Tips on how to protect your wireless internet

Source: Internet
Author: User
Tags strong password

1. Using encryption technology
The current production of wireless routers almost all provide users with the choice of encrypted data, the proper use of this feature can effectively avoid their own sensitive information is intercepted. It is worth noting that Wi-Fi Protected Access technologies (Wi-Fi Protected ACCESS-WPA and WPA2) are more robust than WAP protocols and therefore have a greater role in securing wireless communications.
Expansion:
(1) WAP Protocol
The Wireless Application protocol (Wireless application Protocol), which was developed in the 1997 Wireless Application Protocol Forum (WAP Forum, now Open Mobile Alliance OMA), is an open standard protocol that It can be used to transfer information on the network to mobile phones or other wireless communication terminals.
it uses an HTML-like Markup language WML (Wireless Markup Language Wireless Markup Language), but WML is designed specifically for handheld mobile communication terminals (mobile phones), and HTML is designed for personal computers (computers). It is designed to reduce the memory and time spent in the browser (1996-1998, the memory, computing power, screen resolution is not enough to support HTML), because WML portable content for mobile phones, using WAP browser reading, when the computer browsing (the computer is browsing the web , which includes hypertext hypertext, hypermedia hypermedia, Hypertext Transfer Protocol HTTP), requires the installation of a dedicated browser (not many such browsers, such as the Open Gate browser).
Since then, WML has been extended to XHTML (Extensible Markup Language, which is a transitional language for HTML to XML) and XHTML MP (XHTML Mobile Profile extends the markup Language Movement summary). The goal is to get the browser to evolve with the same experience as possible on WAP and the Web. After Android was released in 2007, there was a clear distinction: smartphones support XHTML, while feature phones support WML.
(2) Web page (web)
Web in the web design called "webpage", now widely translated network, Internet and other technical fields, performance for hypertext hypertext, hypermedia hypermedia, Hypertext Transfer Protocol HTTP and so on.
Web pages are divided into static pages and Dynamic Web page two. Usually we see the pages are in the HTM or HTML suffix end of the file, commonly known as HTML files, different suffixes for different types of Web page files, such as CGI, ASP, PHP, JSP and even other.
ASP is an abbreviation for Active Server page, which means "Active servers webpage", which is an application developed by Microsoft to replace CGI script program. ASP Web page file format is. asp, written by VB, now often used in a variety of dynamic Web sites. ASP is a server-side scripting environment that you can use to create and run dynamic Web pages or Web applications.
CGI (Common Gateway Interface) is a common gateway interface that can be called a mechanism that is a tool for a "chat" between an HTTP server and a program on your or other machine, and its programs need to be run on a network server. You can use different programs to write the appropriate CGI programs, which include vb,delphi or C + +, to run the written program on the Web server's computer, and then transfer the results of the operation to the client's browser via the Web server. This preparation method is difficult and inefficient because you must re-compile the CGI program into an executable file every time you modify the program. and the ASP and script (scripting) is very similar to writing, do not need to recompile the executable file can be directly run, and the ASP built-in ADO, allowing users to access various databases through the client browser.
PHP (hypertext Preprocessor) is a server-side html-embedded script description (scripting) language. Its most important and powerful feature is its database integration layer, which is simple to use to complete a Web page with database functionality, and is designed to allow web developers to quickly write dynamic Web pages. In HTML files, PHP scripts (which mix the new syntax of C,java and Perl and PHP) can be applied using special PHP tags so that the page creator doesn't have to rely entirely on HTML to generate the page. PHP is executed on the server side, and the PHP code is not visible to the client.
JSP (Java Server pages) is a dynamic Web page technical standard, similar to ASP technology. It is a JSP file (*.jsp) that is inserted into the Java program Segment (scriptlet) and JSP tag (tag) in the traditional HTML file (*.htm,*.html).
every time you go online, you will leave a record in the history (Cookie), stored in the main file of the C disk in a document, delete as long as the right click on IE properties, in the browser history to delete records can be, you can modify the record saved directory or roll out the browser to delete records.
1. Using MAC address filtering
