Wireless Network Setup, File Sharing, and Computer Security

Setting Up a Wireless Network

The main difference between cable and wireless networks is that wireless networks have a coverage area and require a password. To connect in Windows, manage your Wi-Fi antenna through the network manager or Windows settings:

  1. Click the network icon in the notification bar (lower-left corner).
  2. Select the wireless network, click “View Wireless Networks” to see detected networks (padlock indicates security enabled).
  3. Double-click the desired network and enter the key/password.

In this setting, you can access and prioritize multiple wireless networks. Change the order by clicking “Change the order of preferred networks.”

Share Folders and Files

Share only resources you want other network users to access.

  1. Right-click the folder you want to share. Select the sharing and security option.
  2. In the sharing dialog, set the folder name (max eight characters, no special symbols). Check “Share this folder on the network” and optionally allow other users to change files (to prevent modification, uncheck this).
  3. Apply and accept changes. A shared folder icon (with a hand) will appear.

Share a Device; Sharing Printers

Printers with their own IP Address

These printers have network technology and configurable IP, gateway, and subnet mask settings (they don’t depend on a computer).

Shared from an Installed Machine

Any printer installed on a networked computer can be shared by installing its drivers on other computers. However, the host computer must be on to use the printer.

Share DVD Players

Other hardware devices like DVD players can also be shared, useful for installing software or running media files.

Access your PC’s storage devices. Right-click the DVD player and choose the Sharing and Security option, similar to sharing a folder.

Install a Shared Printer

  1. Start the wizard: Start – Printers and Faxes – Add Printer.
  2. Select “A network printer, or a printer attached to another computer.”
  3. Type the printer path (if known) or select “Find a printer.”
  4. Choose whether to set it as the default printer and finish the wizard. If drivers are correctly installed by the host computer, the printer is ready to use.

Computer Security

Computer security measures, tools, and mechanisms aim to provide a computer system’s integrity, confidentiality, and availability.

A system has integrity if it prevents unauthorized information modification. It’s confidential if it prevents unauthorized data display. What must we protect against?

  • Ourselves: Accidental file deletion, disabling security programs, accepting harmful emails.
  • Accidents and Damage: Computer malfunctions and data loss.
  • Intruders: Unauthorized access from the same or another computer.
  • Malware: Programs that exploit access to install information, harm the system, or disable it.

Active and Passive Safety

We can distinguish two types of security tools and practices:

Active safety techniques prevent damage:

  1. Using strong passwords.
  2. Encrypting data.
  3. Using computer security software.

Passive safety practices minimize the effects of accidents or malware:

  1. Using appropriate hardware to deal with accidents (electrical surge protection, cooling systems).
  2. Backing up data and the operating system to multiple media and locations.

Creating logical hard disk partitions is highly recommended.

The Silent Threat

Our computer is exposed to small programs or software that can enter the system through emails, infected websites, or media. Types of threats include:

Computer Virus: A program that installs itself without the user’s knowledge, spreads to other computers, and performs actions ranging from harmless jokes to data destruction.

Worms: A type of virus that multiplies and infects all nodes in a network, slowing down computers and the network.

Worms often accompany malicious emails and can automatically email all contacts. Be cautious when opening emails, regardless of your protection systems.

Trojan: A small application hidden in utility programs, images, etc., that provides a gateway for another user or application to access or control your computer remotely.

Spyware: A program that collects user information and sends it to advertising servers. The collected information is often used for spam.

Dialers: Programs that use your modem to make high-cost phone calls.

Spam: Bulk advertising emails sent to any email address.

Pharming: Web spoofing by a local server installed without the user’s knowledge, often used to obtain bank data.

Phishing: Obtaining confidential information by sending emails disguised as official communications (e.g., from a bank).

Antivirus

Antivirus programs detect, prevent, and remove malware. They compare scanned files to a database of malicious signatures or use heuristics to analyze code for virus-like behavior.

Protection Levels:

  • Resident Level: Continuously runs, analyzing programs, emails, and websites (can consume resources).
  • Comprehensive Analysis: Scans the entire computer (all files, boot sector, RAM).
  • Scheduled tasks for regular system analysis.

Firewalls

Firewalls control communication between applications and the network, preventing intrusion attacks using TCP/IP.

Antispam Software

Filters spam from the client or server side.

Antispyware Software

Works similarly to antivirus, comparing files to a spyware database. Keep it updated and compatible with your antivirus.

Bluetooth Data Transmission

  1. Activate Bluetooth on both devices: Device settings / Connectivity / Bluetooth On.
  2. Select the file to send and choose to send via Bluetooth.