Know How...

Aug 21st 2017

Know How... 338

Back to School! Part 2

Protecting yourself on a college network.

Although the show is no longer in production, you can enjoy episodes from the TWiT Archives.
Category: Help & How To

Small rugged speakers for your dorm room:

The Fugoo Style-S

  • 4 Drivers (2 x 47mm full-range // 2 x 115mm Bass Radiators)
  • 20 Watts (93db)
  • Waterproof (IP67)
  • Can be paired (Like the Fugoo GO!)
  • 15 Hours of battery life
  • Voice Speakerphone
  • Bluetooth 4.2 for 100 feet range
  • Less than 1.7lbs

Fugoo Go Portable Speaker

  • Half the price of the original Fugoo Speaker
  • 12 Watts (92db)
  • Dual 52mm drivers + dual bass radiators
  • Bluetooth
  • Can be paired IN STEREO!

Protecting myself on a College Network

"What is the best way to protect yourself at college on a college network? I am going to have a NAS, set up there too and what is the best way to protect as much as possible? Unfortunately, my college does not allow routers, so that is out." -- David Bruns

Why are they doing this?

  1. They need to control the devices on their network
  2. They need to NOT have rogue WiFi APs that congest the airwaves
  3. They need to know WHO has done something unauthorized on their network

How are they doing this?

  1. Scanning for WiFi APs (even hidden ones) -- Possibly running deauth attacks on any non-auth AP
  2. Most likely, they're also looking at MAC addresses to see if he's using a device registered from a router manufacturer.
  3. Traffic Inspection: If a single IP (through a NAT) has more active connections than can be expected from a single device, they can escalate your connection to an "inspect the room" search

So... we have two challenges:

  1. Don't let them DETECT that you're using a router.
  2. Don't let them SEE that you're using a router.

Basic precautions:

  1. Turn off the Wi-Fi 
  2. Close ALL the ports
  3. No external acccess of your NAS
  4. Limit multi-device throughput

Advanced Precautions:

Cloning your MAC address

Connect with us!

Thanks to CacheFly for the bandwidth for this show.