the denial-of-service attack on the SS7 network and telecom protocols on the service disruption of the La Guardia airport; Implication of cyberspace...
- Security. Gilmer, Brad // Broadcast Engineering;Aug2002, Vol. 44 Issue 8, p34
Focuses on steps to keep networks secure while still taking advantage of the benefits of networking. Avoidance of connections to the Internet; Use of antivirus protection; Computer firewalls; Checking of software updates frequently.
- Rethinking network security. Vasan, Robin // Network World;9/2/2002, Vol. 19 Issue 35, p37
Focuses on computer network security. Evolution of computer networks; Traffic running across corporate local area networks; Layers of computer infrastructure.