Skip to main content

Gadget Wisdom

Category: Security & Networking

0 Responses

Wiring Project – Part 1

my First Cable Modem
Image by lerxst / boycat via Flickr

Recently, the excess of computer wires hooking together our systems and unsuccessful attempts to get them into order frustrated us.

So, with a significant investment of time, and the cost of some organizational tools, ie some new cables, cable tacks, velcro ties, etc., we’re going to try and tackle this issue.

Our first plan involves a redo of our networking appliances. That includes the DSL/cable modem, the router, and a gigabit switch. All these items belong together, as they all serve to form the house network. But currently, they terminate behind and under a desk in an ugly mess.

In comes our current love affair with Swedish furniture. It isn’t too expensive, and it looks decent for the price we can afford. We recently replaced some old bookshelves with some Billy Bookshelves from Ikea, nice because of three features: a curve at the bottom allowing the shelves to press flat on the wall without removing the baseboard, the fact the backing slides into a groove to hold it in place, rather than merely being nailed, and the fact that you can buy height extensions and build your bookcases up to the ceiling.

For the first stage of our project, we decided to build in inobtrusive network wiring rack into an endtable. Endtables are nice in that they are small. We were concerned about ventilation, so we ended up planning on using an Eina table, designed as a side table for a bed. It is made of particleboard, but it is thick and stable. The item offers optional casters for rolling around. Importantly for us, it is open on both sides.

We haven’t yet finished preplanning for this reconstruction, as we attribute our failure to succeed in organization projects like this in the past due to lack of preplanning. But our plan is to install the equipment and place the item under our large computer desk, as many people place rolling filing cabinets, with the wood face facing outward, as opposed to what would be seen normally, the open faced sides. This only leaning down will allow the components to be seen.

All cables will be tied and secured to the cart in such a way the cart can easily be disconnected and moved for cleaning and maintenance. The room where these cables are located borders another room that needs network access, so we’ve built an in-wall patch panel. It is a simple project. Two keystone wallplates with network jacks on them connected by a short piece of wire, so a wire plugged into identical jacks on each side will act as a single coupled-together wire. Since keystone jacks are modular, we can add extra cables, network or otherwise, as needed.

The patch jack, we should probably call it, sits behind the table under the desk. And we plan to put all of the wires going into it from the network table into some flexible split-loom tubing, which will further hide it, giving it a more professional feel, although it does admittedly limit redesign, as removing the cables from the tubing is an annoyance…which is why pre-planning is so important.

We’ll update you on this with pictures as it develops. Also on the design block, a bedroom HTPC installation plan designed to do some of the same thing.

Reblog this post [with Zemanta]
Published on December 9, 2008
Full Post
0 Responses

Increasing Wireless Security Now that WPA is Cracked

KeePass Password Safe
Image via Wikipedia

Early on, wireless networks were encrypted using WEP encryption, until it was discovered even the FBI could crack that in a minute.

Then came WPA, which was supposedly much more secure. However, researchers have figured out a way to break the TKIP key in about 12 to 15 minutes. Experts had known that a brute force dictionary attack could eventually break such a key, however, it was not efficient.

Researchers discovered a way to trick a router into sending them larger amounts of data. More data allows them to break the key much more easily using new mathematical techniques. The technique has already been incorporated into popular Wireless sniffer program Aircrack-ng. The newer WPA2 is considered safe from this attack.

That is the simplest way to increase security. If your router has a WPA2 capability, update to it from WPA. If it doesn’t, check to see if there is an upgraded firmware, or consider switching to a custom firmware if one is available to you that may have it. We like DD-WRT, which has ports for many routers(List of supported devices). When you set WPA2, switch from TKIP encryption to AES only. It hasn’t yet been cracked.

WPA and WPA2 for home use use a passphrase to access the network. Recommendations are that this passphrase be at least 13 characters and not consist of any dictionary word. Too many people, both in securing their networks and other passwords, use weak passwords. Remember, you don’t have to remember the thing. Your computer can do that. You can keep it in a secure file, or a password vault such as KeePass.

Do not set your wireless SSID to anything commonly used. A list of the top 1000 most commonly used ones can be found here. Top ones to avoid: linksys, default, NETGEAR, Belkin54g, Wireless, hpsetup, WLAN, Actiontec, smc, Dlink…All of these give unnecessary information about what type of router you have, as many of these are default ssids. It also tells a malicious individual you may be vulnerable.

There is also MAC filtering, which is touted as a security measure as well. A MAC address is unique to a specific piece of hardware. But since they can be spoofed, this is more of a deterrent than anything else.

