Jason Palmer, CPA, CITP

Cyber Insurance Auditing

  • Home
  • Blog
  • Services
    • Break/Fix
    • Network Infrastructure
    • Installation
    • Web Hosting
    • Web Applications
  • Consulting
  • Vendors
  • U.S. Federal Courts
  • About Us
  • Contact Us
  • Product Showcases
You are here: Home / Archives for Tech in Plain English

Lack of Electronic Privacy – It’s your own fault.

July 29, 2012 By Jason Palmer 1 Comment

Google is Watching YouI am a Motorola Droid 2 Global Smartphone user running the Android 2.3 operating system.  By default, the phone comes preinstalled with a number of useful Google applications (Apps) such as email, web browser, maps, books, etc. and one in particular that got my attention: YouTube.

I acknowledge that in order for Smartphone Applications to function, they need a certain amount of unrestricted access.  This might include opening up network connections, keeping the phone from going to sleep, automatically updating your location, using stored credentials to access your accounts for transmitting and receiving data.  Most of these activities are routine, necessary, and are of little cause for concern.

Now I am sure all of you are thinking, “What could possibly be troublesome about the YouTube media player app?”  Answer:  Its’ total and complete disregard for my personal privacy and the inability for me to set any parameters to limit its’ reach in to my phone or personal activity.

In the most recent update the Privacy Policy has changed.  So much so that Google specifically brings to your attention this new level of invasive access that is something right out of a TV Crime Drama.  The YouTube app may, and I quote, “Take Pictures and Videos” which sounds harmless enough until you read this part, “Allows application to take pictures and videos with the camera.  This allows the application AT ANY TIME to collect images the camera is seeing.”  Wait there is more:  “Allows an application to perform operations like adding, and removing accounts and deleting their password.”

Google YouTube Site ScopeExcuse me?  This implies that any time my Camera is on, YouTube can capture the images from the Camera and then without asking for my specific approval, act on my behalf by accessing all of my account information and permissions and transmitting the images regardless of my intent.

This sounds very much to me like that new Anti-Theft application that, upon activation, automatically turns on the Camera of your Smartphone and takes a picture of the alleged thief, tags the GPS location of the phone and updates a secure web page or emails the information for you to forward to Police.  There is one critical exception:  I can control that Anti-Theft Applications access to my camera, I cannot control the actions of YouTube.

I would like to believe that I am misreading the privacy policy and that what Google really means is that the above can only happen when I have the Camera on and INTEND for the YouTube application to upload my images to the YouTube service.  However, that still does not explain the part about the ability to, “add/remove accounts and delete passwords.”

If the intent of Google is to “act on my behalf with my explicit instructions and approval” then they should clearly say so.  If not, I am concerned that if I permit YouTube the access it seeks, I might have just given up all privacy rights to every photo or video I take with my phone because I have given Google complete and total access to those images.

Google is Acting EvilUnfortunately, there is really no one to ask for clarification about the Privacy Policy at Google.  I did use the Privacy Policy Contact Us form but the confirmation page was less than comforting in its response to my inquiry:  “We’ve received your message. We’ll follow up with you only if we require more info or we have additional info to share.”

More users need to READ the privacy access permissions being requested by Smartphone and Software Applications and recognize exactly what they are signing away in terms of personal privacy.  Then, they need to contact the developers or providers of the service and refuse to accept the terms and NOT USE THE APPLICATION until the privacy policy is corrected.

Perhaps the best example of a complete and total disregard for personal privacy of any kind is Facebook.  The site gives the appearance of allowing users to set controls over how their information is used and shared.  The practical reality is that every Facebook App wants the ability to act as if it is you with full access to your address list and all of your information.  It wants to “post to your wall” at will with no opportunity to for you to review what the App will post.

Obviously, the other 799,999,999 Facebook users (of the 800 Million) are completely comfortable with allowing Facebook and most Applications to have an “All Access Pass” to every single piece of information listed in the Facebook ecosystem.  I must be the only one to be concerned as Facebook since as popular as ever.

My point is that due to our own lack of action, we are giving away our information then complaining about it after the fact.

Electronic Frontier FoundationIf you are concerned about the state of Electronic Privacy, get involved with the Electronic Frontier Foundation. Their mission is to defend your rights in the Digital World.

Forewarned is forearmed.  If you know that the privacy policy is overly invasive and access to your information is virtually unrestricted, be mindful of what you post or allow any site or service that has a sharing component to know about you.

The age old adage, “Never put anything up on the Internet or in an email that you would not want on the cover of the New York Times” still holds true.  (Or, you might just be reading about it in the morning paper.)

One Final Note:  Institutions that manage your personal financial data take privacy very seriously and go to extreme measures to make sure that your information stays secure.  They may share your name and address for marketing purposes but your sensitive information is not shared without your express permission.  An example would be release of financial information for a credit application.

