Book Read Free

Pocket PC magazine, October/November 2004

Page 15

by MS Reader version $5. 99


  Don’t be lazy with security

  If you are considering the implementation of a wireless network for your company, don’t ignore security! At work, we use a combination of 128 bit hexadecimal "wired equivalent privacy" (WEP) encryption plus the required identification of a "media access control" address (MAC address) for wireless networking (see sidebar).

  Unprotected wireless networks abound. One day while I was experimenting with the e740’s Wi-Fi manager (Fig. 1), I detected an unprotected wireless network in my own neighborhood. I could have easily connected to it and browsed the Internet. While I was waiting for a checkup, I accessed the network at my doctor’s office without any difficulties, and browsed the Web. (I did notify his office about the security deficiency.) A more ominous threat comes from individuals called "war drivers." They ride up and down streets with powerful wireless networking antennae, seeking non-secured wireless networks. They even have software designed specifically to help them get into your network. Most of the time, they just want to use your Internet connection, but if you don’t have the right security, they can do serious damage. There are companies dedicated to computer security and I would encourage anyone considering the implementation of a wireless network to consult with them.

  (above) Fig. 1: The e740’s Wi-Fi manager lets me search for and connect to Wi-Fi networks.

  Staying synchronized all the time

  Things have changed quite a bit since I talked the boss into adding a single Wi-Fi access point. Now, Wi-Fi coverage is almost ubiquitous throughout our building and I can connect to the network almost anywhere. I can not only browse the Internet, but more importantly I can keep my e740 synchronized with my desktop PC using Microsoft ActiveSync. My e740 remains synchronized with the desktop PC in my office through our office network’s wireless access point, which is connected to the network’s router. Using this system, I am able to receive any e-mail sent to my desktop PC, immediately on my e740. When I compose an e-mail on my e740 (or enter a Calendar appointment, contact, or task) they, too, are immediately synchronized with my desktop PC. This is a highly useful capability for me. While my job keeps me in the building, it doesn’t keep me at my desk (or my desktop PC). I frequently have multiple meetings outside of my personal office. I don’t have time to go back and check my e-mail. Fortunately, with the e740 and our Wi-Fi enabled network, I don’t have to.

  In the end, the office Wi-Fi network spoiled my Internet experience at home. I’d be in the living room and want to quickly check something on the Internet. The thought of having to walk upstairs to my PC seemed such a waste of time. I carried my e740 with me most of the time—I wanted a wireless connection to my home computer!

  Creating my home network

  The first thing I tried was the creation of a "peer-to-peer" (a.k.a., "ad hoc") wireless connection between my e740 and my home computer. This is similar to a simple cabled link between two computers, only you are using a wireless connection. To do this, I had to install a PCI wireless network card in my home computer and upgrade to the Windows XP operating system.

  Configuring a Pocket PC for an ad hoc connection is a bit complex, but there’s a detailed "how to" on the subject available on the PC Counselor Web site (http://www.pc-counselor.8m.com/ad-hoc.htm). Although I was able to access the Internet wirelessly from my e740 through my home computer, this solution left a lot to be desired. First of all, the wireless PCI card’s signal strength and range aren’t as great as that of a wireless access point. Second, I had to reconfigure my e740 every time I switched between home and office use. Third, I could not get an Internet connection unless my desktop PC was on. At night we turn off all our home computers. I’d find myself wanting to check something on the Internet while I was lying in bed or sitting in the living room. To do so with my e740, I’d have to get up and turn on the desktop PC: this defeated the whole purpose of the wireless connection.

  (above) PCI wireless network cards like this one slip into the card bay in the back of your desktop PC and add Wi-Fi capability to the PC.

  I finally gave up on the peer-to-peer approach and purchased an Adaptec Ultra Wireless Access Point for my home PC. Like the office wireless network, I configured the Adaptec access point for WEP encryption and MAC addresses filtering, so that only my e740 and my desktop PC could connect to it. The wireless access point is connected to my DSL modem—not to my desktop PC. Since both the access point and the modem are on all the time, I can wirelessly connect to the Internet from my e740 all the time. (See the sidebar for more on this.)

