How wireless networks are not used by others

Source: Internet
Author: User

1.WEP/WPA Encryption

First, you should turn off your wireless router when you are not using the Internet, which is the safest way to avoid the use of your own network while you are away. Second, encrypting a wireless network is also a good way to do it. The specific actions are as follows:

Enter 192.168.0.1 in the browser to configure the wireless router (take the D-link wireless router as an example) and set the wireless network password in the last step, "set up wireless communication online." The 802.11 standard defines a security protocol, known as Wired Equivalent Privacy WEP (equivalent Privacy), where WEP can encrypt wireless packets, making it easier for attackers to read these packets. There are two types of encryption for strength: 64-bit and 128-bit. Select one, then enter a password in the WEP password and click Next to complete the configuration.

After the encrypted wireless network, when connected again, will prompt you "This network needs the network key":

Click "Connect", in the new window, only enter the password to normal connection.

After you set up your password, this type of problem does not occur.

 2. Use more secure WPA2 encryption

Perhaps some users have heard, WPA encryption has been cracked a while ago, then wireless security there is no good way to solve it? We do not have to worry too much, the first real ability to crack WPA, is not very easy, and secondly, you can use a more secure WPA2 way to encrypt.

WPA2 encryption uses the Advanced Encryption standard AES, so will not be affected by the WPA method, so the current use of WPA2 encryption data communication can provide adequate security for the wireless network, but the WPA2 method is not very mature, not all users can be used smoothly, Some wireless devices also do not support WPA2 encryption, so for these users and wireless network devices, we can only be forced to stay on unsecured WPA encryption technology. More security protocols related to WPA2 will be introduced in the future, such as more reliable standard WPA XP, WPA KB Preview, and WPA beta, as well as the WPA official version SP1, which greatly improves wireless network security.

Hint: Some users may not see the WPA2 encryption option in the Wireless encryption settings, due to Windows system problems, Windows XP SP2 only supports WPA encryption by default, but Microsoft has released the corresponding patch, after installation can use WPA2 encryption. However, it should be noted that not all network cards support the WPA2 standard, and some network cards can be upgraded to solve the driver. After installing the patch, restart the computer, you can see that the system has supported WPA2 encryption.

 3. Hide SSID

The SSID, the short name of the service Set identifier, allows wireless clients to identify different wireless networks, similar to the mechanism of our mobile phone recognition of different mobile operators. The parameter is broadcast by the AP wireless access point in the device default setting, the client only receives this parameter or manually sets the same SSID as the AP to connect to the wireless network. And if we disable this broadcast, a typical roaming user cannot connect to the network without the SSID being found.

Hint: It should be noted that if the hacker uses other means to obtain the corresponding parameters, still can access the target network, therefore, the hidden SSID for the general Soho environment as a simple password security method.

4.MAC Address filtering

This approach is to enter the physical address (MAC address) of the specified wireless network card into the AP by setting the AP. The AP will make a judgment on each packet received, and only those who meet the set criteria can be forwarded, otherwise they would be discarded.

Tip: This approach is cumbersome and does not support a large number of mobile clients. In addition, if hackers steal legitimate MAC address information, can still be used in a variety of ways to fake MAC address landing network, General Soho, Small Business Studios can use this security method.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.