Solving the security risks of computer wireless Routing

Source: Internet
Author: User

With the development of the routing industry, computer wireless routing is widely used. Here we mainly analyze how to solve the security risks of computer wireless routing. Wireless Networks have more security risks than wired networks. Because the computer's wireless routing signal is not limited by space, it only needs to be within its coverage range and can be easily connected.

Therefore, it is extremely important to enhance the security of wireless networks. When talking about security, everyone has their own solutions. In wireless networks, the author believes that in addition to regular security measures, computers in the network should also be hidden from wireless routes to avoid being searched by intruders.

1. Hide wireless computer routes

There are many methods to make your computer's wireless routing invisible. Here we will introduce some common methods.

Doscommand Method

For wireless routing of computers in the LAN, open the Command Prompt window and enter "net configserver/hidden: yes" at the prompt to achieve stealth.

Cancel sharing

Open the Properties window for the local wireless connection, and select the Microsoft network file and printer sharing option under "Use the following items for this connection" in the "General" tab, then, click the detach button to unmount the file and print sharing service, which can also be invisible.

Group Policy Method

For Windows2000/XP users, you can also use group policies to solve the problem. Run "gpedit. msc open the Group Policy, find "Computer Configuration> Windows Settings> Security Settings> Local Policy> User Rights Assignment", and find "Access this computer from network" in the right window ", delete all users.

Ping prohibited

For Windows XP SP2 users, we can also use the firewall to solve this problem. Hacker intrusion usually uses the Ping command to determine whether the host is online. We can Ping him. Go to the control panel, Open Windows Firewall, switch to the "advanced" tab, select wireless connection in "network connection settings", and click "set" to switch the window to "ICMP ", disable both incoming and outgoing requests. When you Ping the server, you cannot determine whether the host is online.

Ii. Hiding computer wireless routes

Many users generally enable SSID broadcast to facilitate client connection. In fact, if the client is relatively fixed, we don't need it at all. We should stop broadcasting it to make it invisible, so as to avoid illegal computer access within the range of signal coverage.

Different devices use the same method to Disable SSID broadcast. You only need to log on to the management interface and find the SSID broadcast settings to disable it. After disabling SSID broadcast, you only need to manually add the first network and enter the SSID name when the client needs to connect. Although the above method does not absolutely guarantee the security of the wireless network, hiding the corresponding devices will prevent most illegal intrusion.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.