Developer on Alibaba Coud: Build your first app with APIs, SDKs, and tutorials on the Alibaba Cloud. Read more ＞
How to set the network security key? We often have to log in to various websites, forums, emails, online banking, etc. These accesses often require passwords for authentication, so we continue to register users, and there are countless online accounts and password.
The Internet is becoming more and more popular, and many people have begun to use wireless networks. For users who have just started the network, how to find the network security key is the first step for them to connect to the network. How to find the network security key The key has also become a problem for these users. How to set the network security key?
Public key encryption technology uses asymmetric keys to encrypt and decrypt. Each pair of keys contains a public key and a private key. The public key is public and widely distributed, while the private key is never public, but only one knows.
The data encrypted with the public key can only be decrypted by the private key. On the contrary, the data encrypted with the private key can only be decrypted by the public key. It is this asymmetry that makes the public key cryptosystem so useful.
Use public key cryptography for authentication
Authentication is a process of verifying identity. The purpose is to enable an entity to be sure that the other party is what he claims.
Security key setup process
Let's take a look at how to set up the network wizard to guide you through the security key setting process. Click the "Start" button -> and then click "Control Panel" -> to open the "Set Network". In the search box, type network -> and then click "Network and Sharing Center" -> "Set up a new connection or network" -> "Set up a new network".
Encryption method of wireless network
There are currently three types of wireless network encryption: Wi?Fi Protected Access (WPA and WPA2), Wired Equivalent Privacy (WEP), and 802.1x.
1. WPA and WPA2
WPA and WPA2 require users to provide a security key to connect. After the key verification is completed, the data sent between the computer or device and the access point will be encrypted. Compared with WPA, WPA2 authentication is more secure. Almost all new wireless adapters support WPA and WPA2, but some older wireless adapters do not. This mode is recommended for home networks.
When WEP is enabled, a network security key needs to be set. The WEP key may encrypt information sent from one computer to another computer over the network. However, relatively speaking, the WEP security mechanism is relatively easy to crack. Despite these warnings, if you still want to use WEP shared key authentication, you can follow these steps:
Open the "Network and Sharing Center" by clicking the "Start" button -> and then clicking "Control Panel" ->. In the search box, type network, and then click "Network and Sharing Center" -> Click "Set up a new connection or network" -> Click "Manually connect to a wireless network", and then click "Next" -> Under "Security Type" on the "Enter the information of the wireless network you want to add" page, select WEP-"to complete the remaining operations on this page, and then click "Next"-" Click "Change connection settings"-" Click the "Security" tab, and then click "Sharing" under "Security Type" -> Click "OK", and then click "Close".
This article is an English version of an article which is originally in the Chinese language on aliyun.com and is provided for information purposes only. This website makes no representation or warranty of any kind, either expressed or implied, as to the accuracy, completeness ownership or
reliability of the article or any translations thereof. If you have any concerns or complaints relating to the article, please send an email, providing a detailed description of the concern or
complaint, to email@example.com. A staff member will contact you within 5 working days. Once verified, infringing content will be removed immediately.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
and provide relevant evidence. A staff member will contact you within 5 working days.