The use of a wireless modem in your house is advantageous. Checking emails, playing PSP, playing mobile operating system applications, surfing the net from the lounge suite or bed. The sad part of the technology is that nearly 30% of the users get the wrong installation, so the other users are unsure of wireless or free broadband. While I am writing this article, there are currently 3 users who are using unsafe wireless networks around me.
This article introduces you to the basics of providing wireless broadband at home. With the use of cordless phones, mobile phones and wireless applications, the principle that the fewer lines are, the better the experience. Wireless networks are great to use, but they can easily be hacked if there is no proper security setting or background software. By default, most wireless networks are unsafe from the box. Read the manual to find out the different settings required to protect your wireless networks. The following list is the basis for limiting network penetration.
Step 1: Know the Current Network Setting
Wireless technology transmits data from one application to another using radio waves. The signal carrying your data is transmitted over a long distance, sometimes in kilometers. Without simple security measures, anyone with the right tools can access and encrypt, steal and chop your data. Insecure Wireless is the most common form of intrusion into private networks.
Step 2: Change the SSID and User Password
SSID is the identifier of the service set. All wireless networks, from enterprise systems to simple home settings, include SSID. SSID is the digital name of networks. First, change your SSID number and password from the default setting to private and strong. Never keep the default SSID active. To change the SSID and the network password, start the wireless hardware software. It should be possible to change the SSID on the program control panel. The default SSID override will not be good if the network name is transmitted by all users of the user. By disabling SSID, you can keep all users in your area private. It's as simple as marking a box from the modem control panel.
Step 3: Setting MAC Filtering
Media Access Control or MAC – A 12-digit address attached to the network device. Pocket PCs for PSPs, laptops, desktops, etc. They have a MAC address. Depending on the hardware used, it may be difficult to find a MAC address. However, the time spent securing this section prevents hackers from going straight to the network and stealing information. For Windows desktop users, click Start, click Run, and then type cmd in the text box. The ipconfig / all type in the Dos window. The 12-digit physical address is the MAC address. Basically, MAC filtering devices do not have access to the wireless modem. By identifying who has access to the wireless modem, it adds an additional layer of security to the network. To enable MAC filtering, open the wireless modem software and specify the MAC address of the hardware for which you have access. Usually located under Security Settings in the modem control panel.
Step 4: Encrypting and Mixing Data
Two common encryption protocols are Wired Equivalent Privacy (WEP) and WPA (Wi-Fi Protected Access). Both protocols mix data and block unwanted visitors when entering the network. WPA seems to be considered more secure than WEP because of the constantly changing pass key. However, WPA is not known on all devices and is dependent on the current hardware and device configuration. WPA is usually integrated into most routers along with WEP encryption. It is very important that your device supports WPA encryption. If you do not use WEP and MAC filtering prevents most hackers from penetrating.
Step 5: Education and Software
Get information – Always read wireless security. Some great online articles to keep your internet safe. Check your wireless modem updates every month. Keep your desktop up to date with the latest updates from Microsoft or Linux. Download third-party software, such as Zone Alert, to help detect intrusion and keep track of wireless broadcasts. Additional options for third-party software will soon be added to the article on WarDriving.
Source by sbobet