I am using a wireless Internet connection from a local ISP,This set up is basically a WLAN and connection is based on 'IP addresses', assigned to each connection. I have installed McAffee Professional firewall Plus v 6.0.6014 at my computer. I came to know that some "IP addresses" from the WLAN has attempted to access my computer.the event information of inbound events are Socks,SSDP,NETBIOS NAME, NETBIOS DATAGRAM. these attempts exceeds 200 in a single day. I have banned these IP-addresses, what should i can do more. Thanks
"Nawa" wrote in news:1131193586.449351.185220 @g44g2000cwa.googlegroups.com:
The personal FW should be stopping all unsolicited inbound traffic from the Internet by itself. Only solicited inbound traffic should be coming through to the machine behind the PFW solution due to some program on the machine initiating outbound traffic to a remote/IP. If you're sitting there making rules to band IP(s), then you're wasting your time and effort as the PFW is stopping the unsolicited inbound traffic to the machine automatically, unless you have mis-configured the PFW yourself.
If the computer has a direct connection to the Internet (no router sitting between the computer and the connection to the ISP), then you should go to the MS O/S and secure it a little bit from being attacked and not depend upon the PFW solution as some stops all and ends all solution. That's if you have one where configuration of the O/S can be done to harden it to attack.
The buck stops at the O/S and there is one for Win 2K too. If you're using Win 9'x or ME, you're out of luck.
My point was they require two endpoints so now that you have provided the extra information to the OP, that's more helpful.
Ok then by the same token, WEP is quite sufficient for most purposes!
Broadcast traffic provides "information". You'll see IP addresses, IPSec is susceptible to ARP poisoning, you'll see Netbios traffic which includes which machines are domain controllers for example and which machines have who logged on, nice free info for your attack vectors.
Can't remember the full details but IPSec had a recent serious flaw documented and PPTP is just plain weak in authentication and doesn't provide mutual authentication.
You have the right to disagree but like I said, while people might choose to use a VPN for wireless security, they're not the big solution and suffer from plenty of limitations. A few more:-
IP only (might not affect too many people) What client are you going to use on a PDA? What EAP type are you going to choose? One crypto mechanism for the purpose of deriving a session key for the second crypto mechanism for your data - which do you want to be strongest? Hence, choose the weakest. How are you going to knock off a stolen device off the network?
I'm not just referring to using a VPN for home security but a rather bigger picture here.
Cabling-Design.com Forums website is not affiliated with any of the manufacturers or service providers discussed here.
All logos and trade names are the property of their respective owners.