1. Use UPnP features
UPnP (Universalplugandplay, Universal Plug and Play) is a technology based on TCP/IP protocol used in the Internet and LAN. For users who use the WinXP operating system, the UPnP support module is not installed by default, so we need to install it manually. First, open Add/Remove Programs and go to Windows build. Then, in the Windows Components Wizard, tap Network Services-Verbose, and then select the Universal Plug and Play chec
wireless network, as a large enterprise network administrator Lao Zhang has made the following steps of the wireless network adjustment and policy settings.
To change the password for the AP Default user name: Because many wireless
potential hidden trouble, do a good job in the prevention of failure, that is the saying, "Nip in the bud"? Visible, Basic maintenance is the most important maintenance work.
1 Basic maintenance is the fundamental guarantee of the equipment intact
According to the nature of the work of classification, basic maintenance can be divided into clear network and daily maintenance?
Clearing the net is to focus on online problems, mainly because of engine
Reprint: http://www.iplaysoft.com/wifi-slow-solution.htmlX-forceReasons for reprint: This paper classifies and presents a variety of solutions, and details the reasons. Simple and clear, can be used as a reference scheme.Article content:Holiday stay at home is the most cool is comfortable on the internet, but a lot of friends have met the mobile phone, laptop through WiFi wireless internet extremely slow, basic card can not open any website, but the d
faulty.
First, check the version of the vro system. After reading the wireless router specification, check whether this function supports the vro system of this version. Vro systems usually have many versions, each of which supports different functions. If your current software version does not support this function, you should find the corresponding software and upgrade it first.
Click the "System Tools" option of the
speed of wireless connection. After a successful installation of the wireless broadband router, you should proceed to install the Wireless Interconnect Peripherals (PCI) card. If you are using an Intel? Centrino? Mobile computing, you don't need to install any other network adapters. Next, turn
display has been connected, but easier to automatically disconnect, on the phone may appear to be unable to go online at this time please to the signal strong area to try.3. Some public places, such as McDonald's, airport, etc., connected to the wireless network, want to go online also need to obtain additional user name or authentication code. When you open any page, it links to another interface and asks
"Change computer settings" option;
6. Enter the "Computer settings" option, the mouse to select the next "wireless" to confirm the wireless switch and flight mode switch state, the correct setting;
7. Set up, exit the Setup interface, watch the desktop in the bottom right corner of the wireless icon status, if the Red Fork has been
As we all know, no network is completely secure, even with all the protective measures in use. The goal of any security plan is to reduce the risk to an acceptable level based on demand and cost. For a home wireless network, as long as the following four steps, basically can protect the basic wireless
lot of network names, which are the service settings identifier (SSID). The default SSID is typically associated with the router's brand. For example, if you buy Tp-link, your SSID must begin with Tp-link. A hacker can easily know your router brand through your SSID. You can change the SSID to a name you like in a line-free management interface, at least to some extent to conceal your wireless route. Modif
This tutorial aims to help you understand how to crack the wireless network and enhance your network security. Do not use it for illegal purposes.
In addition, there are too many ways on the Internet to know who you are. Do not think that no one will find you using others' AP.
Here is a detailed tutorial on how to use bt3 backtrack 3 to crack the WEP of a
, directly click on the bottom of the "Change computer settings" option;
6. Enter the "Computer settings" option, the mouse to select the next "wireless" to confirm the wireless switch and flight mode switch state, the correct setting;
7. Set up, exit the Setup interface, watch the desktop in the bottom right corner of the wireless
encountered some such as: Why the total puppet, why the speed of slow and so on, but there are many people think. As a difficult consumer is not the start? Don't believe it, there's a friend like this. Take a look at what's going on.
Two kinds of malpractice analysis and solution
The other one is the ieee802.11g transmission rate is low. Here's a look at the drawbacks of analysis and solutions. The first mention of the problem is that there are two possibilities for a confusing
transmission distance and stability of the effective guarantee that some high-end wireless routers will use two antennas, in general, more than a single antenna products in the transmission performance is more secure, if possible we try to choose a dual antenna or more antenna wireless router.
In addition, the antenna gain size on the impact of data transmission is also very important, ordinary routers ge
monitor the traffic in the wireless network and check the network and troubleshoot.
Difference between promiscuous and monitor (rfmon)In a traditional finite network, we know that NICs can work in two modes: Common and hybrid. In promiscuous mode, we can directly listen on Intranet traffic over Ethernet. At this time,
Make use of a networked laptop to set up its wireless network share so that many other laptops can have wireless internet access.
1. A notebook computer to ensure that wireless Zero Configuration service has been started
Click Start---Run---input services.msc--Confirm
This article mainly introduces in detail how to handle access failures in wireless networks. Here we will introduce four main processing methods in detail.
After wireless network access failure occurs, many of my friends feel that they are not ready to start. This article will introduce four methods to deal with such failures. I hope this article will help you so
after the handset searches creates wireless network "Mywlan", uses the key "12345678" to connect the test.
This attachment is a batch file that automatically creates a wireless network and can also be used. Download to extract the file first, then right-click the file select "Edit", set the
Iwconfig
Iwconfig is one of the User-layer configuration tools of wirewirelessextensions (LWE. LWE is a tool for wireless network configuration in Linux, including Kernel support, user-layer Configuration tool, and Driver Interface Support. At present, many wireless network cards support LWE, and mainstream Linux versi
Colleagues often ask me how to prevent router intrusion, rub the net.My opinion is to turn off the remote prevention, or change to a special port number, MAC address filtering,Disables the broadcast of the SSID (broadcast of the wireless network name) Wpa-psk.Introduction of a software, you can quickly see the network
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.