Router 10 code of safety precautions

Source: Internet
Author: User
Tags strong password advantage

How should I use Wi-Fi when I'm out?

1, refused with the source of the unknown Wi-Fi connection, hackers are most users want to free network of the advantage of psychology, to use the free and do not need password Wi-Fi. Many businesses have to provide free internet places, but we also want to stay simpleton, must ask the detailed name, to avoid being injected "Starbucks-1" and other fake Wi-Fi cheat;

2, the use of mobile phone online banking and network shopping must be cautious, in order to fund the security is not bad that the flow, with 3/4g online mode!

3. Turn off the option of "Choose Automatic Connection" in the mobile phone Setup project, because if this feature is turned on, the mobile phone will automatically scan in the area with Wi-Fi network, and connect the network without password, will greatly increase the chance of mistakenly connecting "fishing Wi-Fi".

4, refuse to use Wi-Fi connections such as Wi-Fi keys, password-acquisition tools because they share the Wi-Fi information you or others have connected based on the principle of data uploading and sharing, if someone has even "phishing Wi-Fi" or "Trojan-Wi-Fi", you happen to be in the vicinity, Congratulations, you've got it!

How to prevent your route from being breached?

Just now, small knitting and pen friend oath Dan Dan said, he must not be able to break the current router, the result, the technology man only an Android phone to spend thousands of pieces of the ocean please return high-end router reimbursement! And it's so easy and easy, just a few of the apps that are used to test What Wi-Fi analyzer, Wi-Fi universal keys and other tools.

The process is also very simple, first crack the router's password, the router for DNS hijacking, and then do whatever they like to steal the various information of the small series.

I do not say those processes, instigated suspicion, from today's things summed up, want their own routers will not become someone else's "Trojan Wi-Fi", to do the following:

1, a strong password is the most important cornerstone of Wi-Fi security. A strong password is a 8-digit complex password, such as gt/eb7@2, that contains both uppercase and lowercase letters, numbers, and symbols. As long as the use of WPA/WPA2 encryption of Wi-Fi, and set strong password, it is almost impossible to be breached.

2, hide your SSID, refers to the router management interface for the relevant settings, so that the SSID of the wireless network no longer broadcast out, become a "stealth network", which can also greatly reduce the probability of hacking attacks.

3, turn off the wireless router QSS, WDS function, open the guest network for others to use. First of all, QSS, WDS features it greatly reduces the security of wireless routers, so if not necessary, these two features should be turned off, and the guest network as long as the function limit, can effectively protect the router security.

4, the common networking equipment for Mac binding. Mac binding refers to setting up the MAC address blacklist or whitelist function in the router. Of course, it is more recommended to use the white list in the way. Users only need to add the physical addresses (MAC address) of the devices that are connected to the network to the whitelist list, and only those devices that have been added can connect to the wireless network.

5, in addition, you have to start from the source, do not buy the router products with known vulnerabilities. If the router is used for a long time, update the latest firmware version. If not high play, try not to brush the third party firmware. As for the backstage management password, small make up not to say, take pen to write down can think of the most troublesome password and change the router's management interface landing address, to ensure that it is foolproof!

There are so many security issues that you can introduce, and it's all a cliché to say. Small series can give everyone's advice is to be more careful, after all, the internet era we are naked. When you want to take advantage of others, they tend to be taken advantage of. To arrange a hacker friend to eat a big meal, otherwise the value of XX yuan QQ number and Alipay will be someone else!

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.