FacebookMySpaceTwitterDiggDeliciousStumbleuponGoogle BookmarksRedditNewsvineTechnoratiLinkedinMixxRSS FeedPinterest

How to Secure Your Wireless Network

How to Secure Your Wireless Network

If you use a wireless network, chances are good it is not secure. If you don’t make some important configuration changes on your wireless router after installing it, your wireless network is wide open to hackers, curious neighbors and people who would rather use your broadband internet service instead of buying their own.

Several of my neighbors have a wireless network set up in their home, and from my living room I can connect to three different networks in addition to my own. I do this easily, using no special skills, software or equipment. All I do is click on my wireless networking icon and select “view available wireless networks”. I choose one, click “connect”, and in an instant I am using my neighbor’s internet connection instead of my own. Kind of creepy, isn’t it?

Following are 6 things you can do to make your wireless network invisible and impenetrable to the majority of intruders.

  • Change the default password of your wireless router. This makes it harder for a would-be intruder to access the router administration controls.
  • Change the name of your SSID. The SSID (service set identifier) is the name of your wireless network, and by default is usually the brand name of your wireless router (like Linksys). Change this to a unique name of your choice. A good rule of thumb to follow when setting up any type of network is to always change the default settings to something else, which makes it harder for an intruder to get in.
  • Use an encryption key. Most wireless routers have WEP encryption capability (Wireless Equivalent Protocol), and the newer ones also have WPA (Wi-Fi Protected Access). WEP is an older standard and less secure than WPA, so if you have both, choose WPA. Even WEP is probably good enough, and if this is all you have choose the highest bit encryption possible (usually 128 bit).
Once you set up encryption on your wireless router, write down the method you are using as well as the key (a long string of cryptic-looking characters), because you will need this to set up encryption on each of your computers that will use the wireless network.
  • Disable broadcasting of your SSID. By default, the SSID (your wireless network’s name) is broadcast to anyone with a wireless network card. Although this makes it easy to configure your computers to access your network, it also makes it easy for outsiders to know about your network. By disabling SSID broadcast, no one will ever see your network.
  • Limit the number of IP addresses your wireless router allows on the network. By default, your wireless router will assign an IP address to as many computers that request one. If you limit the number of addresses that the router’s DHCP server assigns to just the number that you need, you will “block” all other computers that try to connect to your network.
  • Use MAC address filtering. You can configure your wireless router to only allow certain computers on the wireless network by including each computer’s MAC address in the list of “allowed” users. A MAC address is a unique physical address that is hard coded onto each network interface card. It is much like a serial number, as every MAC address is unique.
Find your network card’s MAC address by opening up a command prompt and typing in ipconfig /all. Look for something that says “physical address”, and the series of letters and numbers following this is your MAC address. It will look something like this: 00-06-5B-CE-DA-B5. Key this information into the wireless router’s MAC address filtering setup under MAC address 1. Repeat this process for every computer on your network, using MAC address 2, 3, and so on.

In addition to securing your wireless network, there is one more thing you need to do to make sure your wireless network is safe:

  • Install a personal firewall on each of the computers on your wireless network. If an intruder does happen to get into your network, a personal firewall (also known as a software firewall) will keep him out of your computer. With a personal firewall running, the most an intruder can do is use your internet connection and your bandwidth; he will not be able to access your data.
 

Comments   

 
Jacket spot
0 #142 Jacket spot 2017-07-24 12:35
Please let me know if you're looking for a article writer for your site.
You have some really great posts and I think I would be a
good asset. If you ever want to take some of
the load off, I'd absolutely love to write some content for your blog in exchange for
a link back to mine. Please send me an email if interested.
Thanks!

Here is my blog - Jacket
spot: http://ttaogihyun.Synology.me/xe/H2/318501
Quote | Report to administrator
 
 
Vegetable Gardening
0 #141 Vegetable Gardening 2017-07-13 12:07
Yes! Finally something about landscaping az.

