Advertisement
Advertisement

Airborne dangers

Danyll Wills

Bluetooth With a range of about 10 metres, Bluetooth was initially designed to handle wireless connectivity with computer peripherals such as keyboards and mouses. It has become an extremely popular function on mobile phones and PDAs, however, and that means users who are not careful can be vulnerable. Go into a bar, turn your Bluetooth-enabled phone on and search for others. You may be surprised at how many people have their device set to 'always accept'. Take heed, if you value your privacy.

Wi-fi The MAC (media access control) address identifies your Ethernet and Wi-fi connection. When you set up your wireless router at home, make sure you enable the MAC address filter, so that only the computers you specify can log on. Having your bandwidth hijacked is not the end of the world, but do you want to leave your connection open to hackers?

War driving This comes from the old days of 'phone phreaking' when hackers would 'war dial' phone numbers and make a note of those that connected to a computer rather than a human. War driving refers to using a notebook computer and wireless technology to scan for unprotected wireless access points while touring around a city.

Post