SIGN IN YOUR ACCOUNT TO HAVE ACCESS TO DIFFERENT FEATURES

CREATE AN ACCOUNT FORGOT YOUR PASSWORD?

FORGOT YOUR DETAILS?

AAH, WAIT, I REMEMBER NOW!

CREATE ACCOUNT

ALREADY HAVE AN ACCOUNT?
QUESTIONS? Email: [email protected]
  • MARKET
    • SERVICE MARKET
    • HIRE PROFESSIONALS
    • WRITEPOINT
    • GET CUSTOM CONTENT
  • SHOP
  • LOGIN

theLocco Magazine

  • HOME
  • STORIES
  • SOCIAL
  • LIFE HACKS
    • HOW TO
    • Decor
    • Fashion
    • Celebrity
    • Parenting
    • LIFESTYLE
    • HEALTH
  • REVIEWS
    • Art
    • Technology
    • Poetry
    • TECH
      • Home and living
    • Music
    • Books
    • LISTS
    • Articles
  • BUSINESS
    • Marketing
    • Finance
    • White Papers
  • SHOP
  • MORE
    • WHAT THE FACT!
    • GALLERY
    • UNPROTECTED QUOTES
    • WORLD
  • MY CART
    No products in cart.
  • Home
  • HOW TO
  • How to Connect Securely to an Unknown Network

How to Connect Securely to an Unknown Network

0
/ Published in HOW TO, LIFESTYLE, LISTINGS, Mobile, Networking, TECH, Technology

How to Connect Securely to an Unknown Network

More often than not, we find ourselves in desperate need to access some internet and we can’t resist using some public or unknown unsecured network.

Is it safe to use the unsecured network?

The answer to this question is that, it is not completely safe to use these unsecured networks, however by taking the necessary precautions one can connect securely to an unknown network.

Though it is not possible to achieve absolute security, the goal of network security is to make is extremely difficult for one to get exposed to security threats. Currently, computers and other devices, such as PDAs and smart phones can access connect to unsecured Wi-Fi wireless networks in most of the public places such as airports, coffee shops, hotel lounge making it easier for hackers to access private information and data of unsuspecting internet users.

An un-secured network is a network that has no security protocols or has outdated security protocols. The risks one is exposed to when connecting to an unidentified unsecure network; be it wireless or cable include; malicious insertion, network imitations and threat from network scanners among others.

This simply means that by using these networks, users are leaking sensitive information to hackers with special tool to access it. Such information may include passwords of the sender, personal addresses of the sender and receiver, and other sensitive personal information such as bank accounts.

Exemplar

To further elaborate this situation, take an example when mailing a letter, one places the letter in the mailbox which the mailman later picks and delivers to the recipient.

A malicious attack in this case would involve an unauthorized individual who is not an employee of the post office, accessing or intercepting the letter before it could get picked up the mailman. As such, the attacker could do whatever he pleases with the contents of the letter; he could read the contents, change the content, and even destroy the letter. Similarly, this is what is likely to happen when one does not take precaution while using an unsecured network.

All hope is not lost

However, all hope is not lost, there are security measures one can take when using to an open and unsecure network. There are two instances: connecting to an unknown network using your own device and when using an unknown device.

Such tools that come in handy in these instances are Https & Https everywhere. Https encrypts sensitive data using SSL/TLS. Thus, when accessing websites enter https instead of http; this will encrypt and decrypts login information, user page requests and other web pages that are returned by the Web server thus protecting man-in-the-middle and eavesdropping attacks.

Https Everywhere is a slightly advanced Https technology that uses a whitelist of sites or rather major sites that we use to access other sites such as Google, Wikipedia and popular social networks by automatically activating inbuilt security of these sites.

Another effective method is the use of Virtual Private Network (VPN) which makes the unidentified networks function as a single logical unit thus making it possible to easily monitor, secure/encrypt this point. Moreover, users should always implement more secure practices when accessing such kind of networks.

Such practices include use of unique and strong passwords, use of two-step authentication where possible, keeping the firewall active, turning off file and printer sharing, visiting strictly secure sites, use secure web applications and finally limiting the time periods connected to the network.

When using an unknown device the above mentioned tools and security practices apply other than not using weak passwords and configuring firewalls.

A more secure solution is to use a flash disk or a USB external hard drive mounted with a bootable operating system such as Linux OS, which separates the web operations from operations of the device thus creating a secure environment for the user.

 

 

Eric Gichuru

Eric Gichuru

Eric Gichuru is a BESTSELLING author of a novel called With Eyes Wide Open and the Editor-In-Chief of Thelocco Magazine. Get in touch now HERE.

What you can read next

how to connect different ideas in writing
How To Connect Different Ideas in Writing
Things to consider when buying a thermostat for your home
Fun activities bonds kids thelocco
5 Fun Activities To create Strong Bonds With Your Kids

2 Comments to “ How to Connect Securely to an Unknown Network”

  1. martin says :Reply
    at 9:32 am

    such a good read

    1. martin says :Reply
      at 9:33 am

      Thanks, more is coming.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Ad


Recent Posts

  • Scaling Up With The Skill Up Mentorship Program

  • With Eyes Wide Open Novel review

    Imperfectly Perfect – With Eyes Wide Open Novel Review

  • Enrolled For A Masters, Graduated With A Husband

    Enrolled For A Masters, Graduated With A Husband

  • The Cages We Built Book Review

    The Cages We Built Review by Kendi Karimi

  • What Kind of a Parent Are You? - Attachment Theory Reveals

    What Kind of a Parent Are You? – Attachment Theory Reveals

  • Gratitude Has a Dark Side Too

    Gratitude Has a Dark Side Too

  • Why Not Going To University Might be The Best Decision

    Why Not Going To University Might be The Best Decision

  • gonising Parenting Phrases We Swore To Never Use

    30 Agonising Parenting Phrases We Swore To Never Use

  • This is How Karma Dealt With my Crazy Ex

    Wanted Revenge, But This is How Karma Dealt With my Crazy Ex

  • A date from hell

    A Date From Hell

  • GET SOCIAL
theLocco Magazine

© 2016 All rights reserved. TheLocco Magazine.

TOP