
Wireless modem takes your house, it has advantages. Check e-mails, play PSP, Mobile OS applications, surf the Internet from your lounge suite or bed everything to gain. The sad thing about this technology, almost 30% of the users get the installation is repaired or uncertainty Free wireless broadband for the rest of us. As I write, there are currently 3 users unlimited use of the wireless network around me.
This article teaches you the basics of Wireless Broadband securing your home. After a wireless telephone, mobile phone and wireless-enabled applications work on the principle that the lower band, the better your experience. Wireless networking is easy to use, but they can also easily cut when you configure security settings or software in the background doing. By default, most wireless networks out of the box indefinite. You must learn to read, you need the manual for the various settings for your wireless network secure. The list below are the basics, is limited to your network problems.
Step 1: You must know your current network setup? Wireless technology that transmits data via radio waves from one application to another. The signs of the performance of your data collected over a long distance often miles. There are simple safety measures, someone with the right tools and coding, break in and steal your data. Unstable Wireless is the most common form of interference in the private network.
Step 2: Change your SSID SSID and password to the service set identifier represented. Each wireless network, from large companies in the simple system set-up at home, contains an SSID. SSID is your network of digital name. First, change the SSID number and password from the default settings something private and strong. They do not actively keep the default SSID. If the SSID and your network password, launch the software for your wireless hardware. You need your SSID in the Control Panel program. Overriding the default SSID is not much, as the name of your network is broadcast to all users in your area. You can change your personal information for all users around your environment using the SSID broadcast. It is as simple as marking a box on your modem control panel.
Step 3: Set MAC-Media Access Control or MAC filtering - A 12-character address in the network device. PSP Pocket PC, laptop, desktop, etc. all have MAC addresses. It can be difficult to find the MAC address, depending on the hardware. But the time the security of the section is to prevent hackers from running directly into your network and data theft. For users of Windows desktop, click Start, click Run, type cmd in the text box. The types of ipconfig / all in the DOS window. 12-digit MAC address is the Physical Address. Joint MAC filtering devices to access your wireless modem. In determining who your wireless modem access adds an additional security for your network. To ensure, MAC filtering, disable the wireless modem software and enter the MAC address of the hardware you access. Often found under Security Settings of your modem control panel.
Step 4: Encrypt your data and two common encryption protocols WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access). Both protocols to encrypt your data and block unwanted visitors from entering your network. WPA is considered to see how much more secure than WEP because of the ever-changing pass key. But WPA is not known by all devices and depends on the actual hardware and configuration. EPA is integrated into the rule in most routers with WEP encryption. It is very important to make sure your device supports WPA encryption are made. If you have WEP and MAC filtering can prevent most interference and hackers.
Step 5: Education and Software Keep up to date - more information about wireless security. Some great items to keep for the future of online Internet. Check each month for updates for your wireless modem. Keep your computer up to date with the latest updates from Microsoft or Linux. Download third party software such as Zone Alarm help intrusion detection, and monitor your wireless transmissions at all times. More third party software option will soon be added to an article on wardriving.
No comments:
Post a Comment