To view the Google Privacy Policy, visit:
http://www.google.com/policies/privacy

To learn more about the Electronic Frontier Foundation, visit:
http://www.eff.org

Filed Under: Commentary, Consulting, Security, Tech in Plain English Tagged With: EFF, Electronic Frontier Foundation, Electronic Privacy Policy, Privacy Policy, Smartphone Apps

Managing your Online Accounts and Personal Disaster Recovery

July 28, 2012 By Jason Palmer Leave a Comment

Password Manager SafeWe all have dozens of online accounts each secured with a unique user id and password.  How do you protect against loss of your super-secret password list in case of a disaster?  What happens if you are completely incapacitated or worse, have an untimely demise?  How would your designated representative access your accounts on your behalf to pay bills, transfer funds, or even manage the proper liquidation and distribution of your assets which are all securely locked with access information known only to you?  The answer:  They wouldn’t.  And, worse, without a proper and complete inventory of all online accounts, they might not even know where to look.

In the early days of the World Wide Web, online accounts were predominantly email, content sites (AOL, Compuserve), or Social Media sites.  Today virtually every major Bank, Brokerage House, Credit Card Company, and Utility is pushing hard to eliminate paper statements and move management of your accounts completely online.  In fact, many accounts may never generate any paper and be created and managed entirely online.

Before the digital age, if a disaster were to strike or even if you were to pass away, there was a good chance that the U.S. Postal Service would continue to deliver your mail and that you or your heir would learn of any accounts they were unaware of because a Statement would be delivered.  Today, without paper, just like in Las Vegas, “What happens Online, stays Online” – and in this case locked up and invisible behind an user name and password known only to you.

One way to provide for personal disaster recovery for loss of your password list and enable an Executor or Legal Representative to gain access to your Online Accounts in case of your death or incapacity is with an Online Password Manager.

These programs offer the additional benefit of being able to use one “Master” password to gain access to the inventory list of all of your accounts.  This means that you only have to provide one password to your Executor or Legal Guardian for them to gain access to all of the account information.  This Master Password can be placed in an envelope and put in a safe deposit box or given to your Attorney or trusted family member, friend, or associate for safe-keeping in case of your incapacity or untimely demise.  (This makes the assumption that you have such a person available to you.)

Two other key benefits is that all of your account and password data are stored in a highly encrypted format accessible online via a web browser as well as locally on your computer for when you are not connected to the Internet.

Best practices for Disaster Recovery state that you backup your computer files off-site (away from your home or office) in case of fire, flood, or theft.   Your Online Account information and Passwords should be stored off-site as well AND provisions made for a trusted person to have access to them on your behalf in case of incapacity or death.

Two Top Rated Solutions for Password Management are:

LastPass – Free and Premium Versions
– Browser Based with Option to Store on USB Key – Free Version
– Mobile Support and Two Factor Authentication – Premium Version
http://www.lastpass.com/

Wallet – Nominal Cost
– Mac Version for iMac/MacPro and MacBooks
– IOS Version for iPod/iPhone/iPad
http://www.acrylicapps.com/wallet/mac

Filed Under: Consulting, Tech in Plain English Tagged With: Digital Asset Management, Estate Planning, Online Account Access, Password Manager, passwords, Username

“This is for Everyone” – Tim Berners-Lee – London 2012 – on Inventing the World Wide Web

July 27, 2012 By Jason Palmer Leave a Comment

London 2012 Logo“This is for Everyone” is the sentiment expressed by Tim Berners-Lee, the inventor of the World Wide Web, during the opening ceremonies of the London 2012 Olympic Games.

Tim Berners-Lee - For Everyone - London 2012 Opening CeremonyAs most inventions do, it started as solution to a problem.  Tim was working at CERN with a few thousand other people from universities around the world.  They brought many different kinds of computers running all types of software programs.  To access the data on each different computer usually required a separate account and password and completely different procedures.

To put the organization of the information problem in perspective, think about how many different ways one can keep paper documents in a traditional filing cabinet.  Think about something as simple as filing a Telephone bill.  I might put in a folder called, “Verizon” for the company name.  You might put it in a folder called, “Telephone.”  Someone else might just file it in a general folder called, “Utility Bills.”  Do you see the problem?  Without a standard method of presenting the Telephone Bill to others, sharing information can become very tedious.  Candidly, while at CERN Tim said, “Often it was just easier to go and ask people when they were having coffee” [then to try to access their computers for the information.]

The question Tim answered, “Can’t we convert every information system so that it looks like part of some imaginary information system which everyone can read?” And that became the World Wide Web.

Tim went on to connect Hypertext, the language of Web Pages, to TCP, the Protocol that allows computers to talk with each other over a network, and DNS – The Domain Name System or global address book that does the lookup of a web site name and directs the request to the proper web server.

It was his ability to bring these three critical components together that makes the World Wide Web possible.

One of the most important aspects of Tim’s work is his desire that his invention be accepted as a standard and universally available to all.  It is for this reason that it is an Open System.  Tim stated that “you cannot propose that something be a universal space and at the same time keep control of it.”  (Personally I think that Steve Jobs and Bill Gates might have a different opinion on the ability to make something a de facto standard and cash in big on it.)

