Skip to main content

All Questions

4 votes
2 answers
12k views

Tor + Public Wi-Fi ... safe?

If I were running a virtual machine, with all traffic always being sent and received through Tor, would this be safe on a public Wi-Fi connection? Surely my traffic cannot be sniffed as it's encrypted?...
Dean's user avatar
  • 41
4 votes
5 answers
337 views

best practice procedure for browser use on unsecured WiFi

At this posted question is the advice you need to always check that the SSL connection shows up green in your address bar and/or manually double-check that the certificate is valid when using ...
H2ONaCl's user avatar
  • 1,438
4 votes
1 answer
2k views

How are Wi-Fi passwords sent to the router securely?

Maybe I'm just being stupid, but whenever you type the password to gain access to a certain Wi-Fi network, how is the password sent to the router securely? Wouldn't it be easy to intercept the ...
heron1000's user avatar
  • 151
4 votes
3 answers
9k views

Can traffic be inspected through WiFi?

Let's say I am browsing an HTTP accessible web site (i.e. NOT HTTPS). Is the traffic encrypted through the WiFi connection? In other words, is there "data privacy" functionality over WiFi - ...
jldupont's user avatar
  • 6,734
4 votes
5 answers
2k views

On unencrypted public wifi, what kind of real danger am I in?

First, my setup Windows 7 Home Premium use the built-in firewall UAC on max in Windows' wireless network settings for public networks, besides the default settings, I have 1)set to block all media ...
CChriss's user avatar
  • 1,333
4 votes
2 answers
1k views

can I log urls visited with dd-wrt?

Got dd-wrt setup! Can I log urls visited on all computers on the network?
user27449's user avatar
  • 6,970
4 votes
2 answers
389 views

Securing my wireless network

At home I have a wireless network that I have my notebook, Zune, PS3, etc connected to. I've set it up using WPA2 with AES encryption, a 63-character alphanumeric & symbols key, MAC filtering for ...
Travis's user avatar
  • 2,165
4 votes
1 answer
25k views

What are the best wireless security settings for my router

I am using older SOHO router wl500gP (it is v1 but I think this is not important) with custom Oleg firmware which allows me to use one of the following "Authentication Method": Authentication Method: ...
Wakan Tanka's user avatar
4 votes
1 answer
231 views

Can a laptop be compromised through WiFi if the machine never connects to a hotspot?

For instance, you're laptop's wifi card is on, but you've deliberately not connected to any hot spots. Is there anyway it can be hacked while sitting there, and not connected?
Rhubarb's user avatar
  • 441
4 votes
2 answers
316 views

Are there any soho class wireless routers capable of layer 2 encryption?

Are there any SOHO class wireless routers that are capable of encryption at layer 2?
Axxmasterr's user avatar
  • 7,926
4 votes
1 answer
296 views

Harvard "determined" that student used Tor? [closed]

In today's news, a student at Harvard was arrested for making a bomb threat. According to the affidavit for the arrest warrant an FBI agent wrote: Harvard University was able to determine that, in ...
Tyler Durden's user avatar
  • 6,171
4 votes
1 answer
1k views

How to protect against spoofed access point?

If someone wanted to get the passphrase for my WPA2 encrypted Wi-Fi access point (AP), would it be possible to set up a fake AP with the same MAC address and SSID, then when a device tries to log into ...
Paul's user avatar
  • 786
4 votes
2 answers
3k views

How do I detect if someone is stealing my broadband bandwidth?

I am very paranoid about wireless connections and someone stealing my broadband bandwidth, which could lead to worse things. My question is, how can I detect if my broadband bandwidth is being stolen?...
oshirowanen's user avatar
  • 1,740
4 votes
2 answers
4k views

How do I protect against WPA de-authentication attacks?

Someone is constantly sending deauth packets to me.... =(
NullVoxPopuli's user avatar
4 votes
3 answers
225 views

Can existing wireless networking encryption really protect a network?

I've heard a lot about securing a network from the inside-out, assuming that people will have access no matter what. Obviously some simple measures can be put in place to deter casual passers-by, but ...
Andy Mikula's user avatar
  • 1,427

15 30 50 per page
1 2 3
4
5
18