How can we make your wireless network more secure ?, Is wireless networks more secure?

Source: Internet
Author: User
Tags change settings

How can we make your wireless network more secure ?, Is wireless networks more secure?
Thanks to the convenience of wireless networks, many computer users have begun to join the ranks of wireless networks. For many, when using wireless networks, they have not considered the security of wireless networks or the serious consequences caused by insecurity.

Maybe you will think that the network is insecure

The network does not affect you, or does not affect you, or you are not aware of the existence of insecure networks. In fact, once your wireless network is insecure, it may lead to opportunities for others. They will clearly know what you have done on the network and what you have done on the network. I think, you certainly won't let others know what you are doing on the Internet, right? So how can we ensure the security of your wireless network? Next, I will provide you with a solution to some of the problems that often occur in wireless networks.

Q: What is WEP and WPA encryption? Which one should I use?

A: For a Wi-Fi network, encryption is the first defense. Encryption can be used to encode data transmission between a PC and a wireless router. However, unfortunately, many vro products set encryption to disabled by default, and many users often forget to enable it during usage, this means completely exposing yourself to others. If you have not enabled vro encryption, we recommend that you execute it quickly and use the strongest format supported by the network. In addition, the WPA (wireless access protection) protocol and the recently released WPA2 have largely replaced the WEP (wireless encryption protocol) with a relatively low security factor ).

If conditions permit, we recommend that you use WPA or WPA2 because WEP is more vulnerable to attacks than the first two. Because of the high security factor of WPA and WPA2, the probability of being attacked is also reduced accordingly. In addition, using a complex password is also essential, such as a combination of 14 digits and letters, or a combination of more digits.

If you are using an old vro that only supports WEP, you can use a 128-bit WEP Key, which makes your wireless network more secure. In addition, you can download a firmware upgrade from the manufacturer's website. After the upgrade, you can add WPA support. If you cannot provide similar firmware upgrades on the manufacturer's website, we recommend that you replace the old adapter and router and then purchase a new model that supports WPA. In addition, you can select a router that supports the WPA + WPA2 hybrid mode, so that you can use the strongest WPA2 encryption with the adapter. It is also compatible with the WPA adapter.

Remember to change the default network name and password on the vro. If you have noticed the above points, it will not be easy for hackers to attack your wireless network.

Q: If my router has a firewall, do I still need these security measures?

A: The firewall built in a vro is designed to prevent hackers from accessing your computer through a wireless network. However, this does not prevent others from receiving your Wi-Fi signal and then using your network. If the recipient uses the latest high-performance device, your Wi-Fi signal will be dragged down. If you do not encrypt the vro or implement other protection measures, anyone can easily use available tools to receive your Wi-Fi signal.

If you want to make your wireless network more secure, you can run the software Firewall on your PC. You can choose ZoneAlarm launched by Zone Labs and Outpost Firewall Free of Agnitum.

Q: How do I protect my laptop when using public Wi-Fi hotspots?

A: Generally, encryption is not used in public hotspots. If you do not prevent it, everyone can see your internet behavior.

1. confirm that you are using a valid hotspot. Some illegal hotspots disguise themselves, use SSID names like "wayport" or "t-mobile", and then use them to obtain login information of trusted users, or other private data.

2. Check whether the software firewall on your computer is enabled and whether the file sharing feature of Windows has been disabled. This feature is disabled by default in Windows XP SP2. If you want to check these settings, open the 'Control panel 'and select Windows Firewall (for Windows XP systems, click 'security Center' first; for Vista systems, click 'security '). In the XP system, select the 'exception' icon and cancel 'file and printer sharing 'in 'programs and services '. In the Vista system, click 'change settings' and select the 'exception' icon. The subsequent operations are the same as those in the XP system.

3. Do not send bank passwords, credit card numbers, confidential emails, or other sensitive data unless you are sure to be on a very secure network. If you see a lock icon on the right side of the browser, and the URL in the address bar starts with https, you can confirm that these sites are encrypted.

4. If you are not in the hotspot service scope, you must disable Wi-Fi reception because hackers can use this to create P2P Wi-Fi connections with your computer, then you can directly access your computer.

5. If you want to be safer, you can use paid hotspot network services, such as Boingo and T-Mobile, which can provide automatically encrypted connection software.

Q: What is VPN? How can I get it?

A: The best way to protect public wireless connections is to use a virtual private network (VPN ). VPN can ensure the security of your communication, because it can create a secure channel through your encrypted data signal. Currently, many companies provide VPN services for their mobile and offline employees.

You can also use paid VPN services, such as the Personal VPN service provided by Boingo (free trial, $30 per year after the trial), JiWire's hot spot Helper (a 10-day free trial, $25 per year), or Witopia's PersonalVPN ($40 per year ). These three services are not only easy to install, but also easy to use.

If you don't mind using your home or office computer to connect, you have more secure options besides the above services. You can use LogMeIn, or a remote access program provided by GoToMyPC to log on to a public hotspot.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.