{"id":44,"date":"2005-04-27T13:17:30","date_gmt":"2005-04-27T18:17:30","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/hoanga\/2005\/04\/27\/your-local-public-hotspot-could-become"},"modified":"2005-04-27T13:17:30","modified_gmt":"2005-04-27T18:17:30","slug":"your-local-public-hotspot-could-become-a-warzone","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/hoanga\/2005\/04\/27\/your-local-public-hotspot-could-become-a-warzone\/","title":{"rendered":"Your local public Hotspot could become a warzone"},"content":{"rendered":"<p><a name='a511'><\/a><\/p>\n<p>\n Seems that public hotspots are becoming a good place for those not so<br \/>\n nice in the IT world to unleash viruses, sniff sensitive information out<br \/>\n of the ether, etc etc.\n <\/p>\n<p>\n This <a href=\"http:\/\/www.securitypipeline.com\/showArticle.jhtml;jsessionid=X5MUACRYLFDPCQSNDBGCKH0CJUMEKJVN?articleId=161501322&amp;pgno=1\">article<\/a><br \/>\n mentions some of things that are happening as well as some methods to<br \/>\n combatting attacks.\n <\/p>\n<p>\n In general:<\/p>\n<ul>\n<li>Have a firewall on your own machine up<\/li>\n<li>If you&#8217;re not using the network, turn it off<\/li>\n<li>Encrypt your communications as much as you can<\/li>\n<\/ul>\n<p>\n <a href=\"http:\/\/www.securitypipeline.com\/showArticle.jhtml;jsessionid=X5MUACRYLFDPCQSNDBGCKH0CJUMEKJVN?articleId=161501322&amp;pgno=1\">Read more yourself<\/a>\n <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Seems that public hotspots are becoming a good place for those not so nice in the IT world to unleash viruses, sniff sensitive information out of the ether, etc etc. This article mentions some of things that are happening as well as some methods to combatting attacks. In general: Have a firewall on your own [&hellip;]<\/p>\n","protected":false},"author":704,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-44","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/hoanga\/wp-json\/wp\/v2\/posts\/44","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/hoanga\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/hoanga\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/hoanga\/wp-json\/wp\/v2\/users\/704"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/hoanga\/wp-json\/wp\/v2\/comments?post=44"}],"version-history":[{"count":0,"href":"https:\/\/archive.blogs.harvard.edu\/hoanga\/wp-json\/wp\/v2\/posts\/44\/revisions"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/hoanga\/wp-json\/wp\/v2\/media?parent=44"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/hoanga\/wp-json\/wp\/v2\/categories?post=44"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/hoanga\/wp-json\/wp\/v2\/tags?post=44"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}