English Deutsch Français Italiano Español Português 繁體中文 Bahasa Indonesia Tiếng Việt ภาษาไทย
All categories

4 answers

There are so many it is hard to list in a single response. Perhaps one of the best ways to keep up to date with these events and there variants is as simple as pointing your (secure) web browser to the right sites:

http://www.cert.org/
http://www.antionline.com/
http://packetstormsecurity.org/...
http://www.securityfocus.com/
http://www.topix.net/tech/computer-secur...
http://www.windowsitpro.com/windowssecur...

For a free and secure web browser try using Mozilla Firefox, it's really quite a good browser and is available for many various platforms including Mac, Linux, Unix and of course Windows 2000/XP/Vista.

Oh one more thing, if you are using a wireless router, then really consider using something other than WEP (wireless encryption protocol) it is seriously flawed and can be hacked in minutes or seconds depending on the level of experience and understanding of how to do this. WEP sends out the MAC address which is the physical adapter address in the headers, which can be scanned and seen very easily by any would be intruder, hence the headers sent back to your router then only need to appear as they came from this adapter and... you get the idea!

WPA2 is the required standard for equipment to carry WiFi certification. This is usually a combination of WiFi Protected Access (WPA) and the addition of a "block cipher" such as AES which is the Advanced Encryption Standard and replaces the outmoded DES - Data Encryption Standard.

TKIP (Temporal Key Integrity Protocol) was issued to replace WEP without replacing legacy hardware and is also considered to be a "low grade" form of encryption. WPA+TKIP is considered to be the minimum requirement, and WEP should never be used. For my money and for what its worth, consider using WPA+AES or another suitable block cipher if your router supports it.

2007-01-17 19:59:31 · answer #1 · answered by `✪~ 5 · 1 0

Mobile Technology as in Computing or Mobile Phones ?

Basically mobile phones are hard to threaten however there is a few virus's for Mobile Phones that have an Operating System much like the Nokia series of phones.

Mobile Computing is tight if you don't connect to the internet or installing things on your computer at all. Get online there are numerous/thousands of virii/trojans/hackers out thee it's not funny.

Hackers are getting more and more smarter as time goes by because they know what they have to do etc.

What we have today is nothing compared to what we will have and see in the future

2007-01-11 04:34:23 · answer #2 · answered by Jimmy G 3 · 0 0

I'm sorry but your question makes no sense.

What type of threats, do you think it will or already been effected (sic) in the Mobile technology? (it is "affected", not "effected")

?? That needs to be reworded, or simplified if English is not your first language.

2007-01-11 04:34:01 · answer #3 · answered by Anonymous · 0 1

GSm companies not give u full acess and hackers like us make virus that can harm mobule www.hackerspk.com

2007-01-17 06:58:38 · answer #4 · answered by Hackers Pk 2 · 0 0

fedest.com, questions and answers