• The TUGBBS forums are completely free and open to the public and exist as the absolute best place for owners to get help and advice about their timeshares for more than 30 years!

    Join Tens of Thousands of other Owners just like you here to get any and all Timeshare questions answered 24 hours a day!
  • TUG started 30 years ago in October 1993 as a group of regular Timeshare owners just like you!

    Read about our 30th anniversary: Happy 30th Birthday TUG!
  • TUG has a YouTube Channel to produce weekly short informative videos on popular Timeshare topics!

    Free memberships for every 50 subscribers!

    Visit TUG on Youtube!
  • TUG has now saved timeshare owners more than $21,000,000 dollars just by finding us in time to rescind a new Timeshare purchase! A truly incredible milestone!

    Read more here: TUG saves owners more than $21 Million dollars
  • Sign up to get the TUG Newsletter for free!

    60,000+ subscribing owners! A weekly recap of the best Timeshare resort reviews and the most popular topics discussed by owners!
  • Our official "end my sales presentation early" T-shirts are available again! Also come with the option for a free membership extension with purchase to offset the cost!

    All T-shirt options here!
  • A few of the most common links here on the forums for newbies and guests!

Wireless Networks during travel

conkyjoe

TUG Member
Joined
Sep 5, 2006
Messages
84
Reaction score
0
Points
366
Location
Southern California
Gosh, I've been reading several treads this week about wireless access at various resort properties. I am concerned about how safe any public, hotel or resort network is. Don't be fooled to believe that the network you are on is safe just because of a "hotel brand name".

Crimeware is a multimillion dollar industry and not science fiction. It's "for real". I do not wish to claim that any one Hotel Brand has a more secure network than any other. You should assume that any network you connect to while traveling is "open game" for hackers.

From what I understand most hotels and resorts don’t really spend the time and energy to secure the networks you'll be using while vacationing. Most vacation travelers are also not very informed about how to secure the data on their own computers.

As a result there is a bonanza of exposed systems available for any hacker that has a laptop and minimal skills to exploit an unsecured laptop (hopefully not yours). It is possible at many hotels or resorts to collect documents published in your shared folders right off of your computer, without you even knowing.

Couple of reasons. First, resorts don't typically seperate their guest LANs – meaning that everyone on the same segment may get across the entire network. This goes for wired and wireless access. A wireless hacker can sit in the parking lot near the facility and potentially gain access to the entire hotel/resort LAN. Most hotels or resorts don't invest in the type of expensive switching hardware to mitigate or prevent this possibility.

Second, many resorts don’t understand their own Internet connectivity, they may provide little beyond the kind of consumer-grade access that you use at your home. As unbelievable as it sounds, some even have little or no protection on their Internet connection within the facility.

Third, most laptop travelers don’t utilize any form of personal firewall and if they do, they don’t have them configured to hide themselves from guests who know how to open Windows Network Neighborhood and hunt around for open file shares. Within a minute or two, your computer can be an open book with any file shares you have published, exposed.

Finally, there are hotspots known as “evil twins”. These clone wireless networks run by malicious entities that use socal engineering and common names for the unsuspecting traveler to login to. You believe you are logging into the resort network, but it is "spoofed". Just pop in your credit card to get started and it's too late. There is no "recind within 7 days" on that transaction.

Most people are not aware of how poor wireless security can be.

Spend some time making sure your own laptop is properly configured. If you don’t have a personal firewall on it, buy one or download one. Zone Alarm is very popular with Windows and it works very well. The next time you travel, if you must bring your computer (to watch a DVD movie on the flight for example) keep it "off of the network" while you are at the resort. Use the opportunity to use computers in the Resorts business center to get to on email instead. Resist the temptation to take your laptop to the pool to do wireless "anything" .

Here are some other tips if you "must" take your computer with you on your vacation and get on the internet:

Turn-off your wireless adapter

Turn-off or block file sharing (and all other network services) on interfaces used for broadband access

Enable Windows Firewall or (preferably) install a third-party personal firewall

Use file encryption, available in Windows XP Professional and other products

Choose strong passwords with upper/lowercase letters and at least one numeric value.

Use a VPN client

Choose public Wi-Fi access that provides enhanced security services. Does Starwood Turbonet provide enhanced security sevices? Maybe we should find out?

Connect only to known SSIDs, using WPA/802.1X to verify the server's certificate

Disable ad-hoc mode and automated connection to non-preferred SSIDs

Use a host intrusion detection agent to detect/prevent risky connections, including bridging between wireless and wired interfaces.

If these recommendations are too "geeky" for you to understand, then to be on the safe side, use the computers in the business center or guest services to communcate over the internet. Don't let your computer get compromised while you are on vacation by assuming the network you are using is secure.

Personally, I am not a fan of Wireless connectivity. Less is more, I enjoy leaving my expenive "high-tech" toys at home when on vacation. Some resorts any many hotels have guest services computers or business centers for a reasonble fee, some are even free.

