Skip to main content

How to secure your WiFi network?

NETWORK TECH WORLD

 How to secure your WiFi network?


Change the user password of your wireless router
Access to the configuration utility of your router is secured with a username and a password. This page is accessed by typing the IP address of your router in your internet browser (eg 192.168.1.1). The first step in securing your new Wi-Fi network is to change the password by going to the option to change it.
Set the network name (SSID)
Any WiFi network has a name: the SSID (Service Set IDentifier). The second step is to change the name and hide it from view malicious users. In the configuration utility for your router, change the default SSID name in avoiding it is too simple.
Then disable the SSID broadcast of your wireless network by checking the box, so it does not appear in the list of possible connections from your neighbors.
Enable encryption on your network (security key)
Before using your wireless-son, it is useful to encrypt it with a numerical key so as to leave only to users with access to it. Two types of encryption data are currently available: WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access). If your router and your wireless adapters support it, son, you should opt for a WPA key encryption key with “Pre”. However, if your hardware does not support WPA, then enable WEP. The manipulation is simple because the digital encryption is created from a phrase you must enter a minimum 5-letter word or phrase in the text box and the router will generate different codes. Remember to write them down (one is enough) because they will be used to connect each computer on the network.
Filter MAC addresses
Devices (PC or PDA) connected to a wireless network-son have a network card fitted with a specific address: MAC address (apart from this, a computer is defined by its IP address). In the configuration utility for your router, you must activate the filter option and enter the MAC addresses of each of your devices. Thus only these devices (known on the network by their MAC addresses) can access the network.
Configure machines Wifi
For each machine can connect to the network you will need to indicate the information listed above. After researching your wireless-son, you must change the SSID to match the one you specified for the router. Then specify the key digital encryption that was specified in the utility ocnfiguration the router. Once done, your device should connect to the router and the internet.
Enable file sharing
To share files between computers and devices connected in Wifi, you need to enable file sharing. The process of sharing in Windows XP is simple. Choose “Control Panel”, then “Network Connections” and click “Create a home network or a corporate network.” Then select “This computer connects to the Internet through another computer on my home network or through a residential gateway.” The connection wizard will detect your Internet connection.
To share a folder with Windows XP, right click on the file in question, then choose “Sharing and Security” and check “Share this folder”. To then access all shared folders from any machine on the network, click “Start” then “My Network”. The technique is similar to set a network printer: on the computer that the printer is directly connected, go to the “Start” menu then “Printers and Faxes”, then click the right mouse button on the printer and installed select “Share”.

Comments

Popular posts from this blog

What is network

NETWORK TECH WORLD What is network  A network is a group of devices, such as computers, servers, and printers, that are connected together and able to communicate with each other. Networks can be classified based on their size and scope, such as a local area network (LAN), which is a network that is confined to a small area, such as a single building or campus, or a wide area network (WAN), which is a network that spans a large geographical area, such as a city or a country. Networks can also be classified based on their communication protocols, such as the Internet, which is a global network that uses the Internet Protocol (IP) to connect devices around the world.

Google Tricks

AA few things you might want to try with Google: Hand type the following prefixes and note their utility: link:url Shows other pages with links to that url. related:url same as "what's related" on serps. site:domain restricts search results to the given domain. allinurl: shows only pages with all terms in the url. inurl: like allinurl, but only for the next query word. allintitle: shows only results with terms in title. intitle: similar to allintitle, but only for the next word. "intitle:webmasterworld google" finds only pages with webmasterworld in the title, and google anywhere on the page. cache:url will show the Google version of the passed url. info:url will show a page containing links to related searches, backlinks, and pages containing the url. This is the same as typing the url into the search box. spell: will spell check your query and search for it. stocks: will lookup the search query in a stock index. filetype: will ...

Network Protocols

NETWORK TECH WORLD A network protocol is a set of rules and standards that define how devices on a network should communicate with each other. Network protocols govern everything from the type of cable that is used to connect devices to the way in which data is transmitted between them. There are many different types of network protocols, each of which serves a specific purpose. Some common examples include: TCP (Transmission Control Protocol): This is a connection-oriented protocol that is responsible for breaking up data into packets, transmitting the packets over the network, and reassembling the packets at the destination. TCP is a reliable protocol that ensures that all packets are delivered to their destination. IP (Internet Protocol): This is a connectionless protocol that is responsible for routing packets between devices on a network. IP is an unreliable protocol that does not guarantee that packets will be delivered to their destination. HTTP (Hypertext Transfer Protocol): Th...