  (above) The Adaptec Ultra Wireless Access Point adds wireless capability to your home or office network.

  Wi-Fi hotspots come in handy

  The proliferation of Wi-Fi "hotspots" has made my e740 even more useful. A hotspot is a public Wi-Fi access point that you can connect to for a small fee, or sometimes for free. Over a year ago, Starbucks started placing fee-based hotspots in their coffee shops. The idea was that you would sit down for a cappuccino and Danish, whip out your Wi-Fi equipped computer, and check your e-mail or browse the Web. Not all Starbucks have this service, but you can use their online store locator (http://www.starbucks.com/retail/locator/default.aspx) to find ones that do.

  In addition to high-speed cabled Internet connections, some hotels are starting to offer Wi-Fi service in guest rooms. In New Orleans where I live and work, hotspots are available in many other locations. When I’m away from the office, I frequently browse the Web and check my e-mail wherever I find a Wi-Fi hotspot. Many airports are also adding Wi-Fi as a paid service, which certainly beats having to run around an airport looking for a payphone with a data port. Finally, I just received a notice from Sprint PCS that they are beginning to offer Wi-Fi in some airports—with a discount to current Sprint customers when they use the service.

  One catch to using these public Wi-Fi services; it is sometimes difficult to send e-mail using an SMTP configured client (e.g., Pocket Outlook on a Pocket PC). There have been discussions about this problem on many user forums, and the consensus is that using a Web-based e-mail service is the preferred solution at this time.

  Luxuries become necessities!

  Twelve years ago I did not have a cellular phone. Ten years ago I had a phone installed in my car, but vowed that I would never walk around in public talking on a cellular phone. Now I take a phone with me all the time—clipped to my belt and ready to use wherever I am.

  Wi-Fi usage patterns are also evolving quickly. Enhanced efficiency, ease of use, speed, and security are driving the deployment of wireless networks, making them more accessible to the average user. Home and small business owners are discovering that Wi-Fi networks are not only easier to install, but they cost less—no more expensive electricians drilling holes through your walls and running cables everywhere. Finally, the availability of Wi-Fi networks at work, in your home, at your coffee shop, etc., encourages the continued development of Wi-Fi equipped ultra-portable computers like the Pocket PC.

  * * *

  WEP encryption and MAC addresses for a secure system

  A "wired equivalent privacy" (WEP) encryption is the application of a 16 character alphanumeric code to the wireless router or wireless access point from the desktop computer. Any computer or device trying to connect to that wireless router or access point needs to have the same 16 character code applied to the network card software to be able to connect to that network.

  The media access control (MAC) address is a specific address assigned to every piece of network hardware—wired or wireless. By selecting the Properties feature of the network card you can find the MAC code, and then input it into the software controlling the wireless access point. Once MAC address filtering is activated, any device whose code is not programmed into the wireless access point cannot connect to the network.

  In my opinion, these are the minimum security measures that should be taken for any wireless network. These two measures take only a few minutes to learn and activate, and are well worth the investment in time
. They cost nothing since they are standard features of any wireless access point. Layering an encrypted "virtual private network" (VPN) on top of the above measures increases the security even further but is probably not necessary for the home user.

  Wireless network card vs. wireless access point

  In this article I describe two methods of wirelessly connecting two or more computers. They both use 802.11b wireless technology (a.k.a. "Wi-Fi"). The first involves the use of a "wireless PCI card" installed into one of the expansion bays inside my desktop PC. The second involves the use of a "wireless access point" (sometimes referred to as a "wireless router") connected directly to my broadband Internet service via the modem that came with that service.

