like WEP, therefore, the system security is greatly improved.
WPA2-PSK (AES) of wireless network encryption technology)
After the publication of 802.11i, the Wi-Fi Alliance launched WPA2, which supports AES (Advanced Encryption Algorithm). Therefore, it requires new hardware support, it uses CCMP (full code protocol for block Chain messages in counter mode ). In WPA/WP
of users with different security requirements, WPA specifies two application modes: Enterprise mode, and home mode, including small office ).
Based on the two different application modes, WPA authentication also has two different methods. For applications of large enterprises, "802.1x + EAP" is often used, and users provide the creden。 required for authentication. However, for some small and medium-sized enterprise networks or home users, WPA also provides a simplified mode that does not requir
address filtering does not achieve the purpose of control. Therefore, IT must find ways to prevent unacceptable risks or costs while ensuring secure use.
Control embedded Wi-Fi devices with WPA2-Personal
In the embedded wireless LAN Device Access control method, WPA2-Personal is a method that is often ignored: Pre-Shared Key (PSK) Authentication and AES encryption. "Personal)" indicates that this method is
limited by the driver. But on Mac OSX and Linux, Kismet can be compatible with many wireless cards.Third, WiFi AnalyzerWiFi Analyzer is a free Android app that can be used to search for AP hotspots on Android tablets and Android phones. WIFI Analyzer can display AP specific information on the 2.4GHz band, as well as devices on some 5G bands. You can send the AP information list (XML file) to the mailbox or other programs, or to the screen, WiFi Analyzer can graphically display the signal streng
. Therefore, MAC address filtering is only intended for new hackers. However, if you get rid of hacker thoughts, they may miss your network and attack networks that do not filter MAC addresses.
6. A secure encryption mode
The first encryption technology developed for wireless networks is wired peer-to-peer Security WEP ). All encryption systems use a string of characters named keys to encrypt and decrypt data. To decrypt packets broadcast on the network, the hacker must understand the content of
.
Authenticate users by using a capture entry web page and monitor usage.
Data confidentiality and integrity
Enterprises must work hard to prevent malicious, unintentional, unauthenticated, or inappropriate information exposure. As mentioned in the first part, intruders can use shared software such as Aircrack) and commercial Packet Capturing tools such as AirMagnet notebook analyzer) for eavesdropping, at the same time, the high-gain antenna is used to discover the encrypted stream of the WEP K
network only when the wireless switch is enabled first.
4. The operating system version is too low
If the operating system is too old, although the system does not affect the wireless network card, you will find that even if you select the 11n wireless network card, some wireless networks that adopt WPA or WPA2 encryption cannot be connected. Windows XP supports the WPA and WPA2 protocols after the SP1 Pat
Wi-Fi is inherently vulnerable to hacker attacks and eavesdropping. However, if you use the correct security measures, Wi-Fi can be safe. Unfortunately, the site is full of outdated advice and misunderstandings. Here are some of the things you should do and shouldn't do in Wi-Fi security.
1. Do not use WEP
WEP (Wired Equivalent encryption protocol) security has long been dead. Most inexperienced hackers can quickly and easily break through basic encryption. Therefore, you should not use WEP at
connect wireless networks.
Four, operating system version is too low
Using the operating system is too old, although the surface of the system does not affect the wireless network card, but in the actual application you will find that even if the 11n wireless network card, there are some WPA or WPA2 encryption mode of wireless networks can not connect. Windows XP after the SP1 patch will support the WPA and WPA
WEP, therefore, the system security is greatly improved.
