Ad Free Ask Leo!
If you've purchased anything in The Ask Leo! Store in recent weeks, and you created a shopping account while doing so (not the same as a members.askleo.com account, I'm afraid), then you may have noticed that the ads on Ask Leo! disappeared thereafter.
The short story is this: buy anything in The Ask Leo! Store, create an account when you check out and then as long as you're logged into that account there'll be no ads on Ask Leo! for a year.
The long and surprisingly complicated story is that I'm working hard to make this an additional benefit to my Ask Leo! patrons. If you're already a patron, look for information soon on how you'll get the ad-free experience. It's just ... complicated to get there from here.
If you're not a patron, you support Ask Leo! by purchasing Ad Free Ask Leo! for $2/month, or $24/year. Just create an account as part of the checkout process and you'll be all set.
Earlier this week, a vulnerability was disclosed in the WPA2 security protocol that, in the worst case, could allow an attacker to potentially gain access to some or all of the encrypted information transmitted over a Wi-Fi connection.
This isn't a bug, and it's not a failure of one manufacturer or another. This is a weakness in the protocol itself.
If you use Wi-Fi on any device, it's worth understanding how big of a risk this might be, and what steps, if any, you might want to take.
The steps to take, if you need to take them
The single biggest mitigating factor for the average computer user is that this is a wireless vulnerability, and therefore requires proximity. You need to be using a Wi-Fi connection, and the attacker needs to be within wireless range of your computer.
If you don't use Wi-Fi, this is a non-issue. Nothing to see here. Move along.
If you do use Wi-Fi, then understanding your common surroundings is important. If you're in some isolated area where, like me, anyone close enough to listen in to your Wi-Fi would be obvious and out of place, it's possible you don't need to take any additional steps other than updating software, which I'll discuss below.
If, on the other hand, someone's within range, and particularly if you consider yourself or your business a potential target, then there's something you might want to do until the problems gets fixed: treat your wireless connection as if it were an open Wi-Fi hotspot with no encryption at all. In this case, that generally means:
- Use https wherever possible.
- Avoid sites that don't use https.
- Consider using a VPN.
- Consider using your mobile device's data plan instead of Wi-Fi in sensitive locations.
Or, if you can, switch to a wired ethernet connection.
The steps you need to take regardless
As it turns out, this is a relatively easy problem to address in software. As a result, most major manufacturers are pushing out updates that will fix the issue. Once your software is updated, you're protected.
Take those updates as soon as they're available. Bleeping Computer reports that for Windows 10, at least, your system may already be fixed, as the update was apparently silently included in the most recent patch Tuesday. That fact was only revealed when the vulnerability itself became public. (Sadly, this comes on the heels of a Windows Update problem causing many people to try to avoid updates. When it's available, this is an update you want.)
This applies to any and all devices that use Wi-Fi.
And therein lies a different problem: not all devices will be updated.
Updates on older devices
It's unclear if Windows XP or Vista will get fixes for this. It's pretty clear older versions of MacOS and Linux may not get updates. In short: if your operating system doesn't get security updates now, it's probably not going to be updated for this protocol vulnerability. You'll either have to live with it (see “steps to take” above) or update to a newer OS or device.
And yes, I said “device”. One of the areas considered particularly problematic is that of Android tablets and mobile phones. Almost all are at the mercy of the mobile company from which they were purchased, and many of the older models still in use are not getting updates of any sort. Some will get updates quickly, and some not at all. It'll be important to know which boat you're in.
When it comes to TVs and IOT devices, it's unclear when, how, or even if they'll ever be updated, and what the ramifications of that might be.
This is about clients, mostly
One final point: the fixes apply mostly to Wi-Fi clients — the computers and other devices you use which connect to the network wirelessly. Wireless routers and access points, as I understand it, may not be impacted in the same way. Nonetheless, be on the lookout for updates to your router or access point's firmware related to this issue.
There's one specific case that is impacted, and that's a wireless range extender or repeater. These act as both clients and access points. Since they act as clients, connecting to another wireless router or access point, they would likely be vulnerable to this issue. You'll want to update their firmware as soon as the manufacturer makes a fix available.
Related Links & Comments: What the "KRACK attacks" mean to you
Ad-Free Ask Leo!
Support Ask Leo! and enjoy an ad-free experience whenever you visit askleo.com.
Purchase a subscription to Ad Free Ask Leo! for just $2/month, or $24/year.
Hiberfil.sys and pagefile.sys are support files for two features in Windows. While you might be able to get rid of them, you might not actually want to.
Continue Reading: What Are hiberfil.sys and pagefile.sys, and How Do I Remove Them?
You're not the administrator. Not really.
Oh, sure, you may think you're the administrator. Windows may have even lead you to believe you're the administrator.
However, a security feature in Windows, on by default, means you're not the administrator.
But you can be.
Continue Reading: Why Does My Computer Say I Need to Be Administrator, When I Am?
A feature exclusively available to Ask Leo! Patrons Bronze level & above.
- Tip of the Day: Back Up Your Vault
- Tip of the Day: F5 for Refresh
- Tip of the Day: Side-by-side Explorers in Four Keystrokes
- Tip of the Day: Three Ways to Type on Your Android Phone
- Tip of the Day: AlternativeTo
- Tip of the Day: Don't Wait for the Statement
More Ask Leo!
Leo's Other Projects....HeroicStories Since 1999, HeroicStories brings diverse, international voices to the world ' reminding us that people are good, that individuals and individual action matter. Stories - new and old - are published twice a week.
Not All News Is Bad - Each day I look for one story in the current news of the day with a positive bent. Just one. And I share it.
leo.notenboom.org - My personal blog. Part writing exercise, part ranting platform, it's where I write about anything and everything and nothing at all.
Help Ask Leo! Just forward this message, in its entirety (but without your unsubscribe link below) to your friends. Or, just point them at https://newsletter.askleo.com for their own FREE subscription!
Newsletter contents Copyright © 2017,
Leo A. Notenboom & Puget Sound Software, LLC.
Ask Leo! is a registered trademark ® of Puget Sound Software, LLC