expose the system and data to unknown, untrusted "outsiders."
According to the analysis of real-world Wi-Fi activity on a quarterly basis, network Chemistry's Wireless Threat Index, most clients have contacted unknown access points. This may happen accidentally, especially when overly-friendly Windows XP is automatically connected to any available network. Of course, users may also deliberately do this if they are connected to a neighboring enterprise network to circumvent a company's strategy
role. We usually say that the antenna gain, the gain of the unit of measurement for DB, the greater the gain, the better the signal transceiver. At the same time, the antenna gain size is not only related to the size of the antenna, but also has a great relationship with the internal materials and workmanship of the antenna. At present, the products in the market are mainly 2dB and 5dB products, but some products in the antenna claimed to be 5dB products, but the actual workmanship and material
Recently played a number of common wireless routers on the market, the feeling said, convenient for users to buy later. Also counted as a little humble of a diving veteran. I am a player who prefers peer-to-peer software. Like to squeeze 1K of bandwidth. So the stability of the router requirements are also relatively high. In this I also mainly talk about routers in full load peer-to-peer software stability.
1. Linksys Cisco WRT54GC
Factory style, b
lot of network names, which are the service settings identifier (SSID). The default SSID is typically associated with the router's brand. For example, if you buy Tp-link, your SSID must begin with Tp-link. A hacker can easily know your router brand through your SSID. You can change the SSID to a name you like in a line-free management interface, at least to some extent to conceal your wireless route. Modifying the SSID is the easiest way to do it, and we can do better by turning off the SSID br
Services, network connection Management Services, HTTP Transport encryption services, are back on.
22 computer software started successfully, the phone has been getting IP
WIN7 can be a different encryption method to try.
23-compatible wireless network card
Atheros ar5xxx/ar9xxx cards; Driver version 8.0.0.238;
Broadcom 4310-series (in many Dell laptops);
Broadcom 4321ag/4322ag/43224ag WLAN Adapter; Driver version 5.60.18.8 (here);
D-link airplus G dwl-g510 Wireless PCI adapter;driver ve
Atheros ar5xxx/ar9xxx cards; Driver version 8.0.0.238;
Broadcom 4310-series (in many Dell laptops);
Broadcom 4321ag/4322ag/43224ag WLAN Adapter; Driver version 5.60.18.8 (here);
D-link airplus G dwl-g510 Wireless PCI adapter;driver version 3.0.1.0;
D-link DWA-140 rangebooster N USB adapter;driver version 3.0.3.0;
Dell 1510 Wireless N adapter; Broadcom version;driver 5.60.18.8;
Intel 5100/5300; WiFi Link 1000 BGN; Driver version 13.0.0.107;
Linksys
key. For ordinary users, it is not necessary to understand the concept of SSID and security key to achieve a secure connection, and the user's security key can not be cracked by outsiders, because it is randomly generated, and most importantly, users do not have to memorize lengthy wireless encryption password, avoid the trouble of forgetting passwords.
Insufficient
As described in the previous article, WPS is an optional certification project launched by the Alliance of WiFi organizations, s
As with other devices, routers can also fail. Before you decide to buy a new router, why not look at the nine tips that the author recommends for you? Now there are many models of wireless routers on the market, and these routers have become an important part of home and office space, assigning wireless internet to our users, and allowing us to access network services through our local network. Administrator access: Make sure you are logged into the router's control panel because all configura
. Because generally speaking, the smaller the office size, the fewer users, the lower the risk faced.
As a result, simple packet-filtering firewalls are sufficient for small offices, such as those that are randomly brought by many DSL or cable routers. These include broadband routers from companies such as D-link, 3Com, Netgear and Linksys. In addition, WatchGuard Firebox Soho, Symantec Firewall 100, global technology company Gnat, NetScreen and Sonic
the router, on the WRT54G wireless router, which was sold by Cisco's Linksys, to support the highest 54Mbps connection speed. Soon enthusiasts found that WRT54G's firmware was based on Linux, but using Linux as a basic condition for the operating system was that the source code had to be made public, and after that, Cisco was forced by public pressure to disclose the source code of the WRT54G firmware. As time went on, many wireless device enthusiast
EtherLink Network card
Iprb:intel Pro Network card
Nei:10baset NE2000 compatible PCI nic (Linksys, at/lantic)
Note: There is a more detailed description of the problem on the FAQ.
4. DHCP Configuration Issues
1) Problem Description:
In some environments, laptops or desktops need to configure DHCP rather than fixed IP. The author referred to the Solaris IP Services Manual "How to Configure a Solaris DHCP Client" method, but did not succeed.
The
. In half, passwords that are less than 8 characters are considered to be easily cracked. can use 10, 12 characters as the password, 16 of course better. It's safer to keep your password as long as possible without being too long and difficult to type.
2, do the Border protection
Not all security issues occur on the system desktop. Using an external firewall/router to help protect your computer is a good idea, even if you have only one computer.
If you're looking at the low end, you can buy
Driven
Download
Linksys wusb600n (Dual-band USB adapter)
a/b/g/n
ralink_usb2870
Download via Mypeek
Belkin f5d8013 (Wireless N Notebook Card)
b/g/n
ralink_cardbus2860
Download via Mypeek
Belkin f5d8073 (Wireless N ExpressCard)
b/g/n
ralink_cardbus2860
Download via Mypeek
Wireless card based on MarvellMarvell has developed a driver that can work with the OmniPeek
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.