Top secret "free" Wireless Network

Source: Internet
Author: User

The development of wireless networks is quite mature, but we may not know much about how to obtain free wireless networks. Here we will introduce several types of networks.

Wireless Networks are undoubtedly the greatest "Masters" in the moment. However, wireless networks bring convenience to people, and there are still some helpless problems. Are you still worrying about the high cost of wireless Internet access? Or are you still worried about preventing wireless network theft? After reading the following sections, you will no longer have any worries.

Recently, with the emergence of a mysterious hardware product named "card King", the free network was pushed to the teeth of the storm again. The so-called "card King" is actually a high-power wireless "card network card", the hardware product not only has a higher power, but also can crack the wireless network password, therefore, has a "card King ", free Internet access! Of course, the premise of this network type is that there is a wireless network access point in the region where the network is located. In short, there are people around the network using wireless networks. In fact, it is not uncommon to get rid of the Internet for free, but with the increasing number of wireless network users, it is more convenient and easy to get rid of the network, so how can we "get rid of the network" better ", here, we will summarize the three realms of free network.

Secret 1: free network access without Password

The following are the most typical scenarios where a wireless network is used without a password, which eventually leads to a situation where "one pays for multiple users:

The Wang family uses China Telecom's ADSL and uses wireless routers for wireless Internet access. Due to busy work, he does not have much time to use the network at home, it is billed on an hourly basis. Once, Mr. Smith paid the network fee. As a result, more than 1000 yuan had been used in two months. Mr. Smith did not understand that he had to spend at most 80 hours surfing the Internet each month. How could he have had such a high network fee? Once I checked the traffic, I got a lot of evidence. Mr. Smith was so upset that he finally found the cause. It turned out to be a disaster caused by wireless networks. After a small network shuts down the computer, it often forgets to turn off the router and ADSL Modem. Other people use a wireless network card to obtain a signal to access the Internet. It is precisely because the small network uses ADSL to access the Internet. Wang did not set a wireless network password.

After reading the above case, you may understand that such a wireless network without a password is simply a big meal. It is a pity not to eat it. Therefore, many people will not refuse to accept it, if you have a laptop with a wireless network card or even a desktop with a wireless network card, you can easily access the internet at home for free.

Tip: Pay attention to the network. It is important to select a suitable place for free. Besides residential areas, campus Dormitory areas, libraries, airports, hotels, hotels, coffee shops, and computer cities are all good choices. For students, the campus dormitory area and the library are good places. If you are working in a group, the airport, hotel, and other places are good.

Secret 2: slightly applied means, Internet cafes

In addition to the above "free" wireless network without a password, there is also a type of network that has been very popular, that is, Internet cafes. Internet cafes use certain technical means to crack the internet cafe management system, so as to achieve free Internet access. Currently, Internet cafe systems use Pubwin2007 systems, and many software are used to crack such systems. For example, eshield can implement alternative cracking. For another example, the powerful Internet cafe cracking software "2008 Internet cafe cracking program" provides a variety of cracking solutions.

Friendly reminder: This kind of hacking means requires everyone to understand certain cracking technologies. Of course, some are just the use of some silly cracking software. In addition, even if it can be cracked, do not select a small Internet cafe, otherwise the boss will recognize you. Instead, you should choose some large Internet cafes, and the boss will not be too busy, so even if you have been surfing the internet for a long time, you will not be noticed.

Tips 3: Search for antennas and crack the network

In this way, you need to pay a certain amount of money to purchase a "strong search antenna", but the effect is "immediate" and very effective. This kind of powerful search antenna is actually the "secondary network card" mentioned at the beginning of this article. The price of this kind of equipment is between-RMB. Its principle is very simple. A secondary network device has a stronger function antenna, A wider range of wireless network signals can be found. There is also a password cracking disc that is used to crack the wireless network password. It is a combination of "strong search antenna" and "password cracking disc, the wireless network is no longer available, and even if you are a cainiao, you can easily crack the wireless network to achieve free Internet access.

