{"id":1945,"date":"2016-10-27T13:36:58","date_gmt":"2016-10-27T13:36:58","guid":{"rendered":"http:\/\/localhost\/thelocco\/mag\/?p=1945"},"modified":"2016-10-27T13:36:58","modified_gmt":"2016-10-27T13:36:58","slug":"how-to-connect-securely-to-an-unknown-network","status":"publish","type":"post","link":"https:\/\/thelocco.com\/magazine\/how-to-connect-securely-to-an-unknown-network\/","title":{"rendered":"How to Connect Securely to an Unknown Network"},"content":{"rendered":"<p>More often than not, we find ourselves in desperate need to access some internet and we can\u2019t resist using some public or unknown unsecured network.<\/p>\n<p><strong>Is it safe to use the unsecured network? <\/strong><\/p>\n<p>The answer to this question is that, it is not completely safe to use these unsecured networks, however by taking the necessary precautions one can connect securely to an unknown network.<\/p>\n<p>Though it is not possible to achieve absolute security, the goal of network security is to make is extremely difficult for one to get exposed to security threats. Currently, computers and other devices, such as PDAs and smart phones can access connect to unsecured Wi-Fi wireless networks in most of the public places such as airports, coffee shops, hotel lounge making it easier for hackers to access private information and data of unsuspecting internet users.<\/p>\n<p>An un-secured network is a network that has no security protocols or has outdated security protocols. The risks one is exposed to when connecting to an unidentified unsecure network; be it wireless or cable include; <span style=\"color: #003366;\"><em>malicious insertion, network imitations and threat from network scanners among others<\/em><\/span>.<\/p>\n<p>This simply means that by using these networks, users are leaking sensitive information to hackers with special tool to access it. Such information may include passwords of the sender, personal addresses of the sender and receiver, and other sensitive personal information such as bank accounts.<\/p>\n<p><b>Exemplar<\/b><\/p>\n<p>To further elaborate this situation, take an example when mailing a letter, one places the letter in the mailbox which the mailman later picks and delivers to the recipient.<\/p>\n<p>A malicious attack in this case would involve an unauthorized individual who is not an employee of the post office, accessing or intercepting the letter before it could get picked up the mailman. As such, the attacker could do whatever he pleases with the contents of the letter; he could read the contents, change the content, and even destroy the letter. Similarly, this is what is likely to happen when one does not take precaution while using an unsecured network.<\/p>\n<p>All hope is not lost<\/p>\n<p>However, all hope is not lost, there are security measures one can take when using to an open and unsecure network. There are two instances: connecting to an unknown network using your own device and when using an unknown device.<\/p>\n<p>Such tools that come in handy in these instances are <em><strong>Https &amp; Https everywhere. Https<\/strong><\/em> encrypts sensitive data using SSL\/TLS. Thus, when accessing websites enter\u00a0<strong>https<\/strong>\u00a0instead of\u00a0<strong>http; <\/strong>this will encrypt and decrypts login information, user page requests and other web pages that are returned by the Web server thus protecting man-in-the-middle and eavesdropping attacks.<\/p>\n<p><em><strong>Https Everywhere<\/strong><\/em> is a slightly advanced Https technology that uses a whitelist of sites or rather major sites that we use to access other sites such as Google, Wikipedia and popular social networks by automatically activating inbuilt security of these sites.<\/p>\n<p>Another effective method is the use of <em><strong>Virtual Private Network (VPN)<\/strong> <\/em>which makes the unidentified networks function as a single logical unit thus making it possible to easily monitor, secure\/encrypt this point. Moreover, users should always implement more secure practices when accessing such kind of networks.<\/p>\n<p>Such practices include use of unique and strong passwords, use of two-step authentication where possible, keeping the firewall active, turning off file and printer sharing, visiting strictly secure sites, use secure web applications and finally limiting the time periods connected to the network.<\/p>\n<p>When using an unknown device the above mentioned tools and security practices apply other than not using weak passwords and configuring firewalls.<\/p>\n<p>A more secure solution is to use a flash disk or a USB external hard drive mounted with a bootable operating system such as Linux OS, which separates the web operations from operations of the device thus creating a secure environment for the user.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>More often than not, we find ourselves in desperate need to access some internet and we can\u2019t resist using some public or unknown unsecured network. Is it safe to use the unsecured network? The answer to this question is that, it is not completely safe to use these unsecured networks, however by taking the necessary<\/p>\n","protected":false},"author":1,"featured_media":1946,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false},"categories":[20,2,3,41,22,50,5],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.8.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Connect Securely to an Unknown Network - theLocco Magazine<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/thelocco.com\/magazine\/how-to-connect-securely-to-an-unknown-network\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Connect Securely to an Unknown Network - theLocco Magazine\" \/>\n<meta property=\"og:description\" content=\"More often than not, we find ourselves in desperate need to access some internet and we can\u2019t resist using some public or unknown unsecured network. Is it safe to use the unsecured network? The answer to this question is that, it is not completely safe to use these unsecured networks, however by taking the necessary\" \/>\n<meta property=\"og:url\" content=\"https:\/\/thelocco.com\/magazine\/how-to-connect-securely-to-an-unknown-network\/\" \/>\n<meta property=\"og:site_name\" content=\"theLocco Magazine\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/web.facebook.com\/theloccomarketplace\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-27T13:36:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/thelocco.com\/magazine\/wp-content\/uploads\/sites\/3\/2016\/10\/connect-securely.