How To Prevent ARP Spoofing

“You can fool some of the people all of the time, and all of the people some of the time,

but you can not fool all of the people all of the time.”

-Abraham Lincoln

What is ARP spoofing, and why do I care? If you’re old enough, […]

Disable Proxy Autodetection

Yesterday, I was wondering why my PC was getting logs of these NetBOIS Name queries to WPAD:

Turns out that WPAD is one of Internet Explorer’s worst features. It’s just one of those stupid little things that may be turned on by default that leaves your PC open to hackers.

What can you do […]

Your Mac is Not Immune to Hacking

My wife and daughter use Macs, so I need to be at least somewhat aware of Mac security. The general consensus is that Mac security is better than Microsoft… but that’s a pretty low bar. How vulnerable are Macs?

I’m tired of hearing from Mac people how secure Mac OS X is. Apparently, I’m not […]

How to Protect Yourself from Hacking Attacks

Hacking attacks happen all the time and pose a real security threat. Here are ten things you can do to protect yourself:

1) Don’t use the same password for all of your user accounts. Choose a variety of passwords, and make each one strong (no full words, use both numbers and letters). Keep your list […]

How to Strengthen Your Passwords

Don’t use the same password for everything. If a hacker penetrates one website, and discovers your password, they could try the same password on another site (like your bank’s website). If it works, the hacker could get rich quick and you would be out of luck.

So, how should you deal with passwords? Download KeePass. […]

Be Suspicious of Online Software Delivery

If you download software from the Internet, it is possible that the downloads have been tampered with by someone malicious. Very unlikely, but it is possible. Every once in a while, I hear a news report about some site being hacked, and the software on the site is now suspected of being tampered with.

Well, […]

How To Protect Your Wireless Network

First of all, you DID turn on encryption for your wireless network, didn’t you? If you wireless network is unencrypted, then anyone driving by can connect to your network, and try to steal information from your computers. (This is called wardriving. And, there is a newer version where the bad guys can do the same […]

How to Configure a Hardware Firewall

Devices that provide hardware firewalls usually need to be configured. It may be that the default factory settings are OK, and you don’t need to do anything extra. But, it would be good to contact your ISP, and ask if they have instructions for configuring your firewall with high security.

For example, I just installed […]

Hardware Firewalls

Firewalls are filters that keep the most of the bad Internet traffic out. There are two types of firewalls: hardware firewalls (a separate box you plug in between your computer and the Internet) and software firewalls (software that you install on your computer). You should be using BOTH types, but this post focuses on hardware […]

Hacking Attack Rates

If you are hooked up to the Internet (at home, at a local coffee shop, at an airport, wherever), there is a constant barrage of Internet traffic trying to get to your PC. Hackers are trying to get into your computer. They might be in China, in Russia, in the US, in your own neighborhood, […]