Not yet registered? Create a OverBlog!

Create my blog

How do I secure my wireless network?

Wireless networks are extremely convenient, but they are also vulnerable to hackers. This problem is made worse by the fact that many Wi-Fi networks have very little or no security. Below is a short guide to some of the security settings available for your network and how best to implement them.

Router security

Router security might be the single most important part of keeping your network safe. Not only is it your networks entry point, but if your router isn't secure a hacker can just use it to turn off any other security settings that you may have in place. Due to this, you will have to make sure that your router is no longer using its default password. Not only are these very weak, but it is not uncommon for a manufacturer to use the same password on all of its routers making them extremely vulnerable for wireless range. Next, if your router has a remote administration feature, make sure that it is turned off unless you actually plan to use it. If you decide to leave it turned on, make sure that you set the IP address filter to help you to limit which machines can access it. Lastly, consider turning off your router's SSID broadcasting. This makes your network invisible and only accessible to someone who knows your network's name. Though, be aware that with the proper equipment, a hacker can still find it.

Encryption

WEP, WAP, and WAP2 are all encryption methods to help to protect your network.
WEP WEP is the oldest and least secure method, but it may be necessary to use, if there are devices on your network that don't support WAP encryption. Keep in mind though, that its weaknesses are well-known to hackers. WAP WAP not only uses more possible characters in its passwords than WEP, but monitors their integrity, making it a far more secure method. WAP2 WAP2 is an improvement on WAP encryption and the best possible choice, but WAP2 is only supported by newer machines and operating systems. Use this method, if possible.

MAC Filtering

Every network adapter has a unique 12 character MAC address. By setting your network up to only machines with MAC addresses off a specific list, you can make a very secure network. The down side is that, especially on a larger network or one with a lot of turn over, it can be extremely inconvenient to gather all the addresses and set up. Keep in mind that it is also possible for a determined hacker to trick your router by spoofing a MAC address.

Same category articles Computers

List of viruses that affect computers

List of viruses that affect computers

The following article will list and describe the different types of viruses that could affect your computer. in general, a computer virus is a program that can copy itself onto your machine and affect various parts of your machine's functions. a virus can spread from one computer to the next one in the form of an executable code.
Finding the best cheap laptop

Finding the best cheap laptop

Are you looking to buy a cheap and an affordable laptop? this article will indeed help you to find out what to look for when buying a cheap laptop. hence, with these tips, you can still get a great deal for your laptop.
What do computer specs do? Do I need to look out for when I buy games?

What do computer specs do? do i need to look out for when i buy games?

Computer games are probably the most intensive programs used in peoples' homes, but with the proliferation of consoles, it's not always obvious that the computer spec is important. people can assume any computer will place games as this is after all what consoles do, but this is not the case.
Where to buy a laptop printer

Where to buy a laptop printer

Whilst for many people they can work on their laptop computers and wait until they get to the office, home or school to print out some valuable work. for others, this is not a viable option, especially for those who do much travelling in their line of work and a hard copy is needed there. this article shall be looking on where to buy a laptop printer.