It’s as though you’re in a room filled with English-only speakers, talking into a phone speaking Mandarin Chinese. It’s so painfully easy that a motivated 12 year old with a laptop and a copy of Firesheep could snatch up your credentials for all manner of things. Anyone with a Wi-Fi device in the area can sniff your data. During the transmission from your computer to the greater internet your data is wide open. Data leaves your Wi-Fi modem, travels through the air unencrypted to the Wi-Fi node in the coffee shop, and then is passed on to the greater internet. Scenario one: You’re at a coffee shop using your laptop to browse the internet through their free Wi-Fi connection. Let’s lay out a couple different scenarios that involve you using the internet to illustrate the benefits of secure tunneling. If you have any questions or need assistance with a specific task, you can consult the Linksys manual or contact Linksys customer support.You might be curious why you would even want to set up a secure tunnel from your devices to your home router and what benefits you would reap from such a project. The specific options available to you will depend on the model and firmware version of your router. These are just a few examples of the tasks you can perform once you are logged into your Linksys router.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |