Journey with Confidence RV GPS App RV Trip Planner RV LIFE Campground Reviews RV Maintenance Take a Speed Test Free 7 Day Trial ×
 

Click Here to Login
Register FAQ Community Calendar Today's Posts Search Log in
View Single Post
Old 05-17-2019, 09:15 PM   #8
rynosback
Senior Member
 
rynosback's Avatar
 
Brand: DRV
Model: 38 RSB3
State: South Dakota
Posts: 2,280
THOR #1658
Quote:
Originally Posted by JJMON View Post
At KOA in Waterloo IA and using for the first time at a CG. Raining and cold, been in MH most of the day. Working very good. Watched a few Netflix episodes of Lost In Space and now watching NASCAR truck qualifying on FS1. Added the Fox Sports app and signed in with my DTV account. I must qualify this,,,CG is large but maaaybe %25 occupied, so not many users to compete with. I see a number of TT’s with no tow vehicle and maybe they are monthly renters and just not here. The WiFi signal is very strong but unsecured. I configured my WiFi booster to provide a a secure access point in our MH for our devices.

JJ
It is not a secure point. Maybe all of your devices are connected to a router, but the router is connected to a public WiFi net work. Unless you are using a VPN would be the only way to truly incript your communication.
I just posted this in a thread in this same section.
What is public Wi-Fi?

Public Wi-Fi can be found in popular public places like airports, coffee shops, malls, restaurants, and hotels — and it allows you to access the Internet for free. These “hotspots” are so widespread and common that people frequently connect to them without thinking twice. Although it sounds harmless to log on and check your social media account or browse some news articles, everyday activities that require a login — like reading e-mail or checking your bank account — could be risky business on public Wi-Fi.

What are the risks?

The problem with public Wi-Fi is that there are a tremendous number of risks that go along with these networks. While business owners may believe they’re providing a valuable service to their customers, chances are the security on these networks is lax or nonexistent.

Man-in-the-Middle attacks

One of the most common threats on these networks is called a Man-in-the-Middle (MitM) attack. Essentially, a MitM attack is a form of eavesdropping. When a computer makes a connection to the Internet, data is sent from point A (computer) to point B (service/website), and vulnerabilities can allow an attacker to get in between these transmissions and “read” them. So what you thought was private no longer is.

Unencrypted networks

Encryption means that the information that is sent between your computer and the wireless router are in the form of a “secret code,” so that it cannot be read by anyone who doesn’t have the key to decipher the code. Most routers are shipped from the factory with encryption turned off by default, and it must be turned on when the network is set up. If an IT professional sets up the network, then chances are good that encryption has been enabled. However, there is no surefire way to tell if this has happened.

Malware distribution

Thanks to software vulnerabilities, there are also ways that attackers can slip malware onto your computer without you even knowing. A software vulnerability is a security hole or weakness found in an operating system or software program. Hackers can exploit this weakness by writing code to target a specific vulnerability, and then inject the malware onto your device.

Snooping and sniffing

Wi-Fi snooping and sniffing is what it sounds like. Cybercriminals can buy special software kits and even devices to help assist them with eavesdropping on Wi-Fi signals. This technique can allow the attackers to access everything that you are doing online — from viewing whole webpages you have visited (including any information you may have filled out while visiting that webpage) to being able to capture your login credentials, and even hijack your accounts.

Malicious hotspots

These “rogue access points” trick victims into connecting to what they think is a legitimate network because the name sounds reputable. Say you’re staying at the Goodnyght Inn and want to connect to the hotel’s Wi-Fi. You may think you’re selecting the correct one when you click on “GoodNyte Inn,” but you haven’t. Instead, you’ve just connected to a rogue hotspot set up by cybercriminals who can now view your sensitive information.

How to stay safe on public Wi-Fi

The best way to know your information is safe while using public Wi-Fi is to use a virtual private network (VPN), like Norton Secure VPN, when surfing on your PC, Mac, smartphone or tablet. However, if you must use public Wi-Fi, follow these tips to protect your information.

Don’t:

Allow your Wi-Fi to auto-connect to networks
Log into any account via an app that contains sensitive information. Go to the website instead and verify it uses HTTPS before logging in
Leave your Wi-Fi or Bluetooth on if you are not using them
Access websites that hold your sensitive information, such as such as financial or healthcare accounts
Log onto a network that isn’t password protected
Do:

Disable file sharing
Only visit sites using HTTPS
Log out of accounts when done using them
Use a VPN, like Norton Secure VPN, to make sure your public Wi-Fi connections are made private
__________________
2016 DRV38RSB3
2015 Ram 3500 Regular Cab DRW CTD Asian trans 410 rear
rynosback is offline   Reply With Quote
 
» Featured Campgrounds

Reviews provided by

Disclaimer:

This website is not affiliated with or endorsed by Thor Industries or any of its affiliates. This is an independent, unofficial site.


Thor Motor Coach Forum - Crossroads RV Forum - Redwood RV Forum - Dutchmen Forum - Heartland RV Forum - Keystone RV Forum - Airstream Trailer Forum


All times are GMT. The time now is 03:06 AM.


Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2024, vBulletin Solutions, Inc.