Guard against network black hands to keep wireless networks away from hacker intrusion (1)

Source: Internet
Author: User

With the gradual maturity of wireless Internet technology, many organizations and even families have begun to use wireless Internet surfing! However, when they enable the wireless network card to try wireless Internet access, they often find many unencrypted wireless Internet access sites nearby, as a result, these unencrypted wireless sites are likely to be infiltrated by outsiders, and even many of the site's core information may be easily stolen.

In order to keep our wireless network sites away from illegal intrusion, we need to use wireless network encryption technology to lock our wireless site "Gate" to avoid illegal intruders!

Understanding wireless encryption technology

Before using the wireless network encryption technology to lock the "Gate" of our wireless site, we need to first understand this technology. The transmission of data through wireless networks is similar to the mailing of common letters. If the data is not encrypted during transmission over wireless networks, all nearby wireless sites may intercept unencrypted data and view the specific data content.

If we do not want the data to be viewed by a nearby wireless site, we need to encrypt or encode the data before transmission, and ensure that the data recipient can know the encryption method.

Currently, the most commonly used wireless encryption technologies include WEP and WPA. Among them, WEP is also called Wired Equivalent encryption technology, this technology is mainly an informal encryption standard that manufacturers are eager to produce wireless devices in a short time. This encryption standard now seems to have many security vulnerabilities, wireless data encrypted using this technology is vulnerable to attacks.

WPA is also called Wi-Fi access protection technology, which replaces or improves the WEP technology with security vulnerabilities. Currently, WPA uses two protocols for encrypted wireless data transmission, one is the temporary Key Integrity Protocol. With the support of this protocol, the WPA technology uses a 128-bit key and can adjust the key once a mouse clicks on each information package, backward compatible with existing wireless hardware and WEP protocols.

Another protocol is the Extensible Authentication Protocol. With the support of this protocol, WPA provides us with more flexible and secure network access functions, this encryption technology is more advanced and safer than WEP.

Cleverly enable wireless encryption

In order to protect our wireless sites from illegal intrusion by outsiders, we need to make appropriate security settings for the wireless routers and wireless network cards used by our sites. In order to facilitate the description, we now take the frequently used D-Link model DI-624 + A wireless router as the operating Blueprint (as shown in ), the following describes how to encrypt a wireless router device:

First, log on to the background management interface of the wireless router device, click the "Tools" tab in the interface, and click the "Manager System" option in the left-side area of the corresponding tab, in the setting area on the right of the option, we can change the system administrator password used by the device by default, to prevent others from using the default password provided in the operation manual to log on to the background of the wireless router at will, so as to illegally adjust the functions or communication parameters of the wireless router.

In general, D-Link model DI-624 + A wireless router provides us with "admin" and "user" These two system administrator accounts, we must modify the login password of both accounts; if we find that our Wireless Router password is accidentally modified, we must first use the restore key function provided by the device to restore the wireless router background password to the factory value, then, log on to the background and promptly adjust the system administrator password.

After the password modification task is completed, we can encrypt the data of the wireless router device.

Generally, wireless router devices usually contain multiple data encryption methods, and almost all encryption technologies such as WEP and WPA are included, d-Link DI-624 + A wireless router is no exception. When you enable the wireless encryption function of a wireless router device, click the "Homepage" tab in the background interface, and click the "wireless network" option in the left-side list area of the corresponding tab, then, in the display area on the right of the option, find the "security mode" project, and then click the drop-down button on the right of the project, select "WEP" or "WPA" from the drop-down list that will pop up later (as shown in). Of course, you can use other encryption technologies.

After selecting the appropriate security encryption option, set the corresponding access password in the password box below, click the "execute" button, and save the above settings, finally, restart the wireless router to enable the wireless encryption function of the wireless router.

When we try to access the wireless network in a normal workstation in the future, as long as you double-click the wireless network card device with the mouse, the workstation system will automatically pop up the connection dialog box (as shown in ), we are required to enter the above set wireless network encryption password. After the password information is entered correctly, click the "OK" button, so that we can safely perform wireless network transmission operations.


Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.