Friendly reminder: although this "strong search antenna" is free to use others' wireless networks, lawyers tell everyone that this may violate relevant laws and regulations. In addition, the powerful search antenna is based on high signal transmission power. The reason why many wireless signals can be found, even networks within one kilometer, it is related to its signal transmission power. using it for a long time will cause a considerable amount of radiation to the body. A high power directly means a great harm to the human body. Therefore, for your own security, "strong search antenna" is still useless. Of course, if you have to use this type of equipment, please be careful not to alert the other party, do not use BT to download such large-traffic tools.

Precaution: How to Prevent wireless networks from being "Rubbed"

Many families and organizations are now using wireless networks to enjoy the convenience that wireless networks bring to everyone. However, these inharmonious voices have emerged in wireless networks, so how should we prevent it? Here are some tips for everyone.

1. WEP/WPA Encryption

First, the wireless router should be switched off when no network is needed. This is the safest way to avoid others using their own networks when they are not there. Second, it is also a good method to encrypt wireless networks. The procedure is as follows:

Enter 192.168.0.1 in the browser to configure the wireless router (take the D-Link Wireless Router as an example). In the last step, set the wireless network password in "set wireless communication online. The 802.11 standard defines a security protocol called Wired Equivalent Privacy WEP (Wired Equivalent Privacy). WEP can encrypt wireless data packets so that attackers cannot easily read these data packets. Two types of encryption are provided: 64-bit and 128-bit. Select one of them, enter the password in "WEP password", and then click "Next" to complete the configuration.

When you connect to the encrypted wireless network again, you will be prompted "this network requires a network key ":

Click "Connect". In the new window, only the password can be entered for normal connection. After the password is set, such problems will not occur.

2. Use safer WPA2 Encryption

Some users may have heard that WPA encryption was cracked a while before. What are the solutions to wireless security? You don't have to worry too much about it. It's not easy to crack WPA first. Second, you can use a safer WPA2 Method for encryption.

The Advanced Encryption Standard AES used for WPA2 encryption is not affected by the WPA cracking method. Therefore, currently, data communication encrypted using WPA2 can provide sufficient security for wireless networks, however, the WPA2 method is not mature, and not all users can use it smoothly. Some wireless devices do not support WPA2 encryption. Therefore, for these users and wireless network devices, we can only stay on the insecure WPA encryption technology. More security protocols related to WPA2 will be launched in the future, such as more reliable standard wpa xp, wpa kb Preview, WPA beta official version, and WPA official version SP1, these standards and protocols greatly improve the security of wireless networks.

Tip: some users may not see the WPA2 encryption option in the wireless encryption settings. This is due to Windows system problems. Windows XP Sp2 only supports WPA Encryption by default, but Microsoft has released the corresponding patch, after installation can use WPA2 encryption, is: http://support.microsoft.com /? Id = 893357. However, note that not all NICs support the WPA2 standard. Some NICs can be solved by upgrading the driver. After installing the patch, restart the computer. You can see that the system supports WPA2 encryption.

3. Hide the SSID

The SSID, short for Service Set Identifier, allows wireless clients to identify different wireless networks, similar to the mechanism by which our mobile phones recognize different mobile carriers. The parameter is broadcasted by the AP Wireless Access Point in the default settings of the device. The client can connect to the wireless network only after receiving this parameter or manually setting the same SSID as the AP. However, if we disable this broadcast, normal roaming users cannot connect to the network if they cannot find the SSID.

Tip: If hackers use other methods to obtain relevant parameters, they can still access the target network. Therefore, hiding the SSID is applicable to normal SOHO environments as a simple password security method.

4. MAC address filtering

In this way, the physical address (MAC address) of the specified wireless network adapter is input to the AP by setting the AP. The AP will make a judgment on each packet received. Only those that meet the set standards can be forwarded. Otherwise, the packets will be discarded.

Tip: This method is troublesome and cannot support a large number of mobile clients. In addition, if hackers steal legitimate MAC address information, they can still use various methods to apply fake mac addresses to the network. Generally, SOHO and small enterprise studios can adopt this security method.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.