Analysis of three major wireless encryption technologies: preventing WiFi from leaking out of the wall (1)

Source: Internet
Author: User

When you open your laptop and search for wireless networks in the surrounding area, you can find more or less a few wireless hotspots without any security protection measures. These unencrypted wireless networks are equivalent to free public WiFi hotspots. They are the favorites of the "Net" family, and these "Net users" are not needed in the light of white, with the principle that cheap bandwidth is necessary, you not only share your wireless network bandwidth, but also steal your personal data with your hands. Therefore, it is imperative to encrypt wireless networks.

When we ask these "Public WiFi hotspot providers" why not encrypt the wireless network? The answer is that you do not know where to set wireless encryption, or you do not know which wireless encryption method to choose, or you do not know about wireless encryption. If you have the same questions, you must not miss the content in the following sections. After reading this article, you can easily choose the wireless encryption method and have a safer wireless network environment.

It's actually easy to encrypt wireless networks.

Encryption for wireless networks is the most basic setting of wireless routing. No matter what brand of wireless router you use, you only need to enter the default IP address of the wireless route in the IE address bar, which is usually marked on the nameplate at the bottom of the wireless route), such as 192.168.1.1, and then log on to the Web configuration interface of the wireless route, you can find the wireless encryption settings in the "wireless security" menu.

Set in the Web configuration interface

In addition to setting wireless encryption through the Web configuration interface, many new wireless routes can also be set to wireless encryption through a random installation disc. For novice users, such a wizard disc is very practical, the operation is simple and efficient.

Smart Installation Wizard

Based on the above introduction, I believe you have learned how to encrypt wireless networks. But how should we choose WEP, WPA, and WPA2 encryption methods? What is the difference between them? Can I just select one? Next, let's look at it.


Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.