Pas encore inscrit ? Creez un Overblog!

Créer mon blog

A guide to securing a wireless network

The growing popularity and availability of wireless access to the internet has made having secure networks more important than ever before and yet conversely, because of the plug and play type set-up of Wi-Fi networks, Wi-Fi security is often overlooked. Below is a guide to some of the security options available.

Securing your router

Strong network security is meaningless if a hacker can simply log onto the administration page of your router and disable it. Most routers use very common default passwords such as 12345 or admin. Make sure that you change this to something more secure. Disabling the SSID broadcast will make it necessary to know of the networks existence and its name to connect. This has obvious advantages, but can still be overcome by a hacker with the proper equipment. Lastly, disable the remote administration feature of the router, if applicable, unless it is absolutely necessary and can be configured to only accept administration from certain IP addresses.

WEP, WAP, and WAP2

WEP, WAP, and WAP2 encryption, all generate a series of passwords that are used to secure your network. The passwords will be found on your network administration page and need to be noted and provided to any computer on the network. Of the three, WAP and WAP2 are the most secure, as they monitor password integrity and have a larger character base for their passwords, but WAP2 may not be supported by older hardware or operating systems. Similarly, it will be necessary to use WEP in certain situations as not all wireless devices support WAP encryption. If that is the case, be aware that while WEP is better than nothing. Obviously, it is recommended, if it is the only option, it has well-known weaknesses and a hacker with the right equipment can bypass it.

Other options

MAC Filtering Unlike IP addresses, which are generic and generated whenever needed, each MAC address is unique to a specific machine or more specifically, its network adapter. Due to this, MAC filtering can limit access to your network to only machines that you have specifically specified. Unfortunately, finding and entering the MAC addresses of all your equipment can be inconvenient, especially with a large group of users or high turn-over. It should also be noted that it is possible for a determined hacker to "spoof" a MAC address. Reduce power Lastly, and least ideally, you can simply reduce the power of your WLAN broadcast. This adds security by the simple expedient of being harder to detect, but also reduces network performance.

Articles de la même catégorie Computers

A guide to business computers

A guide to business computers

The decision to buy business computers should be approached with forethought and planning because it can affect employee productivity and overall profitability of a business. With so many choices available in the market, a guide to buying the best business specific computers can help narrow your search and get you started in the right direction.
Where to download a free adware remover

Where to download a free adware remover

Adware belongs in the same sort of group as other horrible things such as viruses, trojans, malware etc. etc. which do nothing but cause your PC problems, be it from slowing it down to a crawl to not even starting up. Here, we will show you some places to get hold of free adware remove software.
A guide to reformatting a hard drive

A guide to reformatting a hard drive

Computers have increasingly become valuable sources of information to a number of people, not just because of what it is capable of, but also because of what it contains as well. For this reason, a computer has become part of our lives and therefore either in our business or at home, we will need to protect our computer systems or should it be adversely affected, we may reformat it. Read this article to learn how to reformat a hard drive.
How to install a computer cooling fan

How to install a computer cooling fan

Computers operate best when they are cool. Unfortunately, they generate a lot of heat while operating. This is where cooling fans come in. A properly cooled system will greatly outperform a machine that is more powerful but lacks adequate cooling. Below is a simple guide to installing several different types of cooling fans in your computer and an explanation on how to utilise them most effectively.