Hardware Secrets
Home | Camera | Case | CE | Cooling | CPU | Input | Memory | Mobile | Motherboard | Networking | Power | Storage | Video | Other
Content
Articles
Editorial
First Look
Gabriel’s Blog
News
Reviews
Tutorials
Main Menu
About Us
Awarded Products
Datasheets
Dictionary
Download
Drivers
Facebook
Links
Manufacturer Finder
Newsletter
RSS Feed
Test Your Skills
Twitter
Newsletter
Subscribe today!
Search
Recommended
Maximum Security: A Hacker's Guide to Protecting Your Computer Systems and Network, 4th Edition (Book and CD-ROM)
Maximum Security: A Hacker's Guide to Protecting Your Computer Systems and Network, 4th Edition (Book and CD-ROM), by Anonymous (Sams), starting at $0.01


Home » Networking
Protecting Your Computer Against Invasions
Author: Gabriel Torres 47,166 views
Type: Tutorials Last Updated: May 10, 2005
Page: 3 of 3
File Sharing (Cont’d)

If your broadband Internet connection is being shared using a router – which is a small device where you plug in your modem and the computers you want to share the Internet connection, usually coming with four network ports –, you are lucky. These home routers act as Firewalls and block any incoming request for folders and files. Thus, you can share files on your home or office network without worrying of being invaded by the file sharing method.

Broadband Router
click to enlarge
Figure 2: Broadband router, front view.

Broadband Router
click to enlarge
Figure 3: Broadband router, back view.

But if you don't use a router, you have to be very careful. In this case, probably the computer that has the Internet connection also has a second network card connecting this computer to another computer (usually through a cross-over cable) or even to a hub or switch, to share its Internet connection with more than one computer. In this case, the PC that has the Internet connection is vulnerable, because all computers on the Internet can access its files if file sharing is enabled!

There are some solutions. The best is to spend some bucks and buy a broadband router. As we said, this device also acts as a Firewall, protecting your whole network. Installing this device is very easy, just plug in your Internet connection (the cable that comes from cable or xDSL modem) in a jack called WAN, Broadband or similar and then plug in the computers in your network to the other available jacks. If you need more ports – since these devices usually have only four ports – just buy a network switch with the number of ports you want and connect it to one of the available ports on the router. The switch will act as a "port expander". Some routers come with wireless antennas for sharing your internet connection with laptop and desktop computers with wireless capability. By the way, we've written a specific tutorial on wireless security, read it if you have wireless connection.

But if you don't have the money, you can simple disable file sharing from this computer that has the Internet connection. But you may need to share its files! There are two solutions. First, put all files to be shared on another computer and enable file sharing on this other computer. Or simply move the broadband modem to a computer that doesn't need its file sharing to be activated.

You may be thinking why is safe to enable file sharing on the other computers but the computer that has the modem. What happens is that normally the computer with the modem gets a public IP address. A computer with a public IP address can be viewed by anyone on the net. The other computers, on the other hand, get a "magical" IP address (usually 192.168.x.x or 10.x.x.x, for example), that are IP addresses that work only in a local network. Computers with one magical IP address cannot be reached from the net, so they are protected. At least for file sharing hacking. Don't forget that there are a lot of hacking methods, like phishing.

Personal firewalls are also a good idea. If you use Windows XP, install Service Pack 2 (SP2), because it comes with Windows Firewall, a software that can stop malicious software from trying to access your computer and if you install a Trojan Horse by mistake the firewall can block its attempt to send data outside your computer.

Another menace are the infamous spywares and malwares. There are lots of software that can detect and remove this kind of junk. The new AntiSpyware from Microsoft is pretty good.

Print Version | Send to Friend | Bookmark Article « Previous |  Page 3 of 3

Related Content
  • Testing Your Computer Security
  • How to Build a Small Network Using a Broadband Router
  • How to Share Folders and Printers on Your Network
  • Intel LaGrande Technology Explained
  • How to Build a Network Using a Cross-Over Cable

  • RSSLatest Content
    ASUS X99-A Motherboard
    October 29, 2014 - 3:00 AM
    ASUS ZenFone 5 Smartphone Review
    October 15, 2014 - 7:00 PM
    ASUS AM1M-A Motherboard
    October 15, 2014 - 4:30 AM
    ASRock X99 Extreme4 Motherboard
    October 14, 2014 - 4:10 AM
    Cooler Master Elite 130 Case Review
    October 9, 2014 - 2:46 AM
    ASUS RAMPAGE V EXTREME Motherboard
    October 7, 2014 - 2:50 AM
    ASRock Fatal1ty X99M Killer Motherboard
    October 6, 2014 - 5:40 AM
    ASUS X99-DELUXE Motherboard
    September 30, 2014 - 1:07 AM







    2004-14, Hardware Secrets, LLC. All rights reserved.
    Advertising | Legal Information | Privacy Policy
    All times are Pacific Standard Time (PST, GMT -08:00)