Other useful features include AP Isolation. This is a feature available on many routers that disables connections from the wireless device to any devices on the network. It would ensure that a wireless computer could access only the internet, not the internal network. However, if you want to access your internal network, this is not as useful.

If you want to go to Enterprise-level WPA2, you can certainly do so. But it is usually overly complex for a simple home installation and requires an external RADIUS server, which you would have to run. If you have an always-on computer around, this might be an option.

As a final measure, you can always just give up. Bruce Schneier, security guru, runs an open wireless network, and outlines his reasons why, and links to much commentary on the subject in this post. The question of whether or not one should have open wireless is a different one than security. We will say that you can always run a secure network independently of your insecure one, and run security independently of your wireless, or if you are technically proficient, have a gateway portal the way hotels do, that secures your connection.

For example, you can use VPN to connect to your private network for security and route all communications through it. Thus it is encrypted before it leaves your computer for the network. Many businesses use this technique for individuals accessing their files remotely.

Reblog this post [with Zemanta]
Published on November 12, 2008
Full Post
0 Responses

Running a Network Server without a Computer

We recently pulled out the Linksys Network Storage Link USB 2.0, aka the NSLU2, affectionately nicknamed the SLUG by enthusiasts. The NSLU2 is actually a Linux-based device, which runs SAMBA, a version of Windows file sharing and has been hacked to run other things.

The NSLU2 is not your only choice for hacking in this manner. You can use the Synology DS101, the Iomega NAS100D, the D-Link DSMG600, or any device that uses the ixp4xxx chipset with attached storage. However, the NSLU2 has the most following, having had an established community for a long time.

There are several options for replacement firmware for the NSLU2. There is Unslung, which allows you to expand the ffunctionality of the NSLU2 without using the original product functionality and compatibility with the original Linksys firmware. However, unlike the stock firmware, Unslung contains support for NTFS(The formatting used for Windows drives), card readers, USB hubs to add extra devices, and other enhancements. Other packages can be installed to a drive hooked into the Slug as it has limited memory and run, for example, a streaming media server.

Alternatives to Unslung include OpenSlug and Debian for the NSLU2, which remove the Linksys functionality in favor of a complete Linux system, and thus are not for the neophyte.

For more information on the various aspects of the NSLU2, visit its unofficial homepage/wiki. We just set one up as a file server at a remote location. It will, as soon as we finish setting up the software, not only backup files from the main server, but allow users at the second site to access local copies of their documents.

Published on April 5, 2007
Full Post
0 Responses

Paypal Security Key Now Available

When we originally commented on the security key to be offered by Paypal, we could not secure one. Now…the Consumerist reported that they were available and we arranged to receive one. We will report back as soon as we receive this device.
Published on February 10, 2007
Full Post
0 Responses

Paypal to Issue Security Key

Gizmodo reported yesterday on Paypal’s new security measure. Paypal will be offering a hardware-based solution which will display a one-time use passnumber every thirty seconds, to be added to your password and username. These keychain sized devices, common for business based security protocols, are an easy and inexpensive way of ensuring security…assuming you don’t lose the device.

We wish we could get one to review. We tried to log in…and it said it was currently unavailable.

Published on January 16, 2007
Full Post
0 Responses

Seven New Year's Resolutions for Your PC

Lifehacker recently came up with its New Year’s Resolutions…things people should do but don’t for their computers.

  1. Regularly back up your hard drive – We know we should…but we don’t. Admittedly, we store our data on a mirroring RAID array, but that doesn’t make us any safer if disaster comes
  2. Set up a self-repairing hard drive – Schedule your computer to run repair programs regularly, including things liek defragment, drive checks, etc.
  3. Clean out your hard drive – Over time your hard drive becomes full of programs and files you don’t use…get rid of them. If you aren’t using it, delete it or back it up to optical media.
  4. Organize your virtual filing cabinet – Now that you’ve cleaned things up…time to organize what you have into a good and easy to work with hierarchy.
  5. Keep your hard drive clean – You just did all this work…you had better work to keep it that way.
  6. Encrypt your private data – Protecting your important information from prying eyes is important…especially if you have a laptop.
  7. Securely Track Your Passwords – First…make sure your passwords are not easy to crack…and then secure them somehow. A password program, such as KeePass, among others, can create a secure password vault.
Published on January 12, 2007
Full Post
0 Responses

Flaws Detected in Windows Vista

The New York Times reports that security researchers and hackers have already found serious flaws in Vista. So far, Vista has only been released to some corporate customers and not yet to the general public.

