ks6+Pf&Ô,YnRi$M^~HH  JoE-ǹy&qbw/o~?޼ C1A1uw 92b$C i456ǂ:'rjyO$JZ&aًKlnD#ƹvfvIو',v=%$TNcdgEV5iWtg\8&О1r@Җ y>e3F\  C#B(jW/#8yDG802ê[[fTF o^ӆ[XO0)D䔜J=%$+9õ@h;loj[{f:Z4*gN:®!$Cʴ>6RhM X_Oyާί9ϩ4wGD3щfљEԀTW)e4e\֠Ә}*ӓX[1%v"*DD7k.Ml MLKݷIrǮ,JpP^1bxmGˁF9%n{?Z?86;3zeS֪M<3jB Mp`L%dNw^3 ddZP^<%E`ָ N# Zf\gnM3[KJ_'Ut=QpF gh+cjT:s!7ԞԚUY u+>nU{Z `|`27 uqI"ru"Mqv=C9cX;hc-Pffq P]=8" YS\1*)k>՝_}0t$^YZ1lq#l07N"n5+a8i^& "hUM zVCA+>qOZx,VsW4E IFrD`,POSJ#Xz+6h4om̅Ři8 5(A`jh7?9hDzCCPVA81@Fqk$麮5Gff^t:^BЊº(ƃs^"X`37MZ 3<2!nc *6GLkW,sC{Y2`: R10S"ӸSmXm!u5u=7 1@1}RS :޺CL惇?܄U?hnŀ\`E,Vwǵ>h?>3º_]B|NWyiZsw@EUPQM~]8.\:K̍pXl` ~ 47,HJ- .qe3- #4[Is0FW9jY2#̺PlQG A0@;9l7 KBBN@n?+,56f?+"w^ټoPK$w!8CoL'1^f$оn67ءUasb !eܘ쥫3}sZn`ChЪ6:*YR)uߔy2:&f&9+*uJHjƓ}XNjL8_ȘRu@cޑ7/^*~q 8l,=*֞߻ß~"pw>(A?ݣaFLK*?Ow 1$mj $jl׏V~`"WqlUfa_y5O]κ.ƾqg1F3r{ iٞ0OaU fZOsKU٧ 5QK4cb ffTtirrk%6Lss}wߕ)vHlN1f3<6"bSyr͜p"e:MFLL3yC15Z9,vo[q)mԨS ,xd4YR,ݫmF>;S]&apV+2KHq&y6]y @eQ9J?:;b}3ĭY!g\OTeCO*%qA2d#dp 5w|˷ĞUbI(L]{.Rɏ7'G7O>׼FjSvON`R$H'/z[H9 ,oFcSc>f,ɬ{ah/rnh?n4O==l>i*=$c'rR~HաjU0 єz \ܩ &@@q!?O5/G3(\۝UiZ|Wm^ި5P[< +yc"=C'\:E.|`*Mz1´h&b ̛\ 04/24/12, One Step Ahead: Not all wireless is created equal - Almanac, Vol. 58, No. 31
Print This Issue

One Step Ahead: Not all wireless is created equal

April 24, 2012, Volume 58, No. 31

Another tip in a series provided by the Offices of Information Systems & Computing and Audit, Compliance & Privacy.

Wireless networking has become nearly ubiquitous to the point that, even in the great outdoors, there are fewer and fewer spots where wireless users can’t get “bars.” In addition to laptops, the list of devices that can make use of wireless networks now includes smartphones, tablet devices like iPads, printers, thermostats—even home DVD players can now deliver content and updates via wireless!

With so many networks available, how can you know which are safe to use? In many cases, actually, you can’t. Penn’s main wireless network, AirPennNet, is a very robust, high-bandwidth medium featuring state-of-the-art encryption and security which protects PennKey-authenticated users. An alternative network, AirPennNet Guest, which provides lower bandwidth and no encryption in transit is available to users whose time at Penn is brief or limited, and whose needs are not as demanding.

But what about the coffee shop on the corner, or the hotel you just checked into? Even major, reputable businesses sometimes offer free wireless networks that do not require authentication and/or encryption, and it’s a good idea in general to avoid open, unencrypted wireless networks on which other “freeloaders” ­maybe even the guy sitting next to you­—are intercepting (“sniffing”) and capturing traffic on the network, including yours.

At home, make your wireless network as secure as possible by using the strongest encryption your access point(s) provide (usually WPA-2), making sure the password needed for access is strong, and change all default administration passwords.

For more information on Penn’s wireless networks, visit www.upenn.edu/computing/wireless/

For additional tips, see the One Step Ahead link on the Information Security website: www.upenn.edu/computing/security/

Almanac - April 24, 2012, Volume 58, No. 31