Alibabacloud.com offers a wide variety of articles about how to secure unsecured wireless network, easily find your how to secure unsecured wireless network information here online.
WAPI is a wireless security protocol standard developed by China. It is more secure than other standards. Here, WAPI is not the focus of this article, but wireless network security is the center of our discussion. Security first, and others are second. I hope this article will give some inspiration to the
NAP is a Windows mechanism that ensures that only computers that meet security requirements allow access to the network. Using NAP can make the network more secure. Unfortunately, when Microsoft launched this mechanism for the first time, NAP only checked some configuration settings and was difficult to execute. However, the NAP has been improved, and Windows Vis
network more secure and reliable.
Home Network Security Settings 1. Modify the user name and password (do not use the default user name and password)
Generally, a home wireless network accesses an external network through a
can also design a more imaginative office compartment for the company. In addition, we may use the existing wireless network, understand the convenience and speed brought by Wi-Fi cameras, Wi-Fi Mobile Phones, Wi-Fi projectors, and other devices.
All these applications are obviously more attractive than the wireless products in the original advertisements. But h
Wireless network technology allows enterprises to greatly expand the computer usage of their employees, especially for employees with high mobility, such as healthcare, business work, or running around in factories.
The main difficulty in deploying wireless networks is security issues, especially for companies that must process sensitive information in specific i
wireless network more secure and reliable.
1. Modify the user name and password (do not use the default user name and password)
Generally, a home wireless network accesses an external network through a
from eavesdropping. In the 802.11 standard, two encryption methods can ensure data transmission, namely WEP and WPA.
WEP (Wired Equivalent Privacy ):
Wired Equivalent confidentiality: A Shared Key RC4 encryption algorithm is used to ensure secure data transmission over wireless networks. The key length is initially 40 characters (5 characters ), later, it was increased to 128 characters (13 characters). So
encryption and WPA encryption functions. WEP generally includes 64-bit and 128-bit encryption types, you only need to enter 10 or 26 hexadecimal strings as the encryption password to protect the wireless network. The WEP protocol encrypts data transmitted wirelessly between two devices to prevent illegal user eavesdropping or intrusion into the wireless
With the popularity of wireless networks, more and more home users have wireless routers and wireless network cards, through the combination of wireless devices can let us at any point in the home to leave the network cable, enjoy
Wireless network technology is growing, but how can we use encryption protocols to ensure the security of wireless networks? This shows us how to set security.
With the increasing maturity of wireless communication technology, the price of wireless communication products is
to do the following:
Misuse of the company's Internet bandwidth, free access to the network, manufacturing traffic, so that legitimate users of access slowed. (Computer science)
Take your network as a springboard for attacking other computers or doing illegal acts, such as downloading or distributing pirated software, pirated music or child pornography.
Watch, copy, modify, or delete files on the comput
-Fi Mobile Phones, Wi-Fi projectors, and other devices.
All these applications are obviously more attractive than the wireless products in the original advertisements. But how can we deploy a set of reliable, secure, and stable wireless networks in the office? Is it the same as the home wireless
How can we make the home network more secure? In particular, users who use wireless broadband routers often experience virus attacks, network users, and account theft. In principle, we introduced the security threats faced by wireless home networks and how to reinforce the s
used by individuals or companies. If you are using WEP wireless network encryption technology, if you pay great attention to the security of your network, do not use WEP as much as possible in the future, because it is really not very secure.
WPA-PSK of wireless
to avoid their own wireless local area network by others at random. The encryption process is simple, just find the Security Settings menu, and then set the wireless encryption for each SSID, as shown in the following illustration:
When the settings are complete, users can suggest that you choose WPA/WPA2 level encryption from the list of
using a wireless router to ensure the security and stability of the network.
In addition to using UPnP to solve the problem of extranet and intranet, we also need to use the DMZ (Demilitarizedzone) to solve the problem that the external network cannot access the Internal network server after installing the firewall.
network devices. Such people often lead to the collapse of the deployed wireless network technology, lisa Phifer, vice president of Core Competence, a network management consulting firm in Chester Springs, Pennsylvania, said.
"Wireless
methods used by individuals or companies. If you are using WEP wireless network encryption technology, if you pay great attention to the security of your network, do not use WEP as much as possible in the future, because it is really not very secure.
WPA-PSK of wireless
of your router or repeater will overlap with that of your neighbor, if they overlap, it will cause a conflict and affect your network transmission. Once this happens, you need to set a different frequency band (also called Channel) for your router or repeater than the neighboring network ). Select a suitable vro or repeater based on your own family, and select the place where it is placed. Generally, it is
efficiency of the network are greatly improved, therefore, higher network capacity can be achieved. For example, in a high-density urban network, The Strix wireless Mesh network can reduce mutual interference between neighboring users using the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.