WPA2-PSK (AES) of wireless network encryption technology)
After the publication of 802.11i, the Wi-Fi Alliance launched WPA2, which supports AES (Advanced Encryption Algorithm). Therefore, it requires new hardware support, it uses CCMP (full code protocol for block Chain messages in counter mode ). In WPA/WPA2
1. See what security measures are available in your home WiFi network
When your friends first visit your home and use your WiFi network, do you need to enter a password? If not, your network is not secure enough. Even if they need to enter a password, there are several ways you can protect your network, and there are pros and cons to these methods. You can see what protection you have on your network by looking at the WiFi network settings. Your network may be unsafe, or you may have added prot
As we all know, router security is the cornerstone of network security, if the router has security problems, it means that our network will also have security problems. So we all make some security settings for the router, but if the security settings are not properly set, the entire network slows down.
We usually use Wpa2-aes and wpa2-tkip to encrypt the router. Today we'll talk about the difference betwe
Wi-Fi is inherently vulnerable to hacker attacks and eavesdropping. However, if you use the correct security measures, Wi-Fi can be safe. Unfortunately, the website is filled with outdated advice and misunderstandings. Below are some things that should be done and should not be done in Wi-Fi security.
1. Do not use WEP
WEP (Wired Equivalent encryption protocol) security has long been dead. Most inexperienced hackers can quickly and easily break through basic encryption. Therefore, you should not
everything is OK, it'll get an IP can access internetFor APS that have WEP>add_network (assume returns 1)>set_network 1 SSID "666">set_network 1 Key_mgmt NONE>set_network 1 Wep_key0 "Your AP Passwork" (If usting ASCII, it need double quotation marks, if using hex, then don ' t NE Ed the double quotation marks)>set_network 1 Wep_tx_keyidx 0>select_network 1 (optional, remember, if you is connecting with another APS, you should select it to disable the Anot Her)>enable_network 1And then, get a I
Know how to rub the network card
"Rub network card" is a WiFi Wireless LAN network card, compared with the standard wireless network card, mainly has the following characteristics:
1. High transmitting power
China does not appoint the antenna gain less than 10dBi of 2.4GHz Wireless LAN products equivalent total radiation power (EIRP) must be less than or equal to 100mW, the EU CE Certification standard also stipulates 2.4GHz Wireless LAN products equivalent total radiated power (EIRP) to be l
This blog post listed Linux Compatible USB wireless adapters. It seems that many new Linux users frequently has problems learning how to install RT2870 driver under Linux. I also received email requesting installation instructions for the same device. This quick tutorial would explains how to install RT2870 based chipset device with WPA2 authentication and TKIP wireless en Cryption.Our Sample SetupThe following instructions is tested on:
Ubun
Wi-Fi is inherently vulnerable to hacker attacks and eavesdropping. However, if you use the correct security measures, Wi-Fi can be safe. Unfortunately, the site is full of outdated advice and misunderstandings. Here are some of the things you should do and shouldn't do in Wi-Fi security.
1. Do not use WEP
WEP (Wired Equivalent encryption protocol) security has long been dead. Most inexperienced hackers can quickly and easily break through basic encryption. Therefore, you should not use WEP
wireless network card. Some WPA or WPA2 encryption methods de wireless networks are not connected. Windows XP supports the WPA and WPA2 protocols after a SP1 patch has been played. In practical application, there are some problems in the SP1 of wpa/wpa2de compatibility. There will still be an inability to connect to the de situation.
Upgrade the operating system. Either Windows 7, Vista, or XP SP3. They p
, network fraud.
VPN can also be used to protect wireless network traffic for Wireless LAN transmissions if the virtual personal network (VPN) has been used to protect enterprise data in the public network. This ensures the security of data transmission away from the office point and extends the area of security.
Others use VPNs to protect wireless networks in the field-especially those that were earlier using the WEP (Wired Equivalent Privacy) protocol. Fortunately, all wireless network-licen
unauthorized access through a network security key.
To set up your network security key, follow these steps:
Open Network and Sharing Center by clicking the Start button, and then clicking Control Panel.
In the search box, type Network, and then click Network and Sharing Center.
Click Set up a new connection or network.
Click Set up a new network, and then click Next.
The wizard will guide you through the creation of a network name and security key.
If your router supports it, the wizard
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.