Appendices

Even keeping your network settings, such as the SSID and the channel, secret won’t prevent a hacker from listening for those beacon messages and stealing that infor- mation. This is why most experts in wireless networking strongly recommend the use of WEP (Wired Equivalent Privacy). WEP encryption scrambles your wireless signals so they can only be recognized within your wireless network.

But even WEP has its problems. WEP’s encryption algorithm is referred to as “simple”, which also means “weak”, because the technology that scrambles the wireless signal isn’t too hard to crack for a persistent hacker.

There are five common ways that hackers can break into your network and steal your bandwidth as well as your data. The five attacks are popularly known as:

1.Passive Attacks

2.Jamming Attacks

3.Active Attacks

4.Dictionary-building or Table Attacks

5.Man-in-the-Middle Attacks

Passive Attacks

118

There’s no way to detect a passive attack because the hacker is not breaking into your network. He is simply listening (eavesdropping, if you will) to the information your network broadcasts. There are applications easily available on the Internet that can allow a person to listen into your wireless network and the information it broadcasts. Information such as MAC addresses, IP addresses, usernames, pass- words, instant message conversations, emails, account information, and any data transmitted wirelessly, can easily be seen by someone outside of your network because it is often broadcast in clear text. Simply put, any information transmitted on a wireless network leaves both the network and individual users vulnerable to attack. All a hacker needs is a “packet sniffer”, software available on the Internet, along with other freeware or shareware hacking utilities available on the Internet, to acquire your WEP keys and other network information to defeat security.

Jamming Attacks

Jamming Attacks, when a powerful signal is sent directly into your wireless net- work, can effectively shut down your wireless network. This type of attack is not always intentional and can often come about simply due to the technology. This is especially possible in the 2.4 GHz frequency, where phones, baby monitors, and microwave ovens can create a great deal of interference and jam transmissions on your wireless network. One way to resolve this is by moving your wireless devices into the 5 GHz frequency, which is dedicated solely to information transmissions.

Corinex ADSL2+ Wireless Gateway G

Page 119
Image 119
Corinex Global ADSL2+ manual Passive Attacks, Jamming Attacks

ADSL2+ specifications

Corinex Global ADSL2+ is a cutting-edge broadband solution designed to enhance internet connectivity for both residential and business users. Leveraging the ADSL2+ technology, Corinex Global offers high-speed internet access over existing copper telephone lines, enabling users to experience faster download and upload speeds, improved stability, and greater overall network efficiency.

One of the standout features of Corinex Global ADSL2+ is its remarkable data rates. Capable of reaching download speeds of up to 24 Mbps and upload speeds of up to 1.5 Mbps, this technology significantly improves user experience, particularly for bandwidth-intensive applications such as streaming, online gaming, and video conferencing. This increased capacity allows households and businesses to connect multiple devices simultaneously without compromising performance.

Corinex Global ADSL2+ employs advanced modulation techniques to extend the reach of ADSL technology. This includes the use of dynamic bandwidth allocation, which intelligently optimizes the distribution of bandwidth among users based on their needs. As a result, users benefit from consistent speeds even during peak usage times, making it an ideal choice for environments with high internet demands.

Another key characteristic is its compatibility and seamless integration with existing infrastructure. The ADSL2+ solutions from Corinex Global are designed to work with existing DSLAMs (Digital Subscriber Line Access Multiplexers), which means that providers can upgrade their networks without incurring significant costs for new hardware. This flexibility allows for a smoother transition to higher-speed services while utilizing current assets efficiently.

In addition, security is a foundational aspect of Corinex Global ADSL2+. With built-in features such as encryption and secure authentication protocols, users can trust that their data is protected during transmission. These safety measures ensure that sensitive information remains confidential, making it a reliable choice for businesses that prioritize cybersecurity.

Lastly, Corinex Global offers robust customer support and service options, providing users with guidance and assistance in optimizing their ADSL2+ experience. Their commitment to quality service ensures that both consumers and businesses have the resources they need to maximize their internet performance.

In summary, Corinex Global ADSL2+ stands out due to its high-speed capabilities, dynamic bandwidth management, compatibility with existing systems, strong security features, and dedicated customer support, making it a leading choice for efficient and reliable internet connectivity.