- Man guilty of drug charges faces 60 years in prison
- Rockford BBB aware of ‘Microsoft’ phone scam
- Judge: Chad Grimm will remain on Illinois governor ballot
- Forest-preserve sex sting nets 10
- Armed robbery reported at Machesney Park CVS
- Lee Hamilton: President, Congress should work together on military intervention
- Ethnic Parade and Festival Sunday, Sept. 21
- Symphony begins 80th season Sept. 20
- Vikings bar Adrian Peterson from team activities
- Mr. Green Car: A car from your printer
Tech-Friendly: Public Wi-Fi hotspot security basics
By Paul Gorski
Last week, I wrote about home Wi-Fi security (see link at end of article), so thought I’d wrap up my Wi-Fi security discussion by warning you not to use public Wi-Fi hotspots for sensitive Internet transactions.
Some public Wi-Fi hotspots, or connection points, are secure, but many are not. You’ll find public Wi-Fi hotspots in public buildings, restaurants, bars and more. Assume most public Wi-Fi hotspots are not secure. Better safe than sorry.
Before you use public Wi-Fi, make sure your computer OS, browser and security software packages are up-to-date. Enable your computer’s security firewall.
Disable the “sharing” of files and folders on your computer. I would also disable the saving of passwords in your browser.
Avoid performing banking, stock trading or other sensitive financial transactions while using public Wi-Fi. Wait until you know you are using a secure connection.
Even when checking e-mail via a browser, try to use a secure browser connection. Many e-mail services allow you to connect via “http” or “https” (secure). Choose the “https” secure method, when possible, for any e-mail or data-sharing connection.
I can’t say strongly enough: avoid conducting sensitive financial transactions while using public Wi-Fi and use secure browser connections, “https,” whenever possible.
My original Wi-Fi security article, “Tech-Friendly: Home Wi-Fi security — basics plus a bit more,” is at http://rockrivertimes.com/2013/10/02/tech-friendly-home-wi-fi-security-%E2%80%94-basics-plus-a-bit-more/. You will find additional links to other computer security articles at the end of that column.
Paul Gorski (www.paulgorski.com) has been a technology manager nearly 20 years, specializing in workflow solutions for printing, publishing and advertising computer users. Originally destined to be a chemist, his interest in computers began in college when he wrote a program to analyze data from lab instruments he hard-wired to the back of an Apple IIe.
From the Oct. 9-15, 2013, issue