Skip to main content

How to secure your WiFi network?

NETWORK TECH WORLD

 How to secure your WiFi network?


Change the user password of your wireless router
Access to the configuration utility of your router is secured with a username and a password. This page is accessed by typing the IP address of your router in your internet browser (eg 192.168.1.1). The first step in securing your new Wi-Fi network is to change the password by going to the option to change it.
Set the network name (SSID)
Any WiFi network has a name: the SSID (Service Set IDentifier). The second step is to change the name and hide it from view malicious users. In the configuration utility for your router, change the default SSID name in avoiding it is too simple.
Then disable the SSID broadcast of your wireless network by checking the box, so it does not appear in the list of possible connections from your neighbors.
Enable encryption on your network (security key)
Before using your wireless-son, it is useful to encrypt it with a numerical key so as to leave only to users with access to it. Two types of encryption data are currently available: WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access). If your router and your wireless adapters support it, son, you should opt for a WPA key encryption key with “Pre”. However, if your hardware does not support WPA, then enable WEP. The manipulation is simple because the digital encryption is created from a phrase you must enter a minimum 5-letter word or phrase in the text box and the router will generate different codes. Remember to write them down (one is enough) because they will be used to connect each computer on the network.
Filter MAC addresses
Devices (PC or PDA) connected to a wireless network-son have a network card fitted with a specific address: MAC address (apart from this, a computer is defined by its IP address). In the configuration utility for your router, you must activate the filter option and enter the MAC addresses of each of your devices. Thus only these devices (known on the network by their MAC addresses) can access the network.
Configure machines Wifi
For each machine can connect to the network you will need to indicate the information listed above. After researching your wireless-son, you must change the SSID to match the one you specified for the router. Then specify the key digital encryption that was specified in the utility ocnfiguration the router. Once done, your device should connect to the router and the internet.
Enable file sharing
To share files between computers and devices connected in Wifi, you need to enable file sharing. The process of sharing in Windows XP is simple. Choose “Control Panel”, then “Network Connections” and click “Create a home network or a corporate network.” Then select “This computer connects to the Internet through another computer on my home network or through a residential gateway.” The connection wizard will detect your Internet connection.
To share a folder with Windows XP, right click on the file in question, then choose “Sharing and Security” and check “Share this folder”. To then access all shared folders from any machine on the network, click “Start” then “My Network”. The technique is similar to set a network printer: on the computer that the printer is directly connected, go to the “Start” menu then “Printers and Faxes”, then click the right mouse button on the printer and installed select “Share”.

Comments

Popular posts from this blog

Removing Norton Anti-virus 2004, How to remove the Registry Enteries

NETWORK TECH WORLD  Found this on the Norton Web site. I finally got fed up with Norton 2004 AV and switched to Avast. Had lots of problems removing Norton, lots of stuff left over in the registry. After a few Google searches, I found this. http://service1.symantec.com/SUPPORT/nav.nsf/docid/2004020909040706?Open&src=&docid=2001092114452606&nsf=nav.nsf&view=df0a595864594c86852567ac0063608c&dtype=&prod=&ver=&osv=&osv_lvl= FYI, this is from the Symantec.com Site, so I am guessing it is nice and safe If you scroll down to the "Removal instructions" the first option is "To remove Norton AntiVirus from the registry" Click on the Plus sign and you can down load the removal tool (it is a .reg file that removes all the keys for Norton.) Direct Link for the file: ftp://ftp.symantec.com/misc/consumer/nav/nav2004xp_reg_removal.reg After I got done, Avast started working right and my system seemed to be running alot...

A very small tut for RealMedia

NETWORK TECH WORLD You may find this helpful if you donwload hundreds of short episodes in rm format like me and tired of double-click to open next files. Very easy. Use notepad to open a new file, type this inside: file://link to file1 file://link to file2 (type as many as you want) Close file. Rename it to FileName.rm Then you`re done!!!! Ex: I put my playlist file here: C:\Movies\7VNR And the movie files are in C:\Movies\7VNR\DragonBall Then inside my playlist file I`ll have something like this: file://DragonBall/db134.rm file://DragonBall/db135.rm file://DragonBall/db136.rm file://DragonBall/db137.rm file://DragonBall/db138.rm

Ten Keyboard Shortcuts Everyone Should Know

NETWORK TECH WORLD  Ten Keyboard Shortcuts Everyone Should Know Using keyboard shortcuts is the easiest way to save you time and effort when you need to access commonly used symbols or processes. Indeed, navigating through shortcuts will keep your internet browsing fast and sharp. You can use shortcuts to inserts symbols instead of spending hours searching the internet for them and subsequently continuously copying and pasting them throughout your work. Some of the most used symbols in business are available in a three key combo. Pressing and holding Ctrl and Alt  and adding a letter to the combination will serve up the symbol. If you add C, you’ll deliver a ©. R, returns ®. T displays ™.  E shows € and the L creates a numbered list 1) 2). Lost Symbols © Ctrl Alt C ® Ctrl Alt R ™ Ctrl Alt T € Ctrl Alt E 3) Ctrl Alt L There’s a great little time saver if you’re working on many documents, across different programs at the same time. Ins...