Skip to main content

How to secure your WiFi network?

NETWORK TECH WORLD

 How to secure your WiFi network?


Change the user password of your wireless router
Access to the configuration utility of your router is secured with a username and a password. This page is accessed by typing the IP address of your router in your internet browser (eg 192.168.1.1). The first step in securing your new Wi-Fi network is to change the password by going to the option to change it.
Set the network name (SSID)
Any WiFi network has a name: the SSID (Service Set IDentifier). The second step is to change the name and hide it from view malicious users. In the configuration utility for your router, change the default SSID name in avoiding it is too simple.
Then disable the SSID broadcast of your wireless network by checking the box, so it does not appear in the list of possible connections from your neighbors.
Enable encryption on your network (security key)
Before using your wireless-son, it is useful to encrypt it with a numerical key so as to leave only to users with access to it. Two types of encryption data are currently available: WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access). If your router and your wireless adapters support it, son, you should opt for a WPA key encryption key with “Pre”. However, if your hardware does not support WPA, then enable WEP. The manipulation is simple because the digital encryption is created from a phrase you must enter a minimum 5-letter word or phrase in the text box and the router will generate different codes. Remember to write them down (one is enough) because they will be used to connect each computer on the network.
Filter MAC addresses
Devices (PC or PDA) connected to a wireless network-son have a network card fitted with a specific address: MAC address (apart from this, a computer is defined by its IP address). In the configuration utility for your router, you must activate the filter option and enter the MAC addresses of each of your devices. Thus only these devices (known on the network by their MAC addresses) can access the network.
Configure machines Wifi
For each machine can connect to the network you will need to indicate the information listed above. After researching your wireless-son, you must change the SSID to match the one you specified for the router. Then specify the key digital encryption that was specified in the utility ocnfiguration the router. Once done, your device should connect to the router and the internet.
Enable file sharing
To share files between computers and devices connected in Wifi, you need to enable file sharing. The process of sharing in Windows XP is simple. Choose “Control Panel”, then “Network Connections” and click “Create a home network or a corporate network.” Then select “This computer connects to the Internet through another computer on my home network or through a residential gateway.” The connection wizard will detect your Internet connection.
To share a folder with Windows XP, right click on the file in question, then choose “Sharing and Security” and check “Share this folder”. To then access all shared folders from any machine on the network, click “Start” then “My Network”. The technique is similar to set a network printer: on the computer that the printer is directly connected, go to the “Start” menu then “Printers and Faxes”, then click the right mouse button on the printer and installed select “Share”.

Comments

Popular posts from this blog

What is network

NETWORK TECH WORLD What is network  A network is a group of devices, such as computers, servers, and printers, that are connected together and able to communicate with each other. Networks can be classified based on their size and scope, such as a local area network (LAN), which is a network that is confined to a small area, such as a single building or campus, or a wide area network (WAN), which is a network that spans a large geographical area, such as a city or a country. Networks can also be classified based on their communication protocols, such as the Internet, which is a global network that uses the Internet Protocol (IP) to connect devices around the world.

VPNs And Security

VPNs And Security VPNs and You On today’s Internet, security is a major concern. From wanting to protect financial transactions to simply wishing to browse without every site you visit being scrutinized, there are a lot of reasons to wish for privacy and protection. One of the simplest, yet all-around strongest ways in which to protect your Internet habits is through the use of a VPN. They usually have a monthly subscription fee associated with them but if security is important to you, then there’s no cheaper way to secure your Internet connection. On top of that, there are various options, with quick installs, or even more complicated, option-laden pieces of software which allow for more customizability in what your specific needs may be. A VPN is defined as a virtual private network. This effective creates a private network across a public space like the Internet. These connections are secured and encrypted, thus allowing for safer browsing experiences. Not o...

Network Devices

NETWORK TECH WORLD A network device is a hardware device that helps to connect a computer or other devices to a network. There are several types of network devices, including: Routers: These devices route data packets between different networks. Switches: These devices allow multiple devices on a network to communicate with each other by forwarding data packets to the intended recipient. Hubs: These devices are similar to switches, but they do not filter the data packets based on the destination. Instead, they broadcast the data packets to all devices connected to the hub. Bridges: These devices connect two different networks and allow data packets to be transmitted between them. Modems: These devices allow computers to connect to the internet by converting data into a format that can be transmitted over a phone line or cable connection. Firewalls: These devices protect a network by blocking unauthorized access and monitoring traffic for any malicious activity. These are just a few exa...