We should all thank Tim Berners-Lee for his genuine altruism.  His invention of the World Wide Web truly is for everyone.  No other technological innovation since the Gutenberg Press or the Telephone has had such a global impact.

To see the Website of the world’s very first web server, visit
http://info.cern.ch

To see Tim’s Original World Wide Web Browser, View these two pages:
Black and White
http://info.cern.ch/NextBrowser.html
Color, in 1993
http://info.cern.ch/NextBrowser.html

The following page, although not the original due to updates is representative of the original web page that started it all:
http://www.w3.org/History/19921103-hypertext/hypertext/WWW/TheProject.html

For some excellent background on Tim Berners-Lee in his own words, check out:
http://www.w3.org/People/Berners-Lee/

Answers for Young People
http://www.w3.org/People/Berners-Lee/Kids.html

Frequently Asked Questions
http://www.w3.org/People/Berners-Lee/FAQ.html

“Weaving the Web” Book by Tim Berners-Lee
http://www.w3.org/People/Berners-Lee/Weaving/Overview.html

For everything you ever wanted to know about the World Wide Web Standards
http://www.w3.org

Filed Under: Networking, Tech in Plain English Tagged With: Open Standard, Tim Berner Lee, W3C, World Wide Web History

Blackberry Email Account Architecture and Sync Issues with Gmail

July 24, 2012 By Jason Palmer Leave a Comment

Blackberry Sad Gmail Due to a fundamental change in the architecture of the Blackberry software, the synchronization of Contacts and Calendar entries between accounts is no longer supported.  In the early days of a Blackberry, if you had a company email address that was connected to a Microsoft Exchange Server and a personal use account at Gmail, you could use the Google Sync App to keep the contacts and calendar synchronized between the two.

Since the Blackberry device supports Gmail natively as a specific type of email account type, the functionality has significantly changed.  RIM has taken the position that your Business Contacts and Calendar should be separate and apart from your Personal Contacts and Calendar.  Each account you create on a Blackberry device gets its’ own email folder, calendar, and contact list.  The problem is that RIM does not maintain this separation in the default view when displaying the Contacts or Calendars for business and personal items.

In what I term, “Defective by Design”, the Blackberry commingles all personal and business contacts in one view.  It does the same for all personal and business calendar entries.  Even though you can select to display the Contacts or Calendar associated with just one account, i.e. your Gmail account, as soon as you return to the main menu or leave the contacts or calendar app, the selection changes back to “all.”  This would seem to contradict RIM’s reasoning of personal vs. business because the default view for contacts and calendar events always commingles the personal and business accounts.

It is interesting that in addition to having an “All Messages” commingled folder, the Blackberry device also has individual folders (App icons) for each mail account.  Why they do not give the same option for quickly and permanently allowing one specific view, personal or business, for Contacts and Calendar entries as a default or as dedicated App button is a mystery.

This is a problem because many people were previously using Google Sync to keep all of the Gmail Contacts/Calendar Events and all of the Microsoft Exchange Contacts/Calendar Events in complete and perfect synchronization. Make a change in one, and it magically appeared in the other.  Because of the current Blackberry architecture, users see all of their Contacts and Calendar Entries duplicated unless they select just one of the views, personal or business every time the return to the Contact or Calender App.

With the new architecture, each account and its corresponding mail, contacts, and calendar stand alone.  Each account can sync back only to its’ respective Mail Server:  Gmail or Microsoft Exchange.

If you truly separate your personal life using Gmail and your business life using Microsoft Exchange on your Blackberry, then this is nothing more than an incredible annoyance.  All of your Personal and Business Contacts and Calendar Events, by default, will display all of the time – unless you make a selection each time you enter the Contact or Calendar App.  There will not be any duplicates but your personal and business life will be forever commingled in the display on your Blackberry.

If you use want to use your Gmail Account and Microsoft Exchange account interchangeably, accessing the same set of synchronized contacts and calendar events, this feature will no longer be supported.  Google has announced that it will be discontinuing Google Sync for Blackberry effective September 1st, 2012.  This will require you to do some serious housekeeping and separation of your personal from business contacts to avoid displaying duplicates on your Blackberry.

Filed Under: Google Apps, Office365, Tech in Plain English Tagged With: Blackberry, Blackberry Sync, Email Sync, Google Sync for Blackberry, RIM

Help – My Computer is infected with a Virus!

July 22, 2012 By Jason Palmer Leave a Comment

Computer VirusIt is not a question of if your computer will get infected a Virus, Trojan, or some form of Malware/Spyware, it is just a matter of when.  The Microsoft Windows family of operating systems are targeted by hundreds of thousands of malicious software programs regularly.  Even with the most up-to-date Antivirus software, infections do happen.  No Antivirus software can catch every attack and variant all the time.

If you can still access the Windows “Start” button, access the Internet, and install Programs, the Antivirus Scan and Removal Tools listed in my article, “What did your Antivirus Software Miss?” will usually resolve and remove the minor infection from the offending software.

