.
Guard against Kismet: There is no way for Kismet to find your WLAN, so be sure to have advanced authentication and encryption measures.
Guard against Airsnort: use a 128-bit, rather than 40-bit WEP encryption key, which can take longer to crack. If your device is supported, use WPA or WPA2, and do not use WEP.
Guard against Cowpatty: Choose a long complex WPA shared key. The type of the key is not likely to exist in the hacker-induced file list, so the attacker can guess your key will take
FC5 usb wireless network card TL-WN620G installation, configuration and network communication implementation-Linux general technology-Linux programming and kernel information, the following is a detailed reading.
FC5 usb wireless network card TL-WN620G installation, configur
the machine will be more than one, and in case of encounter, it is easy to fall off, and some of the USB network card on the power requirements are relatively high, some USB power supply of the motherboard may not use The advantage is to support hot plug, temporary use convenient, can be removed when not available.
PCI interface is mainly used on the desktop, not too many compatibility issues, installatio
".
The set without lines is relatively complex. We first need to enter the browser address bar without line by IP address, and then in the pop-up login interface to enter the user name and password, you can enter the line by the Web with the interface (some brands of no line by the attached configuration CD-ROM, can be directly through the CD-ROM).
In the Web configuration interface, we first have to ensure that the broadband access mode is correct, for example, you are an ADSL use
I believe that readers who know about wireless networks know that security is an inherent weakness of wireless networks. It is precisely because of its transmission through air that signals are prone to leakage problems, compared with wired networks, signal monitoring becomes very simple. Some users use WEP encryption to protect network communication data packets
Method One:1. If the wireless card is turned off, the lower right corner of our computer is an X status red icon, we now right click on the "X status Red icon" as shown below:2. Then in the pop-up interface we click on "WLAN" and slide to the right (friends who have used Android or Apple phones know this switch)3. So our wireless card is quickly opened OH:Method
I would like to introduce you to the method of the wireless router relay function. Many people may not understand the function of the wireless router relay function. It does not matter. After reading this article, you will certainly have a lot of GAINS to make your signal stronger.
Use the wireless router relay function to improve
1. Mixed wireless networks often fall off the line
Failure phenomenon
Use the Linksys WPC54G network card and Linksys WRT54G AP to build a wireless LAN that uses IEEE 802.11G protocols and a few 802.11B network adapters. The line is often dropped when using wrt54g for 54mb
Then we will guide it so that we can apply it without rebooting:
Servicenetworkmanager start
You are in the image environment (GNOME) to complete this step, your notification local (generally in the Gnome panel in the upper right corner) will display a new icon. If you click on this icon, you will see a list of all the wireless networks that can be connected.
You may want to stop using your network and w
encryption protocol. The built-in de wireless card will often be blocked by the encryption protocol de and unable to connect to the network.
There is an urgent need to use wireless networks. You can temporarily reduce the use of cryptographic protocols such as WEP. The most effective de solution is to change a new de built-in/external
set ). On the Connection Profile Configuration page, we can select the broadband network type. Generally, ADSL selects via PPP over Ethernet, while Cable or FTTB selects via DHCP. If the ISP needs to enter the user name and password, we can enter them in the corresponding location below.
If you want the wireless router to keep the Internet connection at all times, set Timeout to "0", so that even if there
1. IntroductionDriven by the national informatization strategy, many industry groups have recognized the importance of informatization. At present, the finance, education, medical care, transportation, electric power, tobacco, logistics and other industries have established their own information systems according to the characteristics and needs of the industry. In order to promote the development of industry informatization, China Mobile gives full play to its own business advantages and closel
encryption. Unencrypted transmission consumes less computer resources.
Click "Next" in step 2 to display the dialog box. If you are using a laptop, you can select the "open" option to enable the power management function to reduce energy consumption. Of course, the wireless performance will also decrease, and the communication rate and transmission distance will also decrease. When the power management is turned
spending a lot of money. The key is the right setting.
The goal of each security management plan is to make the intrusion process more complex, require more time, and be caught in a higher probability to guard against potential intruders or attackers. Even if you are installing fences in your yard, lock the door, keep a dog in the yard, put a latch on the window and the door, install the burglar, and you can't guarantee that the thief won't get in--in fact, a professional thief can almost alwa
suits you. After selecting a brand, you should also search for related comments online to make a trade-off.
802.11n wireless network problems 3. Use WPA2 encryption only
The wireless N standard does not support WEP, so the connection speed with this type of encryption is limited to 54 Mbps, even with N standard device
, install the firewall
Today's routers are generally built with firewall capabilities, and it also allows you to disable these features. For security reasons, make sure that the router's firewall is turned on, while on the PC you can install a professional personal firewall for dual protection.
Nine, reasonable place access point location
It is well known that wireless network routers or other access poi
online to make a trade-off.
3. Use WPA2 encryption only
The wireless N standard does not support WEP, so the connection speed with this type of encryption is limited to 54 Mbps, even with N standard devices.
In addition, the first WPA version cannot even provide maximum wireless performance on N networks. Therefore, you should use WPA2 encryption technology for
There are more and more users using wireless networks for networking or sharing the Internet, and many users often experience the problem of dropping wires when using wireless networks. So how do these problems come about? How can we solve these problems? Below, please the broad masses of readers to follow us together to see how to the wireless
these methods to reduce the RF interference of your network:
1. analyze the possibility of RF interference
You may need to do this before installing the wireless network. You may wish to analyze the problem through the RF field investigation. In addition, you need to talk to personnel in the facility to learn about other RF devices that may be in use. This will
network depends on the transmit power. The more the radiation from the wireless launch point, the more intense the radiation. Therefore, the wireless routing and Wireless AP should be placed farther away from people, it is also far away from the bedroom. Try to avoid the close distance between the elderly, children an
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.