You are here:  Home > Useful > Security Last updated 30 Dec 2012   

Protect your PC. Make it Invisible.

The links on this page (other than those in this first paragraph) are to external sources of information. As the page grows, if you want to search for a keyword or phrase, just press the Ctrl and F keys together and type the keyword or phrase into the dialogue edit box and then click on the Find Next button. The links below will only scroll this page to the relevant link on this page.


Internet IP Address security has to do with making your current internet address invisible to the rest of the world wide web. There are both hardware and software solutions to achieve this depending on how you connect to the Internet.

If you connect via an ADSL router (either with or without an integral firewall), you need to ensure that the firmware is up-to-date. You can do this by downloading the latest firmware from the manufacturer's web site. If your connection is effectively by dial up using the PC hardware, you need to ensure you have a proven software firewall (don't rely on the free Windows firewall). What you are looking to achieve is handling the various Internet protocols on their specific ports (TCP and UDP) so that when you initiate communication, the connection handles these in the normal way, and when someone or something else attempts communication, your hardware and/or software remains silent. In effect you are saying there is nobody here. Two sites that test your connection free-of-charge are AuditMyPC and Shields Up. Some commentators seem to have an axe to grind with the author, but the site itself is OK and can be accessed at the following link:


If you get through all the tests, your Internet address is going to be better protected than if some of the tests fail.

Process security has to do with ensuring that the processes running on your PC are valid and from a trusted source. There are a number of useful web sites that can give you information about these processes. These sites are given below:


Wireless security has to do with securing your wireless connection. There are several steps:

1. Encrypt your wireless communication.
2. Choose your encryption key carefully.
3. Limit who can connect to your Access Point.
4. Change your Access Point web browser login password

There are commentators who recommend that you prevent your Access Point from broadcasting its name. If you do this then your wireless card will switch over from passive to active mode telling the world that it wants a particular Access Point. So you are no better off. The key here is to choose an innocuous name for your Access Point. Don't use anything that can be used to identify you. Default names are probably not too bad because any serious hacker can tell what your Access Point is by its traffic.

Do use an encryption key with a suitable encryption method (avoid WEP, its still available, principally for 802.11b wireless cards and can be cracked faster than you can read this page). The point to make is that the encryption is only as good as the key you use. It should be at least 20 characters long (and longer is better). Don't think of the key as a word, its actually a passphrase. Use something you can remember. Nursery rhymes are a good starting point:

Jack and Jill went up the hill to fetch a pail of water

First, capitalize the first letter of each word and then remove the blanks. Next, change various words to make the phrase more nonsensical, but that you can still remember. So, in this case, Jill becomes Fred, Up becomes Xp (as in Windows XP), Hill becomes Hole, Pail becomes Cup, Water becomes the German word Wasser:

JackAndFredWentXpTheHoleToFetchACupOfWasser

Then change some characters to numerics:

J1ckAndFr5dWentXpTheHoleToFetchACupOfWasser

So Jack becomes J1ck and Fred becomes Fr5d (the letter replaced with its numeric match). Will this be totally secure? Well, no, but its better than using your name or your birthday. You get the idea. The more this phrase means less to anyone else than to you the harder it is to crack by brute force, dictionary searches or knowing some information about you. However, the key is to make a phrase you can remember and then a sequence of changes to the original phrase that mean something to you. If you stopped the changes at capitalizing the first word letter, removing the blanks and changing Jack and Fred the phrase is weaker than it would be but you will probably remember it better.

Limit who can get through your Access Point. Most wireless hardware has a client list which you can modify to only accept communication from specified physical (or MAC) addresses. These are the addresses which are unique to each wireless card. You will find the MAC address (also called the Physical address) when you use Start > run and open a CMD window. Type in ipconfig /all and you will see the physical address. It has 6 two character strings separated by - characters. Use these complete strings in your Access Point connection control web page.

Finally, do change your Access Point login password from the default value using the passphrase technique above. Choose a starting phrase which if different from the encryption key. It is probably best if you make up three phrases with changes and then memorize them so you can use them as necessary. If you need to write them down, put the paper into an envelope and seal it, then lock this away safely. You need to think of a word or short phrase to write on the envelope to jog your memory. Try not to use Passwords. In the above example, Jack and Jill might be appropriate.

Finally, you might consider replacing a wireless connection with a powerline connection (for example Devolo). Why? Because an encrypted powerline connection is less likely to be intercepted by a third party. See this link for details of the use of airborne drones within the USA.

AllIncontext Limited is registered in England, No 04624520. Registered office address: 12-14 High Street, Petersfield, Hampshire, GU32 3JG.

Valid XHTML 1.0 Strict   Valid CSS!