Protecting Yourself on the Wireless Public Network

Properly used, the login options for the Public Network can help you protect your personal information, your external bandwidth allocation and your good standing as a network user.

Security on 'restricted.utexas.edu'

On the 'restricted.utexas.edu' wireless network, the connection between your computer and the wireless access point (WAP) radio is encrypted. This means that anyone casually scanning wireless traffic cannot see the information you are sending back and forth on the wireless portion of your Internet session. Once your information reaches the WAP and is on the wired network, it is no longer encrypted. Although this provides you with a greater level of security, you should still exercise caution:

If you share your laptop with your friends or co-workers and you are connected using your UT EID, be aware that any activities and external bandwidth use will apply to your EID.

Security on 'guest.utexas.edu'

On the 'guest.utexas.edu' network, your credentials are stored on your computer's hard drive for 24 hours in order to keep your session active.

After you have logged into the Public Network wirelessly, use caution about the data you send and receive. The 'guest.utexas.edu' wireless network is not encrypted, so you should make sure your communications are secure through the applications you use.

On a shared, public computer, such as a library laptop, you should always log out to remove your credentials from the hard drive when you are finished working on that computer. Doing so will prevent the next user from using your identity to access the network.