With the development of the routing industry, computer wireless routing is widely used. Here we mainly analyze how to solve the security risks of computer wireless routing. Wireless Networks have more security risks than wired networks. Because the computer's wireless routing signal is not limited by space, it only needs to be within its coverage range and can be easily connected.
Therefore, it is extremely important to enhance the security of wireless networks. When talking about security, everyone has their own solutions. In wireless networks, the author believes that in addition to regular security measures, computers in the network should also be hidden from wireless routes to avoid being searched by intruders.
1. Hide wireless computer routes
There are many methods to make your computer's wireless routing invisible. Here we will introduce some common methods.
Doscommand Method
For wireless routing of computers in the LAN, open the Command Prompt window and enter "net configserver/hidden: yes" at the prompt to achieve stealth.
Cancel sharing
Open the Properties window for the local wireless connection, and select the Microsoft network file and printer sharing option under "Use the following items for this connection" in the "General" tab, then, click the detach button to unmount the file and print sharing service, which can also be invisible.
Group Policy Method
For Windows2000/XP users, you can also use group policies to solve the problem. Run "gpedit. msc open the Group Policy, find "Computer Configuration> Windows Settings> Security Settings> Local Policy> User Rights Assignment", and find "Access this computer from network" in the right window ", delete all users.
Ping prohibited
For Windows XP SP2 users, we can also use the firewall to solve this problem. Hacker intrusion usually uses the Ping command to determine whether the host is online. We can Ping him. Go to the control panel, Open Windows Firewall, switch to the "advanced" tab, select wireless connection in "network connection settings", and click "set" to switch the window to "ICMP ", disable both incoming and outgoing requests. When you Ping the server, you cannot determine whether the host is online.
Ii. Hiding computer wireless routes
Many users generally enable SSID broadcast to facilitate client connection. In fact, if the client is relatively fixed, we don't need it at all. We should stop broadcasting it to make it invisible, so as to avoid illegal computer access within the range of signal coverage.
Different devices use the same method to Disable SSID broadcast. You only need to log on to the management interface and find the SSID broadcast settings to disable it. After disabling SSID broadcast, you only need to manually add the first network and enter the SSID name when the client needs to connect. Although the above method does not absolutely guarantee the security of the wireless network, hiding the corresponding devices will prevent most illegal intrusion.