If you want to watch a DVD movie on the flight some airlines provide rentals DVD players on the flight. That's a nice alternative instead of taking your laptop exclusivly for that purpose.

Have you ever heard of a "keylogger"?

If not, here are close to 6,990,000 hits on Google to explain how they work, how to get one for "free" and how to put them on other peoples computers.

http://www.google.com/search?hl=en&q=keylogger

Be very careful when you put your property on someone elses network.

If you own a Mac laptop then the problem isn't as prevelent, "yet". It's just a matter of time before the marketshare will drive the crimeware investment.

I know this sounds scarey, it should, because it is. Know how to protect your data before you travel.
 

biswassb

TUG Member
Joined
Oct 12, 2005
Messages
114
Reaction score
1
Points
228
Location
NJ
Microsoft Windows Live-One-Care

All you need to do is to install Microsoft Windows Live-One-Care, Spybot antispyware program, and EZ antivirus. Windows Live-One Care is about $50 for three computers, Spybot is free, and EZ antivirus is free for one year. All of these are available for downlad from Microsoft's software security site.
 

conkyjoe

TUG Member
Joined
Sep 5, 2006
Messages
84
Reaction score
0
Points
366
Location
Southern California
Common sense when traveling - There is Hope

Great recommnedations from biswassb for protecting a computer against "known" spyware and viruses and existing exploits.

But you'll need more that that - you'll need common sense - something you can't buy in a box at Fry's, CompUSA or from Microsoft.

It's important to note the difference of your antivirus solutions detecting the exploitation itself (very rare) and detecting the payload of known exploits (common). Only the first will offer real protection against "new" threats.

Newer and craftier exploits will "disable A/V" before they get started. Hmm, so much for my $50.00 A/V software. (see reference URL below for more details).

If a new exploit (via browers, email or Instant Messaging) hits the internet, it may take anywhere from 7 to 10 days to architect a "remedy". Then it can take anywhere upto 24 to 48 hours to logistically get the signature to the client. That is a very large window in which your machine and data are exposed.

All you really need to know is that the threats are out there. They are driven by a large crimeware element. They are compelled by three things: money, money and money. You won't have to go looking for them because they will find you. Porn on the internet is very similar, you don't have to go looking for it, it finds you.

Here's a great report on the topic of Security Theats for the first half of 2006:

http://www.websense.com/securitylabs/docs/WebsenseSecurityLabs20061H_Report.pdf
 

taffy19

newbie
Joined
Jun 6, 2005
Messages
5,723
Reaction score
593
Points
398
Thank you very much for posting this as I worry about it. I use Panda Software but not on my Mac.

How safe is a PC card with Verizon or Cingular for a notebook? From what I understand, you access the internet with a phone number that belongs to you. Is that true and is it safe? TIA.
 

conkyjoe

TUG Member
Joined
Sep 5, 2006
Messages
84
Reaction score
0
Points
366
Location
Southern California
How safe is surfing the net...?

Not very. :(

But the URL below from the SANS institute can provide you with a few best practices on how to prevent yourself from being a victim:

http://www.sans.org/resources/mistakes.php?portal=5b2d46299a8d777c93e8c54d02eef935

The internet is a breeding ground for cybercrime. The Web is being their biggest attack vector along with Instant Messaging and email.

It doesn't matter if you use Verizon, Cingular or any other provider, as long as you have an unpatched browser and surf the internet that's all they are counting on.

The most common target of expliot code by crimeware entities is Microsofts Internet Explorer Browser (IE). The one you are probably using to read this post. By exploiting any known secuity "hole(s)" in IE, they can use that as mechanism to get Potentially Unwanted Software (PUS) to your machine. How does that happen? :eek:

Here are just two ways:

1. A socially engineered email (SPAM) get's sent to your email box. It is crafted to entice you to open it by virutue of it's title (that is part of the social engineering). There may be a URL link in the email which provides furthur information about the enticement. Once you click on the link your broswer goes to the malicious website by your command. The website now can try to exploit the weakness in your broswer (see the article in the previous post)., to deposit a trojan horse or other malicious code on your computer (scripts, Active-X or Java code are good examples).

2. A socially engineered SPIM (SPam over Instant Messaging) is sent to your AOL other IM client while you are chatting with a "buddy". This unsolicited "SPIM" entices you to clink on a URL within the dialog. Once you click on it your browser takes a ride to their infected Website so again they may try to exploit your machine or dupe you into volunteering credit card an the like.

These are just two (of many) examples of how to get access to your machine. If you use common sense, are aware of the threat(s), khow easy it is to get compromised, follow some best security practices, then you are well on your way limiting your exposure.

Here is a great reference URL to get started:

http://en.wikipedia.org/wiki/Category:Malware
 
Top