1, the login router settings interface.
Open a Web browser, in the browser's address bar to enter the IP address of the router: 192.168.1.1, you will see the following image of the login interface, enter the username and password (username and password of the factory defaults are admin), click OK button.
2, after the login click on the left menu bar wireless Settings-Wireless security settings as shown in the following figure.
3, click the Wireless security settings ap
files. This is another valuable tool for THC contribution.
--------------------------------------------------------------------------------
#20 GFI Languard: A commercial network security scanner on a Windows platform
GFI Languard discovers a running computer by scanning the IP network, and then attempts to collect the operating system version and running applications running on the host. I've tried to collect service pack levels on Windows hosts, missing security updates, wireless access acc
WiFi Wireless access hotspot (AP) is available on Ubuntu systems or other similar Linux systems using HOSTAPD
In order to provide other wireless access to the network of equipment, such as notebooks, mobile phones to achieve wireless internet function. It is also the function of no line.
What is HOSTAPD
HOSTAPD is the user control's daemon for wireless access points (APs) and authorization servers (authentication servers).
She implements IEEE802.11 AP management, ieee802.1x/
the drivers wlan_wep, wlan_ccmp, and Wlan_tkip. The two drivers for wlan_ccmp and Wlan_tkip are only for WPA and 802.11i security protocols. I prefer WPA, which is better than WEP encryption from a security point of view.
Wireless network connectionNo line by the setting is very simple, since needless to say. I chose to use the WPA-PSK security type, so I set u
network is insecure. In addition, 40-bit keys are easily cracked today. Keys are static and need to be manually maintained with poor scalability. To improve security, we recommend that you use a 128-bit encryption key.
Wi-Fi protection access (WPA)
WPA (Wi-FiProtectedAccess) is a new technology that inherits the basic principles of WEP and solves the disadvantages of WEP. Because the algorithm for generati
The security of Wireless Access networks is a topic that people have always been concerned about. Many people may not understand the shortcomings of Wireless Access Networks in encryption technology. It does not matter. After reading this article, you must have gained a lot, I hope this article will teach you more things. In the wireless access network field, which has been accused of eavesdropping and illegal use, a new security technology has emerged. This is the "WPAWi-Fi protection access" d
wireless routers have the wireless encryption function, which is an important protection measure for wireless routers. Data Encryption in radio waves ensures the security of transmitted data information. Generally, wireless routers and APs have the WEP encryption and WPA encryption functions. WEP generally includes 64-bit and 128-bit encryption types, you only need to enter 10 or 26 hexadecimal strings as the encryption password to protect the wirele
Wireless AP or wireless router to provide dynamic IP addresses for hosts connected to the wireless network, others can easily use your wireless network 。
Therefore, disabling DHCP is necessary for personal or enterprise wireless networks, unless in public wireless "hot spots" areas such as airports and bars, the DHCP function should be enabled. Generally, under the "DHCP server" setting of the wireless router, set the DHCP server to "not enabled". This allows you to locate the wireless network
routers. Data Encryption in radio waves ensures the security of transmitted data information. Generally, wireless routers and APs have the WEP encryption and WPA encryption functions. WEP generally includes 64-bit and 128-bit encryption types, you only need to enter 10 or 26 hexadecimal strings as the encryption password to protect the Wireless Access Network. The WEP protocol encrypts data transmitted wirelessly between two devices to prevent illega
unauthorized user listening and unauthorized user access. WEP provides a 40-bit (sometimes called 64-bit) and 128-bit key mechanism, but it still has many drawbacks. For example, all users in a service area share the same key, if a user loses a key, the entire network is insecure. In addition, 40-bit keys are easily cracked today. Keys are static and need to be manually maintained with poor scalability. To improve security, we recommend that you use a 128-bit encryption key.
Wireless Security T
wireless devices in the signal range can be automatically allocated to the IP address, which leaves a great security risk. Attackers can easily obtain a lot of information about your vro through the assigned IP address, so it is necessary to disable the DHCP function.
2. wireless encryption
Nowadays, many wireless routers have the wireless encryption function, which is an important protection measure for wireless routers. Data Encryption in radio waves ensures the security of transmitted data i
A Wireless Broadband Router is one of the most commonly used routers. So I studied the performance characteristics of the Wireless Broadband Router. I would like to share it with you here and hope it will be useful to you. Our performance tests aim to present common topologies used by home and SOHO enterprise users. This includes connecting to the Internet with the network card, WPA encryption, Super G and other rate expansion modes through the WAN po
your network list.
Mac address self-protected by wireless network to protect network homes:
Each normal Nic has a unique Mac address. If you allow only the Mac address you know in wireless routing, it also greatly reduces the chances for external wireless network cards to enter the network. At present, almost all wireless routes have such functions, and their configuration is relatively simple. It is a convenient and effective self-protection method. However, some Mac addresses with intrusion
called 64-bit) and 128-bit key mechanism, but it still has many drawbacks. For example, all users in a service area share the same key, if a user loses a key, the entire network is insecure. In addition, 40-bit keys are easily cracked today. Keys are static and need to be manually maintained with poor scalability. To improve security, we recommend that you use a 128-bit encryption key.
Technical specifications for wireless networks-Wi-Fi protection access (
only crack WEP encryption, for the use of WPA-PSK/WPA2-PSKAES encryption wireless router is powerless, so as long as you choose the appropriate encryption method, it can prevent malicious network attacks.
Second, how can we prevent network attacks? The above describes the features of the "ENI" and it is easier to prevent network attacks.
All TP-LINK wireless routers support WPA-PSK/WPA2-PSK security when y
disable wireless security option to disable the wireless security feature.
B. If you need to enable wireless security, select one of the three security types on the page for wireless security settings.
This page provides three wireless security types: WEP, WPA/WPA2, and WPA-PSK/WPA2-PSK. Different security types, different security settings, we introduce the encryption method of
"Freewifi", wait for the user to actively click on the malicious WiFi connection.Attacks in this manner are often less efficient.Second Category:Set up a hotspot with the same name connected to your phone so that your phone automatically searches for that WiFi and connects to it.This approach is mainly focused on the open mode of hot, for example, WPA/PSK this encryption hotspot, unless you can master the original hotspot connection password, otherwi
, adjust the parameters based on the condition (-c is followed by the target channel 1 as an example). The target signal is very good: reaver-I mon0-B MAC-a-S-vv-d0-c 1 target signal common: reaver-I mon0-B MAC-a-S-vv-d2-t. 5-c 1 target signal: reaver-I mon0-B MAC- -S-vv-d5-c 1 learning started, and then it was a long wait. If the signal is good, you will be pleasantly surprised to find it when the Progress reaches 100% within 2-4 hours. Except PIN password breaking has extremely strict signal r
daily environments. In an urban environment with a radius of 100 meters, with the increase of various Wi-Fi devices, I can always find one or two signals:
Except for the Wi-Fi of carriers such as CMCC, all others are encrypted. There are two encryption methods: WEP and WPA and wpa2. WEP encryption is a primitive encryption method. Due to its design vulnerabilities, it can be completely cracked within one hour as long as the signal strength is suffic
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.