The Information Technology Department strives to provide access to teaching, learning, research, administrative, and communication technologies through a commitment to excellence in infrastructure, customer support, end user professional development opportunities, and technical leadership in fulfillment of the institutional mission and core values. Please refer to our menu on the left for further information.
Sun. Apr. 19 - 10:00am to 2:00am
Mon. Apr. 20 - 7:30am to 2:00am
Tue. Apr. 21 - 7:30am to 2:00am
Wed. Apr. 22 - 7:30am to 2:00am
Thu. Apr 23 - 7:30am to 2:00am
Fri. Apr. 24 - 7:30am to 6:00pm
Sat. Apr. 25 - 10:00am to 8:00pm
We are located on the first floor of the Main Library
You can contact media•tech by phone at (401) 254-6363
April 19, 2015 - April 25, 2015
The SQL Migration path continues.......
A fake Wi-Fi access point that masquerades as a legitimate one to allow an attacker to gather personal or corporate information from mobile device users.
An attacker can easily create an evil twin with a smartphone or other Internet-capable device and some readily-available software. The attacker positions himself in the vicinity of a legitimate hot spot and lets his device discover what service set identifier (name) and radio frequency the legitimate access point uses. He then sends out his own radio signal, using the same name as the legitimate access point.
To the end-user, the evil twin looks like a hot spot with a very strong signal; that's because the attacker has not only used the same name and settings as the "good twin" he is impersonating, he has also physically positioned himself near the end-user so that his signal is likely to be the strongest within range. If the end-user is tempted by the strong signal and connects manually to the evil twin to access the Internet, or if the end-user's computer automatically chooses that connection because it is running in promiscuous mode, the evil twin becomes the end-user's Internet access point, giving the attacker the ability to intercept sensitive data such as passwords or credit card information.