Careful router, national Internet emergency center issued an alert
On October 18, March 28, the national Internet emergency response center published the "Overview of Internet network security situation in October 2013", showing:
Vro products of multiple vendors, such as D-LINK, Cisco, Linksys, Netgear, and Tenda, have backdoors. Hackers can directly control the vro and initiate DNS hijacking, information theft, phishing, and other attacks, directly
without stopping communication. On this basis, another computer is used to steal encrypted data packets and crack them. The specific device is as follows.
AP: D-LinkDWL-2000AP + A, responsible for setting WPA encryption information.
Wireless Client: notebook + D-Link DWL-G122Wireless Network CardTo ensure continuous WPA data communication.
Listening/cracking machine: Laptop + NetGear wagelist V2 wireless network card, used to capture and log onto
not easy to write, so as not to bring anything misleading.Then do Cisco's project, responsible for the function of the captive portal, a figure is two months, careless right, and then own the Netgear Extender project, busy before busy, a full nine months, small rookie always because of various problems to get the burn, Will because can not think of the solution and distracted, that period of time, overtime is simply a routine, if one day did not work
, general operating systems cannot provide the best performance and security. The dedicated Cisco Secure pix_blank "> firewall is designed for security and high-performance protection. NetGear fr328s_blank "> Firewall Fr328s built-in _ blank> Backup serial port _ blank "> the firewall integrates the routing function to provide users with Internet network sharing through cablemodem or dslmodem. It has 8 built-in 10/100 M Adaptive Ethernet Switchi
.
Linux services ):FirstbootThis service is unique to the installation process of Fedora. It only needs to execute a specific task once when it is started for the first time after installation. It can be disabled.
Linux services ):GPMTerminal mouse pointer support (no graphical interface ). If you do not use a text terminal (CTRL-ALT-F1, F2..), close it. However, I enable it at runtime Level 3 and disable it at runtime Level 5.
Linux services ):HiddSeeBluetooth.
Linux services ):Maid, hpi
transport layer generally goes through the transmission connection establishment phase, the data transmission phase, and the transmission connection release phase to complete a complete service process. in the data transmission stage, there are two types of data transmission: general data transmission and accelerated data transmission. The transport layer service is divided into five types to meet the different requirements of transmission quality, transmission speed, and transmission cost.
Pro
cainiao can learn.
1. Create an experiment environment
Before we begin, our first step was to build an experimental environment where you could not use others' networks to crack your work. This would violate the law and be an immoral act. To build a wireless network platform in an experimental environment, Wireless AP is indispensable. In addition, three laptops with wireless NICs can also be used on desktops with wireless NICs) A simple network can meet the requirements. Figure 4 shows the n
Linux security.For the first startup:Display settings -- display settings are automatically tested and set. Resolution and refresh rate may be significantly different from your typical settings. You only need to log on with the first started process and then modify the resolution.Firewall-it is recommended that you ignore Internet connections to learn how to use your firewall or you already have a hardware router/firewall (such as D-Link and Netgear
Ubuntu ADSL dial-up Internet access
I have been connected to the Internet through Wireless wifi connected to ADSL at home. Recently, I have destroyed the NetGear wireless router, so I have to use wired cable for the time being.
In Ubuntu Linux, you can also directly use ADSL dial-up for Internet access.1. Connect the device
There is nothing to say about it. Generally, it is the on-site service of China Unicom. The telephone line is connected to the
to the installation process of Fedora. It only needs to execute a specific task once when it is started for the first time after installation. It can be disabled.
Linux services ):GPMTerminal mouse pointer support (no graphical interface ). If you do not use a text terminal (CTRL-ALT-F1, F2..), close it. However, I enable it at runtime Level 3 and disable it at runtime Level 5.
Linux services ):HiddSeeBluetooth.
Linux services ):Maid, hpiod, hpssdHP printer support is available in Linux, includ
3EnableIt is at runtime Level 5CloseIt.
Hidd
SeeBluetooth.
Maid, Hpiod,Hpssd
MaidThe Service supports HP printers in Linux, includingInkjet, deskjet, officejet, photosmart, business inkjet, and PartLaserJet Printer. This is an HP Linux Print project sponsored by HP (HP LinuxPrintingProject. If you have a compatible printerEnableIt.
Iptables
It is a LinuxStandard firewall (software firewall ). If you connect directly to the Internet (such as cable, DSL, T1), we recommend that youEnableIt. If you
Report The For Client (10.6.65.181) Host was up (0.00086s latency). Not shown:997 filtered portsport state service21/tcp closed ftp22/tcp open ssh443/tcp closed Httpsmac address:00 : 0c:29:8c:61:1f (VMware) Nmap done:1 IP address (1 host up) scanned in 31.43 seconds[[emailprotected] ~]# nmap-o 10 .6.65.181Starting Nmap 5.51 (http://nmap.org) at 2015-09-19 00:47 cstnmap Scan report for client (10.6.65.181) Host was up (0.00079s latency). Not shown:997 filtered portsport state service21/tcp clos
current settings to restore the parameters of the password is not possible. To be able to log on to the wireless router again, all previous configurations must be emptied. The specific method is as follows.
Small tip:
I have introduced to you how to use the wireless router system vulnerabilities to modify the Netgear product login management password, interested readers can search IT168 Family network channel related articles.
The first step: conn
signals sent out to form a WiFi share of the Internet coverage. According to the different power, the network coverage degree is also different, the general wireless AP's maximum coverage distance can reach 400 meters.
The extended AP is what we often call a wireless router. Wireless routers, as the name implies is a wireless coverage of the router, it is mainly used for users to the Internet and wireless coverage. Through the routing function, we can realize the sharing of Internet connection
the internet and browse bad content of the site, generally through the wireless router access control function to set. For example, through the Domain name filter (URL filtering) function can control the Internet date, time, set to prohibit access to the site keyword. In the purchase of wireless router products, it is recommended to try these features hands-on, because in some low-end products only provide a simple domain name filtering function. 5. Price Price is to buy any product need to
simple, because we need to enter the router settings related parameters, such as filling in the Internet account and password and open no line by the function, etc. Therefore, you must use a network cable to connect the computer before you can enter the router setup interface.
The above line is connected, we turn on the computer, then you can enter the router set up, how to enter the router's internal settings, you can see the router Shell tag has a clear label. Generally speaking, the default
1 802.11ac can't give you a gigabit level (gigabit) throughput
Although the WiFi consortium announces that it can theoretically achieve the throughput of 1.3 Gbps, it is twice times more than 802.11n. means that the network can simultaneously support the transmission of high-definition quality video streams to multiple devices. In fact, you can't see 802.11AC theoretically 1.3 Gbps throughput unless you're testing a lab rather than your office, and to achieve the highest speed you need to suppo
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.