On December 15, a Russian programmer revealed a flaw that makes it possible increase a user’s privileges. Since Vista’s greatest improvements in security involve having users run under accounts with restricted privileges for security reasons, it is a major blow. Later, a Silicon Valley security firm discovered five additional flaws, one in Windows Internet Explorer 7.

Being that the company still has some time, hopefully it will be able to roll out an update repairing these flaws. Microsoft is counting on Vista to be a moneymaker for them. We’ve commented on its lack of significant impact…although like everyone, we’ll eventually have to give in and buy it as support for XP is eventually discontinued.

Published on December 29, 2006
Full Post
0 Responses

Be prepared for a loss of electricity

Lifehacker recently gave us the idea of discussing battery backup. Uninterruptible Power Supplies, or UPSes, are battery-backup power strips. There is no reason why your computers and your electronics should not be on these devices, especially if you are in an area that suffers from brownouts, blackouts, and other power related issues.
The higher quality models include a feature called Automatic Voltage Regulation(AVR)…with it, the battery feeds all power to the system, which gives your electronics a constantly clean and regulated voltage. The cheaper ones will switch over to battery power only during a power failure. This is a nice addition to the good idea that you should surge protect all electronics. A UPS provides an extra layer of protection.

If you choose to go only with surge protection..do not skimp on it though. Make sure you get high quality components. For a UPS, the best known brand has always been APC. Their stuff is rather expensive though. For a bit more economy, go with Belkin. Make sure that it comes with a data cable and software to allow your computer to shut down neatly when it runs low on power.
We’ve tried some generic brands. We have a black rectangle burned into a pressboard desk from an Energizer UPS we bought after the big Northeast blackout that went kaput one weekend while we were away. Coming home to discover a melted UPS is rather scary. Independent reviews are a good way to weed out the poor quality ones.

All models are rated in VA. The higher the VA, the longer it will last. The estimates on the box are usually for computers, but we recommend you hook it up to other things. For example, we have an independent UPS hooked into our DSL modem and router assembly. Being that it draws much less power than a computer, it means our network will work for a good while in a power failure. If you have cordless phones, hooking them in may also be a good idea if you have a spare outlet on the UPS.

The best way to plan to upgrade your home with a series of Uninterruptable Power Supplies is to see what you want to keep running or allow to shutdown gracefully during a blackout and plan accordingly. For example, if you want to ensure your Digital Video Recorder(let’s say Tivo, for example), continues to record…you will need to have it plugged in. If it is hooked into a cable box, that will need power as well(assuming the cable or satellite company hasn’t lost power too).

Don’t forget that any appliance with a motor should not be plugged into a UPS(at least on the battery powered side). Those devices require a large burst of power.

Writing about this puts us in the mind to review our surge protection and UPS plans for our residence. Better safe than sorry.

Published on December 25, 2006
Full Post
0 Responses

Backup Your Windows Notebook Now or Face Dire Consequences!

We like the title of this article from the Mobility Guru a great deal. Backup is something we save for the last minute too often…and ultimately forget, dooming us in an emergency. It is not a matter of IF you need to back up your data, it is WHEN.

For the frugal individual, try an old hard drive. For a minimal fee, you can convert it to USB operation and use it as backup. There is also the CD/DVD option, which will definitely work for some data. For the average person remember…your media files will not change, and thus can be backed up on a few DVDs rather efficient. For frequently updated information, such as application data, a copy of your registry, and your documents, you can use the old hard drive, supplemented with regular optical disc backups to back that drive up.

Published on December 4, 2006
Full Post
0 Responses

Management vs. IT Security

We follow Bruce Schneier, a guru in the field of security of all types. Recently, he commented on the issues management has in understanding IT security. Management tends to see implementing IT security measures as a low priority. Security is a preventative measure…there is no easy way to point somewhere and show the profit made by implementing good security.

Security insures against loss. Perhaps there is a way to relate a cost-savings in insurance, but besides that, security is a drain on the bottom line, be it in a corporation or with an individual.

Individuals are the same when it comes to security. The managerial side of us has to ask the justification for spending money and time protecting against loss, while our IT side speaks of viruses, spyware, malware, and environmental disasters…

Data seems too intangible to people to see it as a valuable item, like the equipment protecting it, or jewelry which must be secured. Either way, we must force ourselves to listen to our IT people, or the IT voice in our head and protect our valuables…

Published on November 26, 2006
Full Post

Get New Posts By Email