Library Technology - Reviews, Tips, Giveaways, Freeware

Library Technology – Reviews, Tips, Giveaways, Freeware

To prevent unauthorized access to wireless network

Posted In Internet - By Jack on Thursday, September 22nd, 2011 With No Comments »

When you set up a wireless network at home, keeping your system safe and to prevent outside access is extremely important. Maybe you think you very kind in allowing neighbors to use their Internet connection, but if you do, means that you are allowing all others to use your wireless network . “All others” here could include hackers to steal personal information from your PC, the neighbors have a habit of downloading dozens of movies a night, or the teenagers next door make will definitely get you in trouble by sharing habits of their music illegally. Here are some tips to help you remain in the best security for home wireless networks.

Change the default username and password in the wireless access ports
Even when using a new wireless router, replace the username and password immediately after logging. If you’ve used the router for some time, please check the instructions to make sure that you no longer use the default information. “Most wireless devices can operate independently, thanks to a wealth of technology and other modern features to create the conditions most favorable to the customer, even for those not fluent in the technical , “Alexandru Catalin Cosoi, head of the laboratory security line at the security company BitDefender in Bucharest, Romania explained. It can be said to retain the default information is the most common mistakes that users or have. The hackers know that many users never change the default information, so we usually look for the default login information, such as “admin” and “password”, and will then have full control over wireless networks.
Use wireless encryption
“The wireless devices often come home with two encryption protocol, called Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA/WPA2),” Cosoi said. Unfortunately, WEP, popular on the old router, have been found to have serious security flaws. Each router sold since 2006 have support for WPA or WPA2. If you have an old access port only supports WEP, the new upgrade. You should check the routing instructions to switch encoding, to make sure no outsiders snooping on your system. Creating a password to access the new network powerful enough and then set all the notebooks, tablet PCs and smart phones in your home automatically use this password.
Disable remote control of remote access ports, if possible
“Most of the ports and access points allow an authorized user can change the settings of the device – even if they are not in the building – simply by typing its IP address browser, “said Cosoi. But when remote access is enabled, anyone who is lurking on your network can capture the user name and password, and then come back later to change the settings. Check the installation instructions for your wireless port to see if it can disable the remote access features or not, and if they follow the appropriate instructions.
Enable MAC filtering
Another approach to protect against intruders is to create a “whitelist” of allowed devices using a wireless network. Fortunately, all the network interfaces of all the Internet devices – like computers, smart phones, game console or computer table – only one and only one “address” Media Access Control ( MAC). Most wireless access ports allow home users to create a “guest list” the MAC address. “However, some sources of wireless devices allow users to change MAC addresses as needed, which means that the function of MAC filtering alone is not an effective solution to protect against intruders “Cosoi warning. “However, it is an additional precautionary measures, combined with a strong WPA password, which will enhance the security of your wireless network.” You can access the web page to find the MAC address for your device. Accordingly, please refer to the instructions to activate and configure filtering MAC address filtering.
These are the most effective way to implement security for your system. However, some users also have more security conscious. They perform the following steps to hide their network from the “curiosity” of the hackers.
Disable SSID Broadcast function
This function makes your network becomes “invisible” to those who are not next to your house and not realize that there is a wireless transmitter operating in the region. “To the user can identify your wireless network is, routers and access points automatically broadcast their name (also called ESSID / SSID or Service Set ID),” said Cosoi . SSID function allows owners of wireless networks and friends he / she found it easy, but also to inform people about the presence of such networks. However, disabling the SSID function will not prevent authorized users – they can still manually enter the SSID.
Minimize the transmission of wireless access ports
Just like a radio, a wireless network can be covered to an area proportional to the strength of the transmitter is built in that area. Usually transmission capacity of a built-in wireless system may be sufficient to cover a house and even a public space around it, such as stairs or front sidewalk. That means that anyone who is equipped with a laptop or netbook can also find your network and try to use it in its own way. Cut transmission capacity will ensure that the access port will not transmit beyond the scope of your home, and make network detection (sniffing) (a method to identify the wireless network is available in the area) becomes much more difficult. “The possibility of transmission can be controlled even on devices with no option,” said Cosoi. “Simply removing the device’s antenna (or one of the antenna, if the wireless device more than one) will also lead to signal low enough to stop the search, but enough for efficiency in the home. “
Never place an access port near the window overlooking a public place
Radio waves transmit better through glass than through concrete. Sure you do not want strangers in the yard, street or park take control of your signal.
Do not give others the password to access your network
“The home network is largely based on trust: no authentication mechanism in place to minimize the possibility of illegal access,” Cosoi. “In contrast, the home network users tend to make things become public, in order to obtain information from one computer to another computer.” This is great if you set all the device automatically use the Internet password, which means that children in the family will not have to type the password each time you use iPad. A number of access ports allow you to create a wireless network Monday, offering an Internet connection but does not allow access to other machines on the network. If you want to share with friends, you can just give them the password to access the network.


More contents in: , ,

About -