  The wireless PCI card installed in my desktop PC let me create a simple "ad hoc" network connection between my desktop PC and my Pocket PC. The key point: a device equipped with a wireless PCI card can only connect to one other device. So the desktop PC can communicate with the Pocket PC and the Pocket PC (with the same technology built into it) can communicate with the desktop PC. My broadband Internet service was connected first to my desktop PC, and the Pocket PC accessed it through the desktop PC. When the PC was turned off, so was the connection to the Internet.

  The solution was to create an "always on" connection to the Internet using a wireless access point. The wireless access point connects physically to my broadband Internet service via the broadband modem that came with the service. Once the access point was set up, I could communicate with it from my Wi-Fi equipped home computer or e740 Pocket PC. The access point is sometimes referred to as a "router" because it has the "brains" necessary to route data and requests to the correct device. Unlike the solution using the wireless PCI card, more than one Wi-Fi equipped device can communicate with the wireless access point. The bottom line: the wireless access point is connected directly to my broadband Internet service, and it’s always on. All I have to do is turn on my Pocket PC, activate its Wi-Fi connection, and I can browse the Web from almost anywhere in my house.

  * * *

  Rabbi Jeffrey Kurtz-Lendner has recently become the full-time rabbi at the Northshore Jewish Congregation in the New Orleans suburb of Mandeville, Louisiana. He formerly served as the Assistant Director of the New Orleans Jewish Community Center and the Executive Director of the Hillel Foundation of New Orleans. Rabbi Kurtz-Lendner, a native of Buffalo, New York, attended Brandeis University, and was ordained at the rabbinical school of the Jewish Theological Seminary in New York. Jeff’s wife, Robin, is a native of Opelousas, Louisiana, and a graduate of Boston University Law School. They live with their daughters, Leah and Abby, in Mandeville, LA. Jeff can be reached at rabbijkl@yahoo.com.

  Get More Out of Wi-Fi!

  It’s easy to become a Wi-Fi power user with these no-cost and low-cost solutions

  by Dan Hanttula

  If you have a Wi-Fi enabled Pocket PC and read last issue’s "Get More" article (page 64), you probably realized that most of the Bluetooth applications I described would work over a Wi-Fi network as well. Like Bluetooth, Wi-Fi is a short range, high-bandwidth wireless solution developed to connect computers without cables. But because it’s faster than Bluetooth and has a greater range, there’s a lot more you can do with it. Whether you use Wi-Fi at home, at work, or at wireless "hotspots" on-the-go, it’s easy to become a "power user" with the applications I’ll describe. All these solutions require a wireless network and a Wi-Fi enabled Pocket PC.

  Note: The procedures are for informational purposes only. Modifying your Pocket PC can damage your device or the data stored therein, and you assume any risks associated with the modifications. Before you attempt any of this, back up your Pocket PC!

  Locate wireless networks in your area

  The first step in becoming a Wi-Fi power user is to find every hotspot in your neighborhood. Some Pocket PCs with built-in Wi-Fi also have wireless applications that help you identify and connect to wireless networks quickly and easily. If yours doesn’t, check out pocketWiNc ($19.95) from the Cirond Corporation (http://www.cirond.com). Upon launch, the program scans the area and displays all the available channels, their network name (SSID), signal strength, and many other details (Fig. 1). Tap-and-hold on any network to connect to it or check the Internet availability on each of the networks, plus manage WEP keys, re-obtain an IP address or remove a network ID from your list.

  (above) Fig. 1: Locate Wi-Fi hotspots quickly and easily using pocketWiNc.

  PocketWiNc is compatible with 802.11a, 802.11b and 802.11g networks. It allows you to set up profiles to enable automatic connection to frequently used networks and choose which networks to connect to when multiple networks are available. The program can send ping and trace route commands, includes support for portrait and landscape viewing, and provides quick launch icons to quickly jump to your Inbox and Pocket Internet Explorer. Because of the incredible features packed into this application, pocketWiNc is superior to the built-in Wi-Fi applications found on some Pocket PCs. I consider it a "must-have" for any Wi-Fi user.

  Make free phone calls

  Required: Other people with the Skype software installed on their Pocket PC or computer.

