Not yet registered? Create a OverBlog!

Create my blog

A guide to securing a wireless network

The growing popularity and availability of wireless access to the internet has made having secure networks more important than ever before and yet conversely, because of the plug and play type set-up of Wi-Fi networks, Wi-Fi security is often overlooked. Below is a guide to some of the security options available.

Securing your router

Strong network security is meaningless if a hacker can simply log onto the administration page of your router and disable it. Most routers use very common default passwords such as 12345 or admin. Make sure that you change this to something more secure. Disabling the SSID broadcast will make it necessary to know of the networks existence and its name to connect. This has obvious advantages, but can still be overcome by a hacker with the proper equipment. Lastly, disable the remote administration feature of the router, if applicable, unless it is absolutely necessary and can be configured to only accept administration from certain IP addresses.

WEP, WAP, and WAP2

WEP, WAP, and WAP2 encryption, all generate a series of passwords that are used to secure your network. The passwords will be found on your network administration page and need to be noted and provided to any computer on the network. Of the three, WAP and WAP2 are the most secure, as they monitor password integrity and have a larger character base for their passwords, but WAP2 may not be supported by older hardware or operating systems. Similarly, it will be necessary to use WEP in certain situations as not all wireless devices support WAP encryption. If that is the case, be aware that while WEP is better than nothing. Obviously, it is recommended, if it is the only option, it has well-known weaknesses and a hacker with the right equipment can bypass it.

Other options

MAC Filtering Unlike IP addresses, which are generic and generated whenever needed, each MAC address is unique to a specific machine or more specifically, its network adapter. Due to this, MAC filtering can limit access to your network to only machines that you have specifically specified. Unfortunately, finding and entering the MAC addresses of all your equipment can be inconvenient, especially with a large group of users or high turn-over. It should also be noted that it is possible for a determined hacker to "spoof" a MAC address. Reduce power Lastly, and least ideally, you can simply reduce the power of your WLAN broadcast. This adds security by the simple expedient of being harder to detect, but also reduces network performance.

Same category articles Computers

All about: Comcast Internet service

All about: comcast internet service

When you decide to buy an internet service, there will be numerous companies vying for your attention. it may difficult to choose from a myriad of options if you don’t know about various services offered by each service providers. this article looks at explaining the various facilities and features provided by comcast internet service.
Guide to buying external hardrives

Guide to buying external hardrives

If you are in the market for an external hard drive, this article will give you some tips on what to look for when purchasing an external hard drive. as well, i will give some alternatives to getting an external hard drive.
Where to buy LG laptops

Where to buy lg laptops

Are you thinking of buying an lg laptop? are you wondering where you can find the ideal laptop? in that case, you don’t have to spend your time searching, visiting lg retailers and browsing through hundreds of magazines and websites. read the following article and find out all the interesting facts that you should know about buying lg laptops.
Where to buy computer dust covers

Where to buy computer dust covers

“computer dust covers” is really a general term which refers to all types of covers that are used to protect all computer-related equipment from being covered with dust. it can relate to screen covers, notebook jackets, a table cover, laptop covers, printer covers, keyboard covers, laptop shirts etc. they are generally covers made from different fabrics which can save you time that you would otherwise spend to dust off your computer. this article explains where to buy computer dust covers.