Skip to main content

secure wifi/wireless networks in securetecho

How to Secure Your Wireless (Wi-Fi)Network in securetecho:


Visit Timeshares
secure wifi networks
Wireless Networking: Wireless Networking (Wi-Fi) has made so easy concept for anyone to use Internet on your computer, mobile phones, tablets and handholders other wireless devices anywhere in the house without the cables wires.With traditional wired networks, it is extremely difficult for anyone to steal your bandwidth/speed of the signals but the big problem with wireless signals is that others can access the Internet using your broadband connection even while they are in a neighbor or sitting outside your home.

How to Secure Your Wireless Network:

It is a great news that now it is easy to secure our wireless network, which will both prevent from others of stealing your internet access and will also prevent from attackers of taking control of your computers through the use of your wifi network.
Here a simple few methods,with that you should to secure your wireless network:

Step 1. Create a unique password on your router

First, you need to know how to access or login your wireless router’s settings. Usually you can do this by write“192.168.2.2” into your browser, and then enter the correct user name and password of the router. This is different for each router, so that first check your router’s user manually.

Once you have login to your router, the first thing you should do to secure your network is to change the *previous password* of the our router to more secured.
This will prevent others from accessing the our router settings and you can easily maintain the security settings that you want. You can change the password from the Administration settings on your router’s settings page. Generally these two are the default values like admin or password.

Step 3. Change your Network’s SSID name

The SSID(Service set identifier) of your Wireless Router is usually known as “default” or it is set as the brand name of the router. Although this will not make your network inherently* more secure, changing the SSID name of your network is a great idea as it will make it more responsive for others to know which network they are connecting to and it have a more secure setting.
This setting is usually under the basic wireless settings in your router’s settings page. Once this is set, you will always be sure that you are connecting to the right Wireless network even if there are multiple wireless networks in your arena. Don’t use your name, home address or other personal information in the SSID setting .


Step 4. Enable Network Encryption

In order to prevent from others your internet connection, you need to encrypt your wifi signals.
There are several methods to encrypt your wireless settings, including WEP, WPA and WPA2 . WEP is basic encryption and therefore least secure, it can be easily hacked*, but is compatible with a wide range of devices including older hardware, whereas WPA2 is the most secure .it can not be cracked by the hackers. but is only compatible with hardware manufactured since 2008.

Step 5. Filter MAC addresses

Whether you have a wireless connection enabled laptop or a  mobile phone, all your wireless devices have a different MAC address . just like every computer connected to the Internet has a different IP address. For an addition layer of protection, you can add of all your devices MAC addresses to your wireless router’s settings so that only the specified devices can connect to your Wi-Fi network.
MAC addresses are hard-coded into your networking equipment, so one address will only let that one device on the network. It is unfortunately it is possible to spoof a MAC address , but an attacker must know one of the MAC addresses of the computers that are connected to your Wireless network before he can attempt spoofing attacks.

Step 6. Reduce the Range of the Wireless Signal

If your wifi router has a high range but you are staying in a small home or organisation, you can consider decreasing the signal range by either changing the mode of your router to 802.11g (instead of 802.11n or 802.11b) or use a different wireless channel.
You can also try placing the router under anywhere, inside a shoe box or wrap a foil around the router antennas so that you can somewhat restrict the direction of signals.

Step 7. Upgrade your Router’s firmware

You should check the manufacturer’s site occasionally to make sure that the latest firmware is running in the your router . You can find the existing firmware version using from the router’s dashboard at 192.168.#. of your router.





 



Comments

Popular posts from this blog

10 Best Ways to Track a Location by Mobile Number || Securetecho

Tracking a mobile phone's location through its contact number that might seem impossible at first, but it doesn’t have to be. It’s quite simple, there are two alternates to do so: 1)Using a mobile phone lookup service 2)Using a spy software In this paragraph, you will learn how to use it, and what to expect, and we will give you a list of the top 10 spy software in the market today. Numlooker - an excellent software for contact number tracking WhoCallMe - scan the deep web and conduct comprehensive social sites searches USPhoneSearch - includes all the basic features you need when tracking a contact number. USPhoneLookup - an excellent service that help you in finding out who is calling within minutes TheNumberLookup - allows you to instantly identify the caller and get access to all the available information about him. WhatIsThisNumber - the most standard and convenient reverse phone lookup service Spokeo - experience the expert service of phone lookup CocoSpy - access a phone mon...

Ethical hacking with full description in securetecho

                           ETHICAL HACKING Ethical hacking  refers to the act of locating weaknesses and vulnerabilities of computer and information systems by duplicating the intent and actions of malicious  hackers .  Ethical hacking  is also known as penetration testing. An  ethical  hacker is a computer and networking expert who systematically attempts to penetrate a computer system or network on behalf of its owners for the purpose of finding security vulnerabilities that a malicious hacker could potentially exploit. TOOLS FOR ETHICAL HACKING:               NMAP. Nmap stands for Network Mapper. ...     Metasploit. Metasploit is one of the most powerful exploit tools. ...     Burp Suit. Burp Suite is a popular platform that is widely used for performing security            testing ...