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Eric Gichuru\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eric Gichuru\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/thelocco.com\/magazine\/how-to-connect-securely-to-an-unknown-network\/\",\"url\":\"https:\/\/thelocco.com\/magazine\/how-to-connect-securely-to-an-unknown-network\/\",\"name\":\"How to Connect Securely to an Unknown Network - theLocco Magazine\",\"isPartOf\":{\"@id\":\"https:\/\/thelocco.com\/magazine\/#website\"},\"datePublished\":\"2016-10-27T13:36:58+00:00\",\"dateModified\":\"2016-10-27T13:36:58+00:00\",\"author\":{\"@id\":\"https:\/\/thelocco.com\/magazine\/#\/schema\/person\/5dd1eb982f595622376c012b33ff89f4\"},\"breadcrumb\":{\"@id\":\"https:\/\/thelocco.com\/magazine\/how-to-connect-securely-to-an-unknown-network\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/thelocco.com\/magazine\/how-to-connect-securely-to-an-unknown-network\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/thelocco.com\/magazine\/how-to-connect-securely-to-an-unknown-network\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/thelocco.com\/magazine\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Connect Securely to an Unknown Network\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/thelocco.com\/magazine\/#website\",\"url\":\"https:\/\/thelocco.com\/magazine\/\",\"name\":\"theLocco Magazine\",\"description\":\"Get the latest stories, news, reviews and guides at theLocco Magazine.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/thelocco.com\/magazine\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/thelocco.com\/magazine\/#\/schema\/person\/5dd1eb982f595622376c012b33ff89f4\",\"name\":\"Eric Gichuru\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/thelocco.com\/magazine\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0a54d5789411be7608bd19bac80f596c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0a54d5789411be7608bd19bac80f596c?s=96&d=mm&r=g\",\"caption\":\"Eric Gichuru\"},\"url\":\"https:\/\/thelocco.com\/magazine\/author\/loccoadmin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Connect Securely to an Unknown Network - theLocco Magazine","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/thelocco.com\/magazine\/how-to-connect-securely-to-an-unknown-network\/","og_locale":"en_US","og_type":"article","og_title":"How to Connect Securely to an Unknown Network - theLocco Magazine","og_description":"More often than not, we find ourselves in desperate need to access some internet and we can\u2019t resist using some public or unknown unsecured network. Is it safe to use the unsecured network? The answer to this question is that, it is not completely safe to use these unsecured networks, however by taking the necessary","og_url":"https:\/\/thelocco.com\/magazine\/how-to-connect-securely-to-an-unknown-network\/","og_site_name":"theLocco Magazine","article_publisher":"https:\/\/web.facebook.com\/theloccomarketplace\/","article_published_time":"2016-10-27T13:36:58+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/thelocco.com\/magazine\/wp-content\/uploads\/sites\/3\/2016\/10\/connect-securely.jpg","type":"image\/jpeg"}],"author":"Eric Gichuru","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Eric Gichuru","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/thelocco.com\/magazine\/how-to-connect-securely-to-an-unknown-network\/","url":"https:\/\/thelocco.com\/magazine\/how-to-connect-securely-to-an-unknown-network\/","name":"How to Connect Securely to an Unknown Network - theLocco Magazine","isPartOf":{"@id":"https:\/\/thelocco.com\/magazine\/#website"},"datePublished":"2016-10-27T13:36:58+00:00","dateModified":"2016-10-27T13:36:58+00:00","author":{"@id":"https:\/\/thelocco.com\/magazine\/#\/schema\/person\/5dd1eb982f595622376c012b33ff89f4"},"breadcrumb":{"@id":"https:\/\/thelocco.com\/magazine\/how-to-connect-securely-to-an-unknown-network\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/thelocco.com\/magazine\/how-to-connect-securely-to-an-unknown-network\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/thelocco.com\/magazine\/how-to-connect-securely-to-an-unknown-network\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/thelocco.com\/magazine\/"},{"@type":"ListItem","position":2,"name":"How to Connect Securely to an Unknown Network"}]},{"@type":"WebSite","@id":"https:\/\/thelocco.com\/magazine\/#website","url":"https:\/\/thelocco.com\/magazine\/","name":"theLocco Magazine","description":"Get the latest stories, news, reviews and guides at theLocco Magazine.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/thelocco.com\/magazine\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/thelocco.com\/magazine\/#\/schema\/person\/5dd1eb982f595622376c012b33ff89f4","name":"Eric Gichuru","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/thelocco.com\/magazine\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0a54d5789411be7608bd19bac80f596c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0a54d5789411be7608bd19bac80f596c?s=96&d=mm&r=g","caption":"Eric Gichuru"},"url":"https:\/\/thelocco.com\/magazine\/author\/loccoadmin\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/thelocco.com\/magazine\/wp-content\/uploads\/sites\/3\/2016\/10\/connect-securely.jpg?fit=1280%2C853&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/p8cy6p-vn","_links":{"self":[{"href":"https:\/\/thelocco.com\/magazine\/wp-json\/wp\/v2\/posts\/1945"}],"collection":[{"href":"https:\/\/thelocco.com\/magazine\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thelocco.com\/magazine\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thelocco.com\/magazine\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thelocco.com\/magazine\/wp-json\/wp\/v2\/comments?post=1945"}],"version-history":[{"count":2,"href":"https:\/\/thelocco.com\/magazine\/wp-json\/wp\/v2\/posts\/1945\/revisions"}],"predecessor-version":[{"id":1948,"href":"https:\/\/thelocco.com\/magazine\/wp-json\/wp\/v2\/posts\/1945\/revisions\/1948"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thelocco.com\/magazine\/wp-json\/wp\/v2\/media\/1946"}],"wp:attachment":[{"href":"https:\/\/thelocco.com\/magazine\/wp-json\/wp\/v2\/media?parent=1945"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thelocco.com\/magazine\/wp-json\/wp\/v2\/categories?post=1945"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thelocco.com\/magazine\/wp-json\/wp\/v2\/tags?post=1945"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}