Security for Windows XP system wireless Networks

Source: Internet
Author: User
Tags connect

The use of Win XP has been quite popular, but for the win XP system, how to do wireless network security settings, we may not understand, then how to set it?

Although early wireless networks have not been developed for special reasons, they have not been able to attract the attention of the network for quite a long time. And now with the wireless price offset, entered the ordinary people's home, more and more netizens use the wireless network. Wireless security has increasingly aroused concern in all circles.

The objective cause of the instability of wireless network is still virus and malicious users, which are: service embezzlement, data stealing, data destruction, and the normal use of wireless network has a great impact. Below will be step-by-step for the reader to answer!

Still should be the sentence above: "Simplicity is synonymous with insecurity," the biggest factor in the wireless security risk of XP, is precisely from the most easy-to-use features of XP-"Wireless 0 Configuration" (WIRELESS? ZERO? CONFIGURATION), because the access point can automatically send receive signal, so XP client once entered the wireless network signal coverage, you can automatically establish a connection, if you enter the range of wireless network signal coverage, the system can automatically contact the nearest access point, and automatically configure the network card to connect , after completion, in the "Available network" will appear in the established connection SSID, because many manufacturers use the network card half MAC address to the default name SSID, so that the SSID default name can be inferred, the attacker knows the default name, at least connected to the access point of the network is easy.

The main measures are three:

1, enable the wireless device does not broadcast function, do not carry out the spread of SSID.

This feature needs to be found in the hardware device's options, which will close the network when enabled,

The person who wants to connect to the network at this time must provide an accurate network name rather than the network name that the XP system automatically provides.

2, the use of irregular network names, prohibit the use of the default name.

If you do not broadcast, an attacker can still connect to the network by guessing the network name, so it is necessary to modify the default name.

Here's the irregularity can use the password to set up the technique, do not set the network name that has sensitive information.

3. Client MAC Address filtering

Specifies that only clients with the specified Mac can connect to the access point, and that they can be further checked by the connecting person.

The above three methods only belong to XP wireless security of the primary settings, do not expect to set these three steps can rest assured that, from the current security settings, although it is possible to protect against some of the wireless attacks, but because there is no encryption on the data in transit, so, As long as the attackers use some specific wireless LAN tools, they can crawl the various packets in the air, through the content analysis of these packets, you can get a variety of information, including SSID and MAC address, so the previous three methods for this attack is not the same. The next thing we're facing is the encryption of wireless transmissions----WEP.

This is a very controversial topic, therefore, in order to avoid going into the wrong place, we will not explain the strengths and weaknesses of this problem one by one in detail, only a word with: "WEP provides wireless LAN with a more comprehensive security from data security, integrity to data source authenticity, but WEP keys are vulnerable to attackers." Although the vendor has been strengthened for this point, Microsoft also released the relevant upgrade package (KB826942,SUPPORT.MICROSOFT.COM/DEFAULT.ASPX?SCID=KB;ZH-CN;826942), but can not fundamentally solve the problem.

WEP runs on the access point, if we enable WEP on 2000, then the shared key provided by the client software must be used, and if it is used XP, it is not needed, the system prompts you when the first access is enabled, and you can continue with the following configuration after entering the key:

1, open "Network Connection", click on the wireless network card properties.

2, select "Preferred Network", select or add an entry, and then click Properties.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.