Category: Wireless AutoSwitch
We have just released Wireless AutoSwitch XPV 184.108.40.206. We have added two new feature in this release:
1. DHCP Release - Now, just before the wireless card is disabled a command is sent to release the DHCP address of that card. This will help reclaim IP addresses when the user is going from an internal wireless to the LAN. This only happens when going from wireless to wired. We cannot know when the LAN will be disconnected so this is not possible when going from wired to wireless.
2. Now when using the Wireless AutoSwitch On-Off shortcut (available only in Mode 1 and 3) to stop the Wireless AutoSwitch service all wireless cards are turned on if they are disabled. In the past using this shortcut only stopped or started the Wireless AutoSwitch service and left the wireless card in whatever state they were in.
Wireless AutoSwitch can be downloaded from any page on this site from the "Download - Latest Versions" box or www.wirelessautoswitch.com/Public/Wireless_AutoSwitch_XPV.zip.
As always you are downloading the full production version that is pre-populated with a trial license key that give 30 days of free usage. Customers that are licensed for Wireless AutoSwitch XPV can download and use this new release under the original purchase with their permanent license key.
Recently we have noticed an increase in Government and Military usage of Wireless AutoSwitch. In the last month we have been contacted by several military organizations interested in purchasing licenses and have sold 6,000 licenses to these types of organizations alone.
The US Army started using Wireless AutoSwitch back in early 2008 (they certified it for use) and we are contacted by different military and government organizations (in and out of the US) from time to time for a quote and purchase. But in the last month there has been a sharp increase in interest. I am curious to know what triggered the increase, but nonetheless we are happy to see increased adoption by military and government bodies.
Corporate espionage is a far more serious and wide spread problem than at any point in the past and with the huge storage potential of even the tiniest of media it is now vital that corporations lock down their data security with the right combination of policy, IT support and threat awareness. Both laptops and wi-fi are major points of attack which require IT policies that address these potential vulnerabilities before problems happen and fault analysis after problems to make sure any issues are correctly fixed and prevented from ever happening again.
There are a number of methods to improve laptop security, the most obvious of which is a robust password policy and to educate employees about what is a strong password and concepts of password use. This means having a minimum password length and complexity that is enforced, along with changing the passwords after a set period of time to limit the vulnerability window of any undiscovered loss of security information. Teaching workers not to reuse a password and not to use the same password for multiple tasks as this is often used to escalate the seriousness of an attack, gaining access to a peripheral system before moving into more insensitive core systems. Ensure that laptops have a strong BIOS password and that the security provided by the manufacturer is strong. As with mobile phones there are now more sophisticated technologies available for dealing with lost laptops such as GPS tracking and remote wipe.
Engrave or tag the laptop in a way that displays the company name and contact details so that any lost laptop has a far greater chance of being returned to your business if it is left on a train or at a conference for example.
Choose an operating system that provides data security and make sure it remains regularly patched to close vulnerabilities as soon as they are discovered. This can be greatly enhanced with the addition of full disk encryption which will make lost data far less of a liability as if it is properly protected it will not be possible to discover what the data says.
Wi-fi signals can often be picked up far away from where the network or laptop is placed, allowing people outside a company to snoop on transmissions and potentially intercept passwords and sensitive data if the network is not properly locked down. They can also connect to laptops with the wireless card turned on and gain access to the corporate network. Good wi-fi security requires an encrypted protocol be used along with passwords and preferably an allowed list of devices with assigned IPs to add an extra layer of security. Make sure the security is up to date as even some encrypted protocols have now fallen to decryption attacks based on the processing power of a graphics card repurposed for number crunching. Most companies ignore the risk of the wireless cards on laptops so it is also important to turn off wireless cards when they are not in use.
In an increasingly security conscious world this is becoming a vital part of any IT provision for large organisations, especially those with commercially sensitive data or databases of customer details which would be a major breach of trust to lose and result in extremely bad press for that company. Every aspect of the corporate IT infrastructure from desktops to servers to laptops and mobile phones must be carefully considered for its security implications as more of these devices become ever more interconnected to make data as available as possible within the company to its employees.
We have all heard the statement that nothing in life is free. But there are some things that are free, like love and the air you breathe. But most others things are not free even when it looks like it is free.
Read the rest of entry »
Well for my first blog I must talk about my product, Wireless AutoSwitch. I wrote this little utility back in 2006 because I couldn't find anything that did what I wanted as simple and precise as I wanted and as a standalone function. I did a lot of searching and found some scripts, suggestions, and software that had this as one of its feature, but nothing that was simple and inexpensive.
Why was I searching for a utility to automatically disable the wireless cards? Well one day in 2006 I was at a client site and they were starting to roll out wireless access points and we were setting up laptops to connect to the internal wireless access points. This client placed the wireless network on the same subnet as the LAN. So they soon started running out of IP Addresses because the docked laptops had a LAN and a wireless connection at the same time and both with its own IP Address. So we needed something to turn off the wireless when the laptop was docked and connected to the local ar ...
Read the rest of entry »