Data network

 

Humanity is connected like never before, through data. The Information Age is in full swing and it’s rapid change and adoption is literally rocking the foundations of the World as we once knew it. In this article I explore one of the cornerstones of this spread of information, the wireless network and what it might mean for all of us.

 

 

 

What is a Network?

In classic computer terms a network is something by which a bunch of computers are hooked together so they can share things. These “things” may be a connection to the internet, a printer or scanner, maybe also data like document and picture files. Now days these “computers” can come in many forms, the classic desktop PC, a laptop or notebook, a tablet or pad, your phone, television and even your watch are all computer devices that can connect to a network.

What is a Wireless Network?

WirelessA wireless network is where devices use radio waves to connect to a network. In Dubbo many people on the outskirts of the city can connect to the internet via wireless provided by the new National Broadband Network "NBN". You can connect to a business's wireless network if they provide a “WiFi hotspot” like many cafes, hotels and airport lounges do. You can connect to a local area network (LAN) that is set up at your home or place of work.

Wired vs Wireless

Traditionally computers were networked with each other using cables. This still happens in many instances where large amounts of data are required to be transferred through the network. Once there was a large difference between wired and wireless, speed for one and security for another. The gap has rapidly closed however and the difference will close further with continued enhancements made to wireless technology.

Why go Wireless?

  • It's easy. No more need to run cable everywhere you need a connection. I for one will not miss crawling through dusty, hot confined roof spaces to run wires.

  • Coverage - go mobile. With wire you are tied to that wall socket, now you can drag your tablet into the back yard or someone else's office and stay connected.

  • Expand. With WiFi range extenders and bridges you extend a wireless from your office to the poolside and even your office across town.

  • Cost. Don’t like running cables? Neither do electricians so they will charge you well for the pleasure. A wireless network can be set up with one relatively cheap device.

 

How do I go Wireless at home?

A typical wireless network in a home would look like this:

Home wireless network diagram

Generally these day the Modem, Router, Wireless Access Point (and Firewall) are combined into one unit.

Wireless used to be a rarity. I recall wandering around years ago with a laptop connecting to WiFi all over the place for free. It was easy because wireless technology was so rare that no one bothered with protecting their connections with passwords, so you could just log on and off you went. These were mainly big businesses however and home wireless was almost non existent. Now, you can search wireless in your average neighborhood in Dubbo and get dozens of WiFi units within reasonable range.

The future is here, with smart phones and pads even Dick Tracey style watches and glasses all capable of becoming “connected”. Two of the world's most flamboyant entrepreneurs, Richard Branson and Elon Musk are currently in a space race to provide the whole world with wireless internet via low earth orbit satellite. No more cables, wires or even fibre. Great news for those folk in remote areas. Wireless is here and won’t be going anywhere soon. Are you ready to get “connected”?

Top photo credit : thierryvilaysith

Mid photo credit : Coastline Windows & Conservatories

 

 

Malware

Virus ScreenIf you operate a computerised device in today’s world you are under siege! That is correct, under attack from every corner. There are thousands of individuals, corporations and even countries that are actively engaged in gaining data about you so they can either influence your opinion or gain profit in some way from you, with or without your consent. A major way they seek to do this is via “malicious software” or malware as it is commonly known.

Malware can come in the form of viruses, spyware, Trojan horses and worms. These programs attempt to disrupt your use of technology by deleting or corrupting data, misdirecting your web browsing habits and even gaining sensitive financial information. The good news is that there is an army of software available to hold off the most persistent of these threats. A lot of it is available to you, as a private user, for little or no cost.

How do we get these malware programs installed on our computers? Today’s operating systems come prepared with a lot of in built defence systems for just such attacks. In general, if you have a system that has no way to interact with other, external systems you have no way for the unwanted software to “infect” your device. With our online world however there are many ways to transfer these programs to our computer simply by interacting with the external technosphere.

