Welcome Guest   Login   Apr 29, 2017
Registered Users
Login
Sign-up

 

 


Fedora & Vista Blog


Protect your WIFI from Terrorists    


STRONG SIGNALS

 

Wi-Fi connections are a great way to browse the web wirelessly and on different computers. But, left unsecured, they can also be an open invitation for outsiders to tap in. One telltale sign that your wireless network is being tapped is a sudden drop in bandwidth speeds. Though lower speeds do not necessarily portend ‘hacking’, they are a good indicator that you need to check your Wi-Fi network connection. Call your service provider for help if this sounds like gobbledygook to you:

 

 

1   At the time of setting up a Wi-Fi router, users are prompted to set up a Wireless Encryption Protocol (WEP) key, which, in simple terms, is a password-protected method to log onto your network. If you didn’t select this option while installing your router—User Alert—you’re operating an ‘open’ connection. Anyone who detects your Wi-Fi using the wireless network ‘seek’ option on his or her computer can use your bandwidth.

 

2   While a WEP key is one step towards securing Wi-Fi, it is not the last. Alternatively, you can use the advanced security protocol known as Wi-Fi Protected Access (WPA) to bolster security. Check if your router supports WPA2, which is a more advanced iteration of WPA and therefore recommended.

 

3   Ask your service provider to set your Wi-Fi router’s Dynamic Host Configuration Protocol (DHCP) settings to manual. This would require him to key in each of your computer’s physical addresses. DHCP is an auto-configuration protocol used on computer networks. It allows a machine to be configured automatically, eliminating the need for human intervention. When the DHCP setting is switched to manual, you are restricting access to your router to only those machines whose addresses have been keyed in and, therefore, are recognized by the router . Usual IP range assigned through DHCP is 192.168.1.1 to around 192.168.1.50.

 

4   You might also want to enable Media Access Control (MAC) filtering on your routers. MAC filtering allows (or denies) access based on the unique MAC address built into every network card or Wi-Fi device. Once this filter is activated, only devices that have explicitly been allowed access may connect . It can be little pain while adding each devices to router, but offers great level of security.

 

5   Finally, turn off your router’s SSID broadcasting. In layman’s terms, an SSID (Service Set Identifier) is the ‘network name’, which is used to identify a particular network when multiple networks operate in the same location. Turning off the broadcast effectively makes your network invisible—and people can’t steal from things they cannot see. While registering your devices to router you need to manually enter this SSID instead of searching for WIFI availability.

Posted by: neo


Old Articles
What is the secret behind reverse f ?
Microsoft is still the same from QDOS to Skype acquisition
Father of Java goes to Google
Micromax Q5C comes with mammoth battery power - Micromax Q5C Review
Cold calls on landline from Reliance Delhi Headoffice for Investment and Insurance
Protect your WIFI from Terrorists
Dreams are binary memory maps running straight into your brain.
6 Essential Plugins for every wordpress website
Do you need Apple iPad? Is Tablet computing useful to you?
All you wanted to know about Julie & Julia
5 differences & 5 Similarities in Avatar and Matrix Movie
CEO of SAP India dies because of lack of sleep and lot of stress
Kindle 2 e-ink not worth launching in India
H1N1: Facts On The Flu
Larry Eats Inventors of Technology - Oracle Acquires SUN
Touch the Music, Touch the Video, Touch the games-iPod Touch
Browser Battle is Hot Again - Google Chrome is here
Nokia,Sony or Motorola? iPhone is perfect, but Rs.31,000 is too much
Mid Year surprise - iPhone 2 (3G) released with bulk of features
In Case of Emergency !!!!
JavaOne - Pilgrimage for every Java Developer
Tips For International Passengers
RACE Movie: Bolloywood makes Going to Hell in vogue
Year 2008 begins with great IT happenings
Open Workbench 1.1.4 an alternative to MS-Project
Aptana STUDIO 1.0 - Open source Editor for HTML, Javascript & CSS
Dia an amazing alternative to Microsoft Visio

Suggestions/Comments/Views
Name:
E-Mail:
(Only admin can see)
Comments:

 

 

My New Blog

My Award winning Whitepaper

Contradicting Light
My Personal Blog


Trace Mobile Location



My Book Reviews
 




Tech Jokes Worth Reading

 
Top
Home
www.deepjava.com 1999-2014 (C) Developed and maintained by D-Kay Consultancy