If the virus has taken your computer desktop hostage and is holding it ransom, telling you to click on a link to access a web site to make a payment for an “unlock” code – which will magically “fix” your computer, then more drastic measures are required.

Such is the case with a recently encountered, “File Recovery” virus that has started to make the rounds this past week.

Note:  The majority of viruses, even Root Kits, can be removed and your Computer restored to its’ “pre-infection” state.  It may just take an incredible amount of time and patience to go through the steps required to remove the virus.

This would be a great time to remind everyone that if they had an “Image Backup” of their computer prior to the infection, they could simply perform a “Restore” and roll-back the computer to a time BEFORE it was infected.  See my article, “Image Backup – True one-click Restore for Disaster Recovery.”

As an example, the “File Recovery” virus encountered displays fake alerts and warnings claiming a number of hard drive errors and that failure of the hard drive is imminent.  In reality, NONE of these warnings are real.  The entire purpose of the malicious program is to scare you in to purchasing the “File Recovery” software and stealing your personal financial information.  (You will presumably be entering in a credit card number to make the purchase.)  In addition to bogus alerts, it changes the Windows desktop to solid black, hides any desktop shortcuts, and hides all of the program files and many other folders.  It definitely gives the appearance that all of your programs and data are missing.  The File Recovery Self-Defense tactics block access to the Windows Task Manager, Windows Registry, and all Windows system utilities.

Just for reference, a sample screen shot of the fake warning page is shown below.

File Recovery Fake Warning Screen Shot

Regardless of if it is the “File Recovery” virus or some other nasty virus, they all tend to exhibit many of the characteristics described above.  Most importantly, to the average individual, they strike a sense of fear and panic hoping you will pay them the ransom to “clean your computer” of the dreaded infection.  DON’T.

Instead, start by seeing if you can figure out which specific malicious software program is infecting your computer.  For example, in the screen shot above, the title in the window on the upper left hand side is called “File Recovery.”

Visit your favorite search engine, like Google.com and type in “File Recovery Virus”.  You will immediately see dozens of sites with instructions on how to remove the File Recovery Virus.  In most cases, the steps are well documented for removal.  Many include screen shots and instructions telling you exactly what to click and type and the expected response from the computer after each step.

Here is an example of the comprehensive instructions which I used to remove and clean up after the “File Recovery” virus infected one client computer this week.

http://malwaretips.com/blogs/file-recovery-virus

Most of the well-known Antivirus vendors provide hundreds dedicated removal programs for specific well known viruses that are available free-of-charge from their support sites.  Each specialized removal program is optimized to disinfect your computer from a specific virus infection.

In addition, most of the vendors provide some level of advanced “Rescue” Antivirus scanners and removal tools that are available free from their web sites to assist in extreme lock-out cases.  These are programs that run in command line mode or have a custom boot image that bypasses the severely infected Windows operating system so that the Antivirus program can “kill” the malicious program BEFORE Windows starts.

For example, even if the computer seems to lock you out in Windows “normal” mode, many viruses can be tricked or stopped by restarting the computer in Windows “Safe Mode with Networking.”  In extreme cases, when the only thing you can do is restart the computer in Windows “Safe Mode Command Line Prompt”, the “Rescue” utilities are the solution of last resort and will start you on the path to recovery.

Much of the above depends on not on your technical ability but on your willingness to methodically follow a specific set of instructions and be patient.  From any given search, there will be dozens of responses.  Review a number of them to make sure that your situation applies, (based on the symptoms) and see if they are all basically providing the same steps to remove the virus.  Then pick one and stay with it until completed.  In my example with the “File Recovery” virus, the instructions had screen shots, told me exactly what to type at each step of the way, and the responses I should expect to see if successful.

Depending on the Antivirus software product you use, the vendor may provide advanced virus support removal assistance.  With some vendors this is free, like Vipre from GFI.com, with others, like Trend Micro there is a $50 support charge for assistance.  Do not expect to find live human support if you are using one of the many “free” versions of Antivirus software such as AVG, Avira, Avast, or ClamAV.

Understanding the support and virus removal services provided and associated fees, if any, available from your Antivirus vendor should be a major consideration in choosing your Antivirus Software.

I personally like Vipre from GFI.com for their outstanding, free virus removal support available via Web Chat and Telephone.  GFI/Vipre Support has helped me remove the nastiest of virus infections at no additional cost.  Support was included with the nominal cost annual virus update subscription which every vendor requires for you to obtain and download the latest threat definition databases to the Antivirus software.

Finally, there are a number of well-known sites that specialize in providing free virus removal assistance and tools through a community of volunteers.  Most provide support and response that exceed that of the major Antivirus vendors.  Realize that with rare exception, any virus infection on your computer has been seen before by the “community at large” and therefore Google.com will have a wealth of references to sites with information on how to remove it.

