Not yet registered? Create a OverBlog!

Create my blog

A guide to securing a wireless network

The growing popularity and availability of wireless access to the internet has made having secure networks more important than ever before and yet conversely, because of the plug and play type set-up of Wi-Fi networks, Wi-Fi security is often overlooked. Below is a guide to some of the security options available.

Securing your router

Strong network security is meaningless if a hacker can simply log onto the administration page of your router and disable it. Most routers use very common default passwords such as 12345 or admin. Make sure that you change this to something more secure. Disabling the SSID broadcast will make it necessary to know of the networks existence and its name to connect. This has obvious advantages, but can still be overcome by a hacker with the proper equipment. Lastly, disable the remote administration feature of the router, if applicable, unless it is absolutely necessary and can be configured to only accept administration from certain IP addresses.

WEP, WAP, and WAP2

WEP, WAP, and WAP2 encryption, all generate a series of passwords that are used to secure your network. The passwords will be found on your network administration page and need to be noted and provided to any computer on the network. Of the three, WAP and WAP2 are the most secure, as they monitor password integrity and have a larger character base for their passwords, but WAP2 may not be supported by older hardware or operating systems. Similarly, it will be necessary to use WEP in certain situations as not all wireless devices support WAP encryption. If that is the case, be aware that while WEP is better than nothing. Obviously, it is recommended, if it is the only option, it has well-known weaknesses and a hacker with the right equipment can bypass it.

Other options

MAC Filtering Unlike IP addresses, which are generic and generated whenever needed, each MAC address is unique to a specific machine or more specifically, its network adapter. Due to this, MAC filtering can limit access to your network to only machines that you have specifically specified. Unfortunately, finding and entering the MAC addresses of all your equipment can be inconvenient, especially with a large group of users or high turn-over. It should also be noted that it is possible for a determined hacker to "spoof" a MAC address. Reduce power Lastly, and least ideally, you can simply reduce the power of your WLAN broadcast. This adds security by the simple expedient of being harder to detect, but also reduces network performance.

Same category articles Computers

How to use the Microsoft File Transfer Manager

How to use the microsoft file transfer manager

The microsoft file transfer manager is a desktop client side application which is used to provide secure and guaranteed delivery when you download or upload large files over the internet. it also speeds up the download process. when you download and install the microsoft file transfer manager on your computer, you can easily learn how to use it in a few short steps.
What is ITIL (Information Technology Infrastructure Library)?

What is itil (information technology infrastructure library)?

Itil stands for information technology infrastructure library, and it essentially works as a management framework that provides a number of ict services, including practical ways to identify, plan, deliver and support it services to businesses. itil provides detailed checklists, as well as comprehensive tasks and procedures that a business can tailor to its specific needs.
Finding the best cheap laptop

Finding the best cheap laptop

Are you looking to buy a cheap and an affordable laptop? this article will indeed help you to find out what to look for when buying a cheap laptop. hence, with these tips, you can still get a great deal for your laptop.
How to change your IP address

How to change your ip address

How to get my ip address? how to change my ip configuration? what is the ip of my computer? what is my cmd command? looking for answers for these questions? then this article is for you…