How To Prevent Others Access your Network
Computers & Technology → Networking
- Author Luna Leng
- Published March 8, 2011
- Word count 389
As the title, there may be many friends have this problem. Well, follows are 7 ways that tell you how to protect your wireless network.
- Modify the SSID information, and prohibit the broadcast
Turn off SSID broadcast, can be greatly reduced chance of found, specific closed method see the router configuration interface.
- Using WPA2-PSK encrypted wireless network
Use AES of WPA2-PSK to encrypt, passwording setting as long as possible. Use uppercase and lowercase letters plus numbers plus symbol combinations, increase the difficulty of other’s crack. And set the group key update cycle in 12 to 24 hours (too short can cause the wireless connection exception), this can increase the difficulty of deciphering the password. Note that WEP WPA encryption algorithms have been solved now, if the older network card does not support WPA2 , should try to use WPA encryption and password with uppercase and lowercase letters plus numbers plus the combination of symbols can also play the purpose of encryption.
- Reduce the signal transmission power
Reduce the signal transmission power, wireless devices(such as wireless gateway router) can be reduced the discovery chance, through the antenna surrounded by cans, etc., this can transmit signals to directional emission, reducing the other direction signal, also can use the router comes with power regulation for Regulation (DD-WRT, TOMATO firmware also have this feature).
- Open the MAC address filtering
Add all of your own computers to the white list MAC, and prohibit other customers to access. Also, note that the filter can not prevent 100% of net rub, MAC sent in plain text, data transmission may result in MAC intercepted, others can modify the MAC, also access.
- Setting Channel
General routers default to channel 6, if multiple routers are made in a limited space channel 6, the signal will be very poor, users may be unable to connect to the router, so set the channel away from 6, but there are also some use 1,13,14 Channel, so these channels should be avoided, use the middle of the channel, such as :3-4,8-11. Reduce the chance of being found.
- turn off DHCP function
Turn off DHCP function reduces the chance of being found.
- Upgrade router firmware at regular intervals
Due to the different router brands, you can use your router manufacturer's official website to see if there is a firmware upgrade, the upgrade can fix some router security issues.
Relative website:
online shop for 3G wireless routers and modems
Article source: https://articlebiz.comRate article
Article comments
There are no posted comments.
Related articles
- Optimize Your Website for the Better Sight
- How To Develop & Implement A Network Security Plan
- Mastering VoIP: Overcoming Common Communication Challenges
- What Concerns Do Enterprises Have When Choosing Network Monitoring Software?
- Spectrum Router Red Light: Troubleshooting Guide and Solutions
- Web Development Made Easy: Why Outsourcing is the Smart Choice
- INTERNET OF THINGS