Computer Doctor Examining Sick PCIf you are faced with a complex virus problem or would just like some professional guidance on what to do after your computer has become infected, feel free to contact me for assistance.  “The Doctor” is always in.

 

Antivirus Removal Sites – All have specific popular virus removal instructions.

Either Search the sites below for the specific virus, or join for free and post your problem.

http://www.bleepingcomputer.com
http://www.malwaretips.com
http://www.myantispyware.com
http://www.im-infected.com
http://trojan-killer.net

Specialized Antivirus Removal Tools – Major Vendors

Symantec
http://www.symantec.com/security_response/removaltools.jsp

Kaspersky
http://www.kaspersky.com/virus-removal-tools

McAfee
http://home.mcafee.com/virusinfo/virus-removal-tools?ctst=1

Trend Micro
http://esupport.trendmicro.com/en-us/home/pages/virus-and-threat-removal.aspx

GFI.com – Vipre Rescue – Command Line – Last Resort – Removal Tool
http://live.vipreantivirus.com

Mac Users

McAfee OS X/FakeFlash Detection and Removal
http://www.mcafee.com/us/downloads/free-tools/macstinger.aspx

Filed Under: Security, Tech in Plain English Tagged With: Antivirus Tools, Virus Removal Support, Virus Removal Tools

Wi-Fi® Wireless Range Extenders – Expanding the Wireless Coverage Area

July 21, 2012 By Jason Palmer Leave a Comment

Wireless Router - Range ExtenderA Wi-Fi® Wireless Range Extender expands the coverage area of a wireless network by repeating the signal from another Wireless Router or Access Point.

Wi-Fi® – Is a certification mark developed by the Wi-Fi Alliance to indicate that wireless local area network (WLAN) products are based on the Institute of Electrical and Electronics Engineers’ (IEEE) 802.11 standards.

Using a Wireless Access Point with a hard wired connection is the preferred and more reliable method of adding additional Wi-Fi® coverage.  If data network cabling is not available and Powerline Ethernet adapters do not work due to electrical interference, the Wireless Range Extender is the answer.  (For more information on Powerline Ethernet, see my article, “Powerline Ethernet – The Infrastructure in your Walls” and for Wireless Access Points, my article, “Wi-Fi® – Wireless Router vs. Wireless Access Point.”)

Configuring a Wireless Range Extender is exceptionally easy:

  • Use the Ethernet Cable provided (or any available Ethernet cable) and plug one end in to your computer and the other end directly in to the Ethernet Jack on the Wireless Range Extender;
  • Use any web browser (i.e. Internet Explorer, FireFox, Safari, or Chrome) to visit the special web page address in the instructions;
  • Select the EXISTING Wireless Network Name you want to EXTEND;
  • Enter in the security key/password for your EXISTING wireless network;
  • Name the Wireless Range Extender.  (This needs to be a DIFFERENT name from your existing wireless network and is the name you will see in your “available wireless networks” name list when looking to connect from your wireless device, (i.e. iPad, Smartphone, Internet enabled TV.)
  • Enter in either the same or a new security key/password for the NEW Wireless Range Extender Network that you just created.
  • After the Wireless Range Extender resets, unplug the Ethernet cable, and move the Wireless Range Extender to a distance of about half to three-quarters of the coverage area from your EXISTING Wireless Router or Access Point.

When the Wireless Range Extender powers up in its’ new location, use any wireless enabled device to look for the NEW network name in the list of “available wireless networks.”  Select the NEW network name from the list and enter in the security key/password and you should now be connected to the Internet.

Wireless Router with Wireless Network ExtenderExact placement of the Wireless Range Extender is a matter of trial and error as many factors affect the quality and range of the Wi-Fi® signal from your primary Wireless Router or Access Point.  If you find that the Wireless Range Extender network “appears then disappears” from your list of available wireless networks in its’ initial location, then the Wireless Range Extender must be moved closer to the primary Wireless Router or Access Point until the coverage/signal is solid and reliable.  Usually the Wireless Range Extender has a series of colored lights that indicate the quality of the Wi-Fi® signal being received from the primary Wireless Router or Access Point which will help in determining the best placement location.

Wireless Range Extenders are available in single (2.4Ghz) and dual band (2.4Ghz/5Ghz) models.  Purchase a Wireless Range Extender that matches the bands available on your Wireless Router or Access Point.  The Wireless Range Extender can only extend the range of an existing signal.  If your Wireless Router or Access Point does not provide a 5Ghz signal, then there is nothing available for the Wireless Range Extender to repeat and extend.  There is no harm in purchasing a dual band Wireless Range Extender and leaving the 5Ghz repeater function turned off.  The advantage of a dual band unit is that when and if you upgrade the Primary Wireless Router or Access Point to dual band (2.4Ghz/5Ghz),  the Range Extender will already be in place to support the 5Ghz band.  (For an explanation of 802.11 standards and the 2.4Ghz/5Ghz bands, see my article, “Understanding the WiFi 802.11 Network Standard.”