Possible ways to gain malware is by:

  • USB sticks or flash drives
  • Floppy disks
  • External hard drives
  • CD’s and DVD’s
  • Mobile devices and tablets
  • Local area networks
  • Wide area networks (ie. The internet)

USB DriveSome malware can target your computer by specialising in the method of delivery but the main problem is that “we” circumvent the operating system software’s inherent security protocols. The user can do this by loading the malware willingly or sometimes all it takes is a simple click of the mouse. Today, the operating system will usually give a warning prompt to the effect of “Do you really want to install this?” Unless you are really sure of what you are loading it may be prudent to say “No!”

So, how can we check that our external interactions can conducted with a better level of security? Enter third party software. To meet this malware threat a whole new software sector has arisen, the anti-malware industry. Anti- Virus/Spyware/Adware companies are now significant players in the software world. You can install software that helps you make decisions to protect your computer and data from interference.

Computer Virus

A virus is a software program that replicates itself when it is executed. Sometimes the program modifies itself when copying. The program can place itself in data drives, other programs, data files and the start-up (boot) sector of a computer or device. These programs act like a biological virus and these altered areas are basically “infected”. These programs can be simply an annoyance or in extreme cases permanently corrupt or destroy files and even hardware. As with the anti-malware industry the antivirus companies offer a raft of protective measures from these viruses. Most modern computer operating systems have a large array of inbuilt safeguards to save the system itself being infected. Once more, even the best protective measures can be bypassed with the consent of the user. Being aware of what programs you consent to let operate on your device can save a lot of grief.

Spyware

spywareSpyware doesn’t sound nice and it usually isn’t. A program that has the sole purpose on snooping on what you do with your device. This can range from watching your internet browsing habits to logging the keys you push to log into your online banking.

The most common form of spyware is called cookies. Not your average American biscuit but a small log file stored on your computer that tracks some of the things you do when visiting certain websites. These sites will use the data stored in the data file (cookie) relating to that website to try and tailor your experience when you visit them. This can be handy if you go to a site that sells fishing gear and the data in the cookie allows the site to take you directly to the lures you usually buy, bypassing the need to click through the whole catalogue. While cookies cannot place a virus or malware on your computer some third party cookies can track your long term browsing habits which you might view a privacy issue.

Another more insidious form of spyware is called key loggers. These programs can be placed on your device by a virus for example and send a record of your keyboard strokes back to the originating party. Obviously this can create a real threat to not only privacy but your personal security as well. Spyware can be thwarted not only by anti-spyware programs but also by a program called a firewall that helps prevent the data gained by the spyware being sent elsewhere.

Adware

fakeAdware simply puts advertising in front of you the user. Some adware is legitimate, generally used by software developers to recoup some of the costs of presenting their product. The program may be offered for free but if you want to get rid of the advertisements you may have to pay a fee. Other more malicious versions of these programs give you no choice and just slam advertisements in your face! Furthermore they may track your browsing history to target the advertising more to your interests. A common form is a browser redirect which sends you to a site you did not intend to visit. In my experience this has typically been to online gaming or hard core pornography sites. This is disturbing when there are youngsters about and people are embarrassed to call someone to fix these issues even though it is rarely any fault of their own. Again, the developers of browsers (like Internet Explorer, Chrome and Firefox) have a range of features that allow you to block pop up ads and redirects. They can also be augmented by specific programs that helps prevent these problems.

 

It is a big world out there and we are more connected to it than ever before. Thinking that your are wandering in a strange land and using all the caution that usually goes with that experience is a good way to look at the world connected to your computer. The operator of the device is usually the best defence against malware. You can be aided by the best programs about however if you click on something you are not sure about or install a program that you do not wholly trust then you risk bypassing all those safeguards.

At the end of the day, there is usually help out there just a phone call away. If you are not sure about a program or if things look dire, don’t hesitate to yell for help.

 

 

Share This

Follow Us