  The term "Voice Over IP" (or VoIP for short) is used to describe real-time voice conversations that use the Internet instead of a phone line. In the past, I’ve found VoIP applications to be too complex, and the conversations to be frustratingly low quality. Skype Limited (http://www.skype.com) has changed all that with a new service that is very easy to use and that claims to have better quality than a phone conversation. Best of all, they offer Pocket Skype, a free Pocket PC version of the software, that is not only user-friendly, but its ultra-cool as well! When a call comes in (Fig. 2), the Pocket PC displays the caller’s name and allows you to answer, ignore or reject the call.

  (above) Fig. 2: Pocket Skype brings VoIP to any Pocket PC with an Internet connection. Calls appear in the pop-up window so you can see who is trying to reach you.

  If you tap Answer, Pocket Skype changes to a full screen display with a call timer and, optionally, a picture of the other party. Simply speak into the microphone to chat with the caller or plug a set of headphones into the Pocket PC earphone plug if you desire a private conversation. Pocket Skype also includes a Start page that displays missed calls, the number of contacts currently online, a log that displays call duration and date, and a messaging component that allows you to send text notes to users who may not be connected at the moment. Pocket Skype allows you to communicate with anyone who uses the Pocket PC or PC versions of Skype.

  Stream iTunes music

  Required: Apple iTunes and GS Player (or other compatible Pocket PC music player).

  It is shocking to see how many Pocket PC owners also have an Apple iPod. Now you can combine these two passions with one product. Streaming Playlist, available at no-charge on Handango (http://www.handango.com). The program installs on your desktop PC and creates a playlist of iTunes music which can be synchronized to your Pocket PC and played by a program like GS Player from Green Software (http://hp.vector.co.jp/authors/VA032810). Streaming Playlist also launches a mini-Web server to give you wireless access to the music on your hard drive. Simply open the playlist and you can listen to your music on your Pocket PC wirelessly.

  As you order new music from the iTunes store, or copy it from CDs, the program will keep your playlist updated (Fig. 3) with a one click on the pop-up menu in your Windows taskbar. If you have established wireless synchronization (see end of article) you can even update your playlist without syncing with your PC. Although the program does not include an installer, the readme file has clear instructions and the program is simple enough to set up in just a few minutes. My only disappointment with this application is that it is not compliant with the Pocket PC Windows Media Player.

  (above) Fig. 3: Streaming Playlist keeps your Pocket PC up to date with all of the music you have in your iTunes library on desktop PC.

  Manage your home automation system


  Required: An automated house using X-10 and a network-connected multimedia computer.

  If you have already installed a home automation system that uses X-10 technology, you should check out HAL by Home Automated Living, Inc. (http://www.automatedliving.com). All of the versions, HALbasic ($99), HALdeluxe ($239), and HAL2000 ($399) include a feature called HAL HomeNetPDA. HAL HomeNetPDA allows you to control your entire home from your Pocket PC, including HVAC, lighting, digital music, Web cams, and much more. The Web-based system is specially designed to fit in Pocket Internet Explorer (Fig. 4) and is divided into Summary, Devices, Modes & Scenes, Heating & Cooling, Telephone, Security, Home Theatre, Video Monitoring and Schedules.

  (above) Fig. 4: The HAL HomeNetPDA feature allows you to control your entire home automation system from Pocket Internet Explorer and provides real-time information like temperature.

  The Summary screen shows current system time, sunrise and sunset times (helpful if you have events that occur on or around dawn or dusk), house mode, current inside temperature, security setting, number of new voicemail messages, and Caller ID information from the last phone call. The other sections provide control of any device in the house (for example, turning off all lights on the second floor of your home, changing the status of a compatible security system, or checking Web cams around your home). You can also review and modify scheduled events, like turning the air conditioning off while the family is out during the day. HomeNetPDA even allows you to playback voicemail messages through your Pocket PC speaker while connected to your network.

 

‹ Prev