 

Here are links to Popular Wireless Range Extenders:

Belkin Range Extenders

D-Link Range Extenders

Linksys by Cisco Range Extenders

Netgear Range Extenders

 

 

Filed Under: Networking, Tech in Plain English Tagged With: wifi, Wireless Access Point, Wireless Range Extender

Wi-Fi® – Wireless Router vs. Wireless Access Point

July 20, 2012 By Jason Palmer 2 Comments

Wi-Fi® Routers act as a gateway and translate one external Internet IP address to many private internal IP addresses, one for each Wi-Fi® device.  Access Points act as a bridge and add wireless Wi-Fi® capability to a wired network.

Wi-Fi® – Is a certification mark developed by the Wi-Fi Alliance to indicate that wireless local area network (WLAN) products are based on the Institute of Electrical and Electronics Engineers’ (IEEE) 802.11 standards.

When obtaining Broadband High Speed Internet access (Cable, xDSL, or FiOS) for your home or office, the Internet Service Provider (ISP) may give you the option of either a Broadband Modem or a combination Broadband Modem and Router with or without Wi-Fi® capability.

A Broadband Modem takes the broadband data signal from the Cable, xDSL, or FiOS and translates it in to Ethernet, which is the data signal format compatible with a computer.  It provides a single IP address. (Internet Protocol Address – think of it as unique phone number for your computer so the Internet can call you back after you call it.)  This is perfectly fine if there is only one computer device that needs Internet Access.

If the ISP give you a Broadband Modem, then to share the single IP address with multiple devices in your home or office, you need to use a Router with or without Wi-Fi® capability.  With the number of devices supporting Wi-Fi® such as Internet enabled TV’s, Blu-Ray players, Smartphones, Tablet computers, notebook computers, appliances, and Smartphones throughout the home, Wi-Fi® is no longer an optional luxery, it is now a necessity.

Most ISP’s are providing a combination Broadband Modem with Router functionality and Wi-Fi® as standard issue equipment included.

Router to Wireless Access PointThis is great except the placement of the ISP provided combination Wi-Fi® Router/Modem may not be optimal for full Wi-Fi® throughout your home or office.  The solution is the addition of a Wireless Access Point (WAP) to the network.  A Wireless Access Point is usually connected to the Router through one of the wired ports via specialized data network cable meeting a standard known as Category 5e or Category 6.  The Wireless Access Point is located in another part of the home or office away from the Wi-Fi® Router/Modem and acts as an additional transmitter of the Wi-Fi® signal.

If the home does not have any data network wiring available to provide a hard wire connection to the Wireless Access Point, then you can use Powerline Ethernet Adapters, which use the existing electrical wiring to connect the Router to the Access Point.  See my related post, “Powerline Ethernet – The Infrastructure in your Walls.”

The important point to remember is to only have one Router in the network, wired or Wi-Fi® enabled, to act as the gateway between the Internet and your home/office network.  If you need to add or extend wireless Wi-Fi® capability to other parts of the home or office, use a wired connection or Powerline Ethernet Adapter to one or many additional Wireless Access Points.

Configuration Note:  It is best to give the Wi-Fi® enabled Router and each Wi-Fi® Wireless Access Point its’ own “network name.”  I suggest that you name each wireless network based on the location in the home.  Use names like “Second Floor”, “Main Floor”, and “Basement”, as applicable.  If you try to name all of the wireless networks with the same name, the signals will overlap and collide as well as confuse the devices trying to attach.  It is also important to select different Wi-Fi® channels (1 to 11) or select the “auto channel selection” option during configuration and the Wi-Fi® Router and WAP’s will select different channels that do not overlap.

Security Note:  NEVER use any personally identifiable information as the name of your Wi-Fi® Wireless network name.  Since these names are usually broadcast so that the wireless device can see the network name in the “list of available wireless networks”, this would be advertising to anyone passing within range of the signal that it is your network.  Telling him or her that this is “Jason’s Network,” is the same as telling the criminal where you live.

Finally, it is critical that each wireless network be encrypted with a reasonably strong password which is used and stored with your Wi-Fi® enabled device for access to the network.  This helps keep your data private and secure.

Here are links to popular Wireless Access Points:

Netgear Wireless Access Points, click here.

Linksys Wireless Access Points (Bridges), click here.

Dlink Access Points, click here.

 

Filed Under: Networking, Tech in Plain English Tagged With: WAP, wifi, Wireless Access Point, Wireless Router

Understanding the Wi-Fi® 802.11 Network Standard

July 19, 2012 By Jason Palmer 1 Comment

Wi-Fi® – Is a certification mark developed by the Wi-Fi Alliance to indicate that wireless local area network (WLAN) products are based on the Institute of Electrical and Electronics Engineers’ (IEEE) 802.11 standards.

But the Wi-Fi® 802.11 network standard comes in many flavors – 802.11a, 802.11b, 802.11g, and 801.11n.  The key difference is the maximum speed at which data can be transmitted under optimal conditions as well as the frequency of the radio waves, 2.4Ghz or 5Ghz.