Typically, wireless routers and access points have the ability to prevent unknown wireless devices from connecting to the network. This is done by comparing the MAC address of the device that is trying to connect to the router and the MAC address of the device that the router is saving.
However, this feature is usually turned off when the router is shipped, which requires the user to try to enable this feature and only tells the router the MAC address of the wireless device in this unit or home. Some hackers use MAC address filtering to fail when they clone MAC addresses and view links to a user's wireless network.
Expansion:
MAC (Media Access control) media involves the control layer, which belongs to the lower sublayer of the data link layer in the OSI model. It defines how data frames are transferred on the media, and access to the linked media is "first come first served" in the link that shares the same loan. Physical addressing is defined here, and the logical topology (the path through which the signal passes through the physical topology) is also defined here. Line control, error notification (not corrected), frame transmission sequence, and selectable flow control are also implemented in this sub-layer.
the protocol is located in the data link layer of the OSI Seven layer protocol, where the data link layer is divided into Upper LLC (logical Link Control) and lower-level MAC (media access Control), and the MAC is primarily responsible for controlling and connecting physical media to the physical layer. When the data is sent, the MAC protocol can determine in advance whether the data can be sent, if it can be sent will give the data with some control information, and finally the data and control information in the specified format sent to the physical layer, when the data is received, the MAC protocol first determine the information entered and whether there is a transmission error, if there is no error , the control information is removed and sent to the LLC (Logical link Control) layer.
mac protocols are widely used in LANs and WLANs. In the traditional local area network, the physical layer of various transport media corresponds to the corresponding MAC layer, which is commonly used in the standard of the MAC layer of IEEE 802.3, using CSMA/CD (carrier Scnse Multiple access collision Detect carrier monitoring multiple access/collision detection, the device prepares to send data before the media access mechanism to check the carrier signal, if the carrier is not detected in a specific time, the device can send data. If two devices are sent at the same time, a conflict occurs, and the conflict is detected by all conflicting devices. This conflict causes the access control mode to be re-sent from these devices after a random time delay, while in the WLAN, the standard for Mac is IEEE 802.11, which works in the form of DCF (distributed control) and PCF (central control).
The dcf-distributed coordination function is distributed coordination-automatically and efficiently shared media; Pcf-point Coordination function-supports near real-time applications.
need to contact the manufacturer according to the MAC chip model to obtain the corresponding firmware brush write tool, as well as MAC address file, where the MAC address is required to purchase a valid segment from the IEEE Alliance, and is unique, If duplicate errors are reported, the IP address repeats the error and causes the same MAC address of the computer network access exception.

2. Be sure to use one of the instructions
setting a password for wireless Internet access is critical. Choosing a strong password will help secure your wireless network, but do not use the default password that accompanies your wireless router, or use a word or family's birthday as a password that you can easily isolate from the dictionary.
4. Turn it off when you're not using the network
one of the most significant improvements to a system's security is to shut it down directly.
5. Monitor network Intruders
The more users, especially administrators, know about malicious hacking activities, the easier it is to find coping strategies. The network administrator should gather logs about the scan and access attempts, and use the extensive statistics generation tools available to make these logs more useful. Also set up the log server to send alerts or e-mails to administrators when it discovers that a malicious activity is actually occurring.
6. Do not broadcast the name of the wireless network
the name of the wireless network, also known as the SSID, should never be broadcast to passers-by. Keep in mind: Do not use some short words as SSIDs. Wireless network name is too easy to be cracked, the more complex the more difficult to crack.
7. Allow Internet access only for certain periods of time
Some of the latest wireless routers produced now allow users to restrict access to the Internet at certain times of the day.
8. Ensure that the computer has taken appropriate security measures
you can check to see if the latest anti-virus software is installed, whether the latest patches are installed, and the client firewall technology is enabled.

Tips on how to protect your wireless internet

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.