Also visit my weblog :: Vegetable Gardening: http://Deandrebutler.soup.io/post/626789256/How-To-Make-Truly-Efficient-Positive-Considering
Quote | Report to administrator
 
 
Anemonalove
0 #140 Anemonalove 2017-07-02 09:29
Hi guys! Who wants to see me live? I have profile at hotbabescams.co m, we can chat, you can watch
me live for free, my nickname is Anemonalove , here is my photo:

https://3.bp.blogspot.com/-u5pGYuGNsSo/WVixiO8RBUI/AAAAAAAAAFA/JWa2LHHFI2AkHParQa3fwwHhVijolmq8QCLcBGAs/s1600/hottest%2Bwebcam%2Bgirl%2B-%2BAnemonalove.jpg
Quote | Report to administrator
 
 
rs money
0 #139 rs money 2017-06-25 07:17
Hey are uѕing Wordpress for yoᥙr blog pⅼatform?
I'm new to thе blog world ƅut I'm trying to get started and create my
own. Dօ you need any coding eⲭpertіse to make your own blog?

Any help wouⅼd be really appгeciated!
Quote | Report to administrator
 
 
cheap fifa 18 coins
0 #138 cheap fifa 18 coins 2017-06-24 23:32
Ꭱemarkable! Its in fact amazing paraɡraph, I have
got much clear idea concerning from this post.
Quote | Report to administrator
 
 
Wayne
0 #137 Wayne 2017-06-24 22:18
I got this ѕite from my pal who informed me on the topic of this web page and
at the mmoment thսs time I am broԝsing this weeb sjte and
reading very informative articles or redviews at this time.
Quote | Report to administrator
 
 
trailer
0 #136 trailer 2017-06-24 20:23
Yoou actually make iit sеem so easy with your preѕentation but I ffind this matter to be
really something that І think I wkulⅾ never understand.
It seems toߋo complex and extгemely broad for me.

I am looking forwаrd foг your next ⲣost, I will try to get the hang of it!
Quote | Report to administrator
 
 
runscape gold
0 #135 runscape gold 2017-06-23 08:22
Hi evеryone, it's my first pay a visit at this site, and piece off writing is truly fruitfl in support
of me, keep up posting these types oof articles.
Quote | Report to administrator
 
 
Freda
0 #134 Freda 2017-06-22 02:05
Hello і am kavin, its my firѕt time tto ϲmmenting anywhere, when i
read this post i thught і could alѕo make comment
dᥙe to this sensible article.
Quote | Report to administrator
 
 
cheap runescape gold
0 #133 cheap runescape gold 2017-06-09 06:21
Ηello I am so glad I found yօur website, I
reаlⅼy found you bу error, while I was looking on Gߋogle for something else, Nonethᥱless I am here
now and wouod just like to ѕay many thanks for a remaгrkable post аnd a all гoᥙnd
exciting blog (I also love the theme/design), Ⅰ don’t have time too
rеаd іt alⅼ at the minutе Ьbut I havge saved itt and alpso added in your
RSS feeds, sso աhen I have time I will be bacқ to read a great deal more, Please
do keep up the superb work.
Quote | Report to administrator
 

Add comment


Security code
Refresh

OS X Keyboard Shortcuts

Startup  
Key Effect
C Start from CD
D Start from 1st Partition
N Start from Net Server
R Resets laptop screen
S Single-user boot
V Verbose Mode
OptPR Zap PRAM
V Unix console msgs
   
Power Keys Effect
Ctrleject icon Shutdown, sleep, restart
Opteject icon Sleep
CtrlOpteject icon Shutdown
Ctrlpower Restart

 

 

 

 

 

 

 

 

 

FTC 16 CFR Part 255 Disclosure

Since 2006, iTechGuide.com has provided independent reviews. Our reviews, ratings and awards are not based on any incentives or commissions. Notwithstanding, to keep our service online we accept compensation from some of the companies whose products we review within and outside of the IT industry, including, but not limited to, paid advertising placements, referral fees, and in-content advertising links.

English French German Italian Portuguese Russian Spanish

Popular Content

Partners