Router WiFiMost Wi-Fi® Routers (acts as a gateway and translates one external Internet IP address to many private internal IP addresses for each Wi-Fi® device) and Access Points (acts as a bridge and adds wireless Wi-Fi® capability to a wired network) are 100% backward compatible.  They support the highest speed of 802.11n which operates at up to 150Mbit/s, to 802.11g (54Mbits/s) down to the slowest speed 802.11b (11Mbits/s) and operate at 2.4Ghz.  Almost every modern Wi-Fi® certified device, such a Smartphones, Blu-Ray players, Internet Enabled TV’s, Tablet Computers, and Internet Radio’s support at least 802.11g with the newest devices supporting the current standard of 802.11n.

WiFi 802.11n CertifiedWhen shopping for a Wi-Fi® Router or Access point, look for the 802.11n standard.   When reviewing the number of products available, you may see those that claim greater than the standard indoor range of up to 230 feet.  The manufacturers are able to accomplish this by using a technology called MIMO (pronounced my-moh) which stands for “multiple input and multiple output.”   In simple terms, the manufacturers add more antennas to transmit and receive the wireless data signal.  This improves the efficiency and reliability of the Wi-Fi® data signal between the Router/Access Point and the Wi-Fi® enabled device.

Within reason, the claims of greater distance and better coverage are accurate.  A Router/Access Point that has three antennas is better than one with two antennas.  More antennas mean better coverage and range.

802.11a Logo802.11a supports up to 54Mbit/s like 802.11g but offers the advantage of operating in the 5Ghz frequency range which is significantly less crowded than the 2.4Ghz range.  The 2.4Ghz frequency is used by a number of devices including microwave ovens, baby monitors, cordless phones, remote controls, TV’s, Blu-Ray Players, Notebooks Computers, and is the most popular hence the crowding.

Although less crowded, the one disadvantage of 802.11a is that the higher frequency 5Ghz signal uses a shorter wavelength which is more easily absorbed by walls and other solid objects.  802.11a works best in wide open areas with line of sight between the Router/Access Point and the device you want to connect.

WiFi CertifiedSome manufacturers offer the best of both worlds:  Wi-Fi® Routers and Access Points that support both 802.11a and 802.11n/g/b operating simultaneously on both the 5Ghz and 2.4Ghz frequencies.  The Router/Access Point creates two separate Wi-Fi® networks: one at each frequency.  The particular device you are trying to connect will figure out which frequency/ Wi-Fi® network it supports and use the best signal available to the Router or Access Point.

Note:  It seems contradictory but in some cases Wi-Fi® operating at the 802.11b standard of 11Mbits/s with the ability to drop down to 5Mbits/s or even 1Mbits/s may have a greater effective range than the longer range 802.11g at 54Mbits/s.  This is because the slower speeds are subject to less interference.

Less expensive Routers and Access Points may only support the 802.11b/g standards but provide a value priced alternative.  They also offer the greatest level of compatibility for both old and new Wi-Fi® devices.  If you have devices that support 802.11n, then make sure to purchase a Router or Access Point that supports 802.11n to get the maximum benefit of the newer standard.

In short, the more expensive the Router or Access Point, the better the feature set and the more configuration options available for the best possible Wi-Fi® experience.

Filed Under: Networking, Tech in Plain English Tagged With: 802.11, 802.11a, 802.11b, 802.11g, 802.11n, wifi, Wireless Access Point, Wireless Router

Powerline Ethernet – The Infrastructure in your Walls

July 18, 2012 By Jason Palmer 5 Comments

Powerline Ethernet

Powerline Ethernet

Powerline Ethernet uses the existing electrical wiring in your home or office along with special adapters to connect your computers to the data network and Internet router.

Powerline Ethernet adapters convert and transmit the data signal by using a different frequency then the one used by the electrical current.  The concept is similar to how dozens of radio stations transmit signals at the same time in the same city and yet your FM tuner can pick them out of “thin air” so you just get the one frequency you selected.

The key advantage of Powerline Ethernet is that there is usually an electrical outlet in every room and on every floor and they are all connected through the same Electrical Circuit Panel in your home or office.  Many homes were built decades ago and were not hard wired for computer network connections.  Older construction techniques that used Plaster have mesh in the walls that acts like a shield blocking WiFi signals between rooms.  If rewiring your home or office with computer grade network cable is not an option, and the WiFi signals cannot penetrate the walls, Powerline Ethernet may just save the day.

One problem with Powerline Ethernet is the way the technology works.  In the United States, homes tend to be wired in what is called “Split Phase.”  Electricity enters at 240v and splits in to two 120v legs.  In short, the rooms you want to connect may be on different 120v legs and therefore Powerline Ethernet speeds can be a little slower than if both outlets in the two separate rooms were on the same 120v leg.  In most cases, even rooms on different 120v legs can still connect but in extreme cases, special jumpers need to be installed at the Electrical Panel to help the signals cross between the 120v legs.

