The POP protocol is NOT an encrypted and secure protocol. Data is passed in clear text. Cell phones are also not encrypted. Although more difficult and requiring better scanners with the digital phones than the old analog ones to monitor. They are also sending data via clear text.
A good network card setup in promiscuous mode will capture all of your data from your portable hotspot as well.
Understand that the only secure network is one that is completely closed (hardwired) with no broadcasting wireless devices or Internet connections. Using the Internet, no matter how you attach to it is a risk upon itself. All you can do is try to protect your data as best you can.
stupid internet question
Discussion in 'Questions From New Drivers' started by midget28, Dec 16, 2010.
Page 3 of 4
-
-
Trucking Jobs in 30 seconds
Every month 400 people find a job with the help of TruckersReport.
-
-
POP itself is not an encrypted protocol. Unless you enable SSL or TLS, which is what Gmail recommends you do. That is the distinction that non-techie users will misunderstand. They may end up thinking that just because they use POP their e-mail is encrypted. I have done the supporting ID10T end users long enough to know that even being specific sometimes doesn't help.
-
Me, I do have too much time on mine as well as sitting at this desk at home on the disabled list pretty much bites!
This has turrned into a good thread though!Flying Finn Thanks this. -
IF you want to have privte WIFI , with no risk of being spied on...and I will tell you, the "man in the middle" type of attack or "honey Pot" type of set up is kinda common as described above , with simply recording packets even more common...., but 99% of what is done online usually has proper security (sites like G-mail have recently changed all e-mail, not just loin to secure...Yahoo is a bit more problematic last time I checked)......FULL encryption for anything involving bank #'s, passwords, etc....but if you are paranoid about somebody spying on the web-pages/porn you look at, there are service you can buy for a nominal fee (a few are free, or very cheap) to encrypt all you transmissions to a central location, where then it is dumped onto the internet, making spying on you harder...Private VPN, or personal VPN is usually in the name...but this will slow down your browsing...it is useful for getting around "filtered" internet access that limits access to certain sites or services (file-sharing or porn) !!
Wargames Thanks this. -
But, if you are running Windows, a great way to do what you just described is Hotspot Shield
http://hotspotshield.com/
This is also a way to get around the blocking of sites that a hotspot may have blocked. For instance, the New York Thruway service area blocks all movie download sites, as well as porn sites, use this and you can get to them.Wargames Thanks this. -
-
What a coincidence! There was just a news special on what you guys are talking about. (wifi) There are actually hackers who go to like airports and set up fake wifi servers. The people who are in the airport get on their laptop and look up the wifi providers, well they name it something like freeairportwifi which gets the peoples attention. They start using it and the hackers have access to their computers. They download spyware and now they have a constant way to get into others secure stuff. The news reporter was telling people to make sure that you ask airport staff who the wifi provider is so that you don't get hacked!
-
ZippyNH, thanks, doing research also,
First off, I NEVER do anything on a public WiFi network that I would not want the guy sitting in the next booth to see on his screen. Even at home, I do our online banking Only when connected to the wired router & never on the actual WiFi signal here at the house.
Since I don't do anything at a coffee shop that I care if anyone sees, I don't use any special security software other than my built-in XP firewall and Anti-Virus software.
What I would use, if using Wi-Fi anywhere when using an 'Open Network' such as a coffee shop where the Wi-Fi is advertised as 'Free', I would use what is called a VPN or Virtual Private Network.
http://www.pcworld.com/article/210562/how_to_set_up_vpn_in_windows_7.html
This is the software we use, it is relatively easy to set-up, stable and available at no cost = free.
https://secure.logmein.com/products/hamachi2/
http://en.wikipedia.org/wiki/LogMeIn -
Key-logging software has been around a long time with a large number of programs free and quite good. http://en.wikipedia.org/wiki/Keystroke_logging#Software-based_keyloggers
Easy way to check if some guy in the truck-stop parking lot (or across the street at the coffee shop parking lot) has set up a capture site - before going online with your laptop WiFi, look at the list of available networks, if two (2) have the exact same name, you are guaranteed one of them is the bad guy. And if one is listed as something like "T&A South Atlanta, GA - Free" and another right under it is listed as "South Atlanta, GA - Free" (which is almost the same) - likely the second one is suspect. Although could be legitimate, I would not use it.
Best bet, install a VPN client and be safe.
Yea I know, it's a bit of a hassle setting up and turning on each time.
Trucking Jobs in 30 seconds
Every month 400 people find a job with the help of TruckersReport.
Page 3 of 4