the NIC performance. If the change becomes unstable, cancel the cancellation.
Macaddr_acl = 1 #0: Allow access to MAC addresses not listed in the hostapd. deny file; 1: Allow access to only the MAC addresses listed in the hostapd. accept file.
Accept_mac_file =/etc/hostapd. accept # specifies the location of the hostapd. accept file.
Deny_mac_flie =/etc/hostapd. deny # specifies the location of the hostapd. deny file.
Auth_algs = 3
Ieee80211n = 1 # If it is n, the parameter is 1; othe
software itself. You cannot use this method again !!), After that, press "Apply" to reactivate the instance !!
10. Create an XP boot disk XP boot disk
Insert the disk into the disk --> right-click --> select format --> select to create a MS-DOS boot disk
11. XP Automatic shutdown If it cannot be automatically shut down
Control Panel --> power --> display --> screen saver --> Power Management --> APM checkThis should wo
activity, it is awakened and enters the full voltage state.
(7) encryption of WiFi
WPA is short for Wi-Fi Protected Access (Wi-Fi protection access). It is a data encryption specification for wireless networks. It improves the security of WEP by using the Extensible Authentication Protocol (EAP), and improves the security of data transmission through an encryption method.
WPA uses the 802.1X Authentication
Let's look at how to set up the Network Wizard to guide you through the process of setting up the security key. Click the Start button-and then click Control Panel-to open set up network. In the search box, type Network-and then click Network and Sharing Center-"Set up a new connection or network"-"set up a new network."
The encryption method of wireless network
There are currently three types of wireless network encryption: WI? Fi Protected Access (
previous generation of wireless devices do not need to worry that existing devices will be eliminated.
In terms of security, D-link dwl-g122 supports Wi-Fi Protected Access (WPA), provides the necessary security protocols and tools to provide confidential communications to you and other wireless users, such as access to sensitive information or dynamic encryption of data transmission. WPA authenticates us
workplace network"-- Next-"Virtual private network Connection", follow the instructions to complete the following.
The actions in Vista are: Select Control Panel from the Start menu (or select Control Panel from Start menu in the Classic start). Choose to create a connection or network, double-click Connect to Workplace, select Use my Internet connection (VPN), and then follow the instructions to complete the following.
Set up wireless encryption
Each home or small office wireless network re
encryption protection of data files to intercept, Then the local data file sent out will disclose the privacy information.
If we do not want these data files to disclose privacy information, then we should encrypt the target data files before transmission, or take other security measures to ensure that those who do not know the decryption method of the workstation users can not access the specific data content.
At present, in the wireless network using ieee802.11b/g communication standard, in
, its products into series, high and low prices are available, quotations and purchase of all available, you can go to the IT168 network channels to view. 3Com this year in the United States held in the CeBIT exhibition at the Grand launch of the 802.11G standard fully compatible with the new wireless product series--3com OfficeConnect 802.11g Wireless solution. Includes the following three Wi-Fi certified devices:Wireless access points: This new access point is not only compliant with the 802.1
reducing the trouble for others to use. It should be noted that, after hiding the network, Windows Vista users need to set the connection device to "connect even if the network is not broadcast ". You can find this option in the Network Connection Properties in the "manage wireless networks" window.
Step 3: Configure "security mode ". A new vro can have up to three options: WEP, WPA, or wpa2. The difference between the three options is that WEP is an
others, thus reducing the trouble for others to use. It should be noted that, after hiding the network, Windows Vista users need to set the connection device to "connect even if the network is not broadcast ". You can find this option in the Network Connection Properties in the "manage wireless networks" window.
Step 3: Configure "security mode ".A new vro can have up to three options: WEP, WPA, or wpa2. The difference between the three options is th
protection measure for wireless routers. Data Encryption in radio waves ensures the security of transmitted data information. Generally, wireless routers and APs have the WEP encryption and WPA encryption functions. WEP generally includes 64-bit and 128-bit encryption types, you only need to enter 10 or 26 hexadecimal strings as the encryption password to protect the wireless network. The WEP protocol encrypts data transmitted wirelessly between two
routers will ask us whether to hide or publish this SSIS. No matter which word is used, it means the same. Once this function is enabled, your network will not appear in the "available network" list of others, thus reducing the trouble for others to use. It should be noted that, after hiding the network, Windows Vista users need to set the connection device to "connect even if the network is not broadcast ". You can find this option in the Network Connection Properties in the "manage wireless n
My Ubuntu11.04WPA encrypted wireless Internet access solution: Modify/etc/network/interfaces: ifacewlan1inetdhcpwpa-driverwextwpa-ssidTP-LINK_043Awpa-pskbda9a9d988e666a78889089a098c8689a where wpa-psk is created by wpa-passphrase [ssid] [passphra
My Ubuntu 11.04 WPA encrypted wireless Internet access solution:
Modify/etc/network/interfaces:Iface wlan1 inet dhcp
, BSSID, capabilities, and level attributes. The SSID number is an identifier of the connection, for example, we often see TP_LINKXXX.
Capabilities stores related encryption information, such as WEB and WPA. level indicates the signal degree.
4. When obtaining the connection status, wifiManager is called. getWifiState () or wifiInfo. when getSupplicantState () is used, the state value we get is COMPLETED after the user has successfully authorized it
networks.
Wired peer-to-peer confidentiality (WEP)
RC4 symmetric encryption technology is used at the link layer. The user's encryption key must be the same as the AP's key to allow access to network resources, thus preventing unauthorized user listening and unauthorized user access. WEP provides a 40-bit (sometimes called 64-bit) and 128-bit key mechanism, but it still has many drawbacks. For example, all users in a service area share the same key, if a user loses a key, the entire network is
to disable the DHCP function.
Wireless Network Security Settings II: Encryption
Nowadays, many wireless routers have the wireless encryption function, which is an important protection measure for wireless routers. Data Encryption in radio waves ensures the security of transmitted data information. Generally, wireless routers and APs have the WEP encryption and WPA encryption functions. WEP generally includes 64-bit and 128-bit encryption types, you o
invisible to others. Vrouters of different brands use different methods to provide this function. On Some routers, these routers will ask if we want to "broadcast" The SSID. Some routers will ask us whether to hide or publish this SSIS. No matter which word is used, it means the same. Once this function is enabled, your network will not appear in the "available network" list of others, thus reducing the trouble for others to use. It should be noted that, after hiding the network, Windows Vista
Encryption in radio waves ensures the security of transmitted data information. Generally, wireless routers and APs have the WEP encryption and WPA encryption functions. WEP generally includes 64-bit and 128-bit encryption types, you only need to enter 10 or 26 hexadecimal strings as the encryption password to protect the wireless network. The WEP protocol encrypts data transmitted wirelessly between two devices to prevent illegal user eavesdropping
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.