Powerline Ethernet networking can achieve speeds of up to 500Mbps under perfect conditions or as low as around 50Mbps.  All of these speeds are sufficient for browsing the Internet and even streaming music or videos.  Realize the average broadband download speed is between 5Mbps and 30Mbps so even the slowest Powerline Ethernet connection is adequate.  These slower speeds may not be optimal for local area networking for data intensive business applications on an Office File Server where the minimum acceptable speed is usually 100Mbps and the current standard is 1Gbps but it is better than no connectivity at all.

I use Powerline Ethernet as connectivity of last resort in Apartments were the WiFi signals will not penetrate the walls even between two side by side rooms or the range of the WiFi signal is significantly degraded by interference.  Another issue especially in Apartment Buildings is lack of signal separation.  If the twenty nearest apartments within 1500 feet all have WiFi and there are only eleven available WiFi channels, there will be overlap.  The laws of physics state that two objects cannot occupy the same space and the same is true of WiFi channels.

Here is a real world example:  I was in a large hi-rise Apartment building in New York City and the Time Warner UBEE combination cable modem and wireless (WiFi) Router signal could not get between the bedroom and the living room.  I plugged in two Powerline Ethernet Adapters, one in each room and within five minutes I had a rock solid wired Ethernet connection using the Electrical wiring to transport the data signals.  In this case, I put a Wireless Access Point (converts a wired to a wireless data signal) in the living room but I could have just as easily put a multi-port network switch for wired connections to share the Internet connection to the TV, Blu-Ray player, and Sirius Radio.

Remember, Powerline Ethernet allows you to use the electrical copper infrastructure in your walls to build out a data network of last resort when traditional wired and WiFi network solutions are not an option.

For more information on Powerline Etherner, visit:

Home Plug Alliance
http://www.homeplug.org/tech

Here are some Powerline Ethernet Options:

Actiontec – 500Mbps Powerline Network Adapter Kit
http://www.actiontec.com/products/product.php?pid=265

Belkin Powerline Solutions
http://www.belkin.com/networking/powerline

D-Link Amplifi Powerline Products
http://amplifi.dlink.com/Amplifi_PowerLine

Netgear Powerline Products
http://www.netgear.com/home/products/powerline-and-coax

Filed Under: Networking, Tech in Plain English Tagged With: Data Nework, Homeplug, Powerline Ethernet

Is your Wireless Router not going the Distance?

July 17, 2012 By Jason Palmer Leave a Comment

Linksys Wireless RouterAre you having problems with your Wireless Router and access to the Internet?  Do you find that wireless (WiFi) coverage in your home or apartment is not what it used to be?  Do file or movie downloads and general web browsing just seem to take longer?  If so, then it may be time to replace your Wireless Router with a new one.

With the reduction in cost comes a general reduction in quality and longevity.  Wireless and Wired Routers tend to get placed in dusty closets, under desks, or on shelves.  The combination of lack of ventilation and heat bakes the internal components and weakens them to the point where they start to degrade and eventually fail.

There is a reason the manufacturers only provide a one or two year warranty as that is the expected lifespan.  Even if your Internet connection and Wireless connectivity continue to work, once you start to see performance issues, you should think about replacing or upgrading your Wireless or Wired Router.

Another telltale sign of heat taking its’ toll is to look at the case of the Router and see if the color of the plastic has started to change to yellow or brown. Using your nose, do you smell a burnt smell near the vent holes?  If so, you are seeing and smelling the effects of the heat baking your Router.

If your Wireless Router uses 802.11b or 802.11g, which is usually marked right on the case, you are using an older wireless communication standard with both slower speeds and a shorter range.  The current standard is 802.11n and many manufacturers have incorporated a series of enhancements in the antenna technology to improve the range and performance beyond the standard.

If your Wireless Router is more than two years old and not using the 802.11n standard, it may not be going the distance and it is time to replace it with current generation technology.

Filed Under: Networking, Tech in Plain English Tagged With: router, wifi

« Previous Page
Next Page »

Connect

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Categories

  • ACT! Premium CRM
  • Cloud
  • Commentary
  • Consulting
  • Disaster Planning
  • Google Apps
  • Management Consulting
  • Networking
  • Office365
  • Printer Issues
  • Security
  • Tech in Plain English
  • Tech Tips
  • Virtualization
  • Wordpress

The Tweetisphere

  • Just now
  • https://twitter.com/palmercomputer

Pages

  • About Us
  • Blog
  • Break/Fix
  • Consulting
  • Contact Us
  • Cyber Insurance Auditing
  • Installation
  • Network Infrastructure
  • Product Showcases
    • Brocade Product Showcase
    • Cisco Product Showcase
    • EMC Product Showcase
    • Emerson Product Showcase
    • IBM Product Showcase
    • Intel Product Showcase
    • Juniper Product Showcase
    • Veeam Product Information
    • VMWare Product Showcase
    • Xerox Office Products
  • U.S. Federal Courts
  • Vendor List
  • Web Applications
  • Web Hosting

Copyright © 2025 · Log in