DaiwangIn fact, for the victim, there is no serious risk. Generally, it only uses the bandwidth of the network, which slows down the network speed. The Savvy hacker will notVroChanging any settings means that the victim is notified of unauthorized access to the changed route. This means that the victim is given a dead path, because the victim will certainly enhance the route security settings, this will keep you away from the Internet.
Here we will introduce several routing methods to prevent "network access". This method is suitable for beginners.
1. Reset the vro Login Password
No matter which brand of router, there will be a default account password at the factory. For example, the product of BUFFALO is the initial account root, the password is blank, and the TP-Link product is the initial account: admin Password: admin.
Once such a simple account and password are infiltrated, it is easy to be identified in a short time, or even tamper with the vro settings. Therefore, after purchasing a new vro, the first step is to reset the account and password to avoid being used by people who are interested.
It is not difficult to set the vro account and password. Generally, the vro provides this option in the System menu.
TP-LINK router change user name and password
Of course, some confused people often forget their passwords and accounts. If this happens, you only need to use the RESET key on the router body to restore the default settings. Guide: What should I do if I forget my vro password)
Ii. Modify the SSID
What is the SSID, And the SSID is all called Service Set Identifier. Chinese: Service Set ID. To put it simply, the SSID is the name of a wireless network. To connect to a wireless network, you must know the SSID to connect to it.
A wireless route has a default SSID. Generally, the wireless network is cracked and related to the SSID settings. For example, if the default ID exposes the product, model, or the changed ID contains personal information, the user may guess the login password and log on to your wireless network. So when you modify the SSID, you need to use more brains to make people guess.
Changing the default SSID name is a basic operation. Of course, you should pay attention to the new name when changing it. Try not to include too much information, such as china001 and bjhjyd.
Iii. Wireless Network Encryption
There are two types of wireless network encryption: WEP protocol wireless encryption and WAP protocol wireless encryption. Currently, in wireless networks that use IEEE802.11b/g communication standards, in order to improve network security resistance, wireless network encryption protocols widely used by common users include WEP encryption protocol and WPA encryption protocol. Introduction: What are the differences between wireless network encryption protocols (WEP) and WAP/WAP2)
In general, there is no good way to crack an encrypted network, except for software computing. Therefore, you only need to set the encrypted password to a more diversified one with a longer length. It works well when combined with numbers, English letters, and characters ..
Vro Encryption
Iv. MAC address filtering
Each network device has a unique MAC address ID, which is generally in the format of 00-D8-A1-40-9F-62. You can use it to attack attackers. Many routers allow you to set a range of MAC addresses to access the Internet. In this way, you can tell the wireless routers which are the MAC addresses of your own PCs.
How can I view the MAC address ID of my computer Nic? In Windows, click "Start Menu" and select "run". In the displayed dialog box, enter "cmd". After you press enter, the command line window appears. In the command line window, enter ipconfig/all. Find the line named "Physical Address", and the displayed Address is the MAC Address of the device.
Vromac MAC Address Settings
After the preceding vro settings, the "network" operator is generally unable to implement the configuration. As a newbie, do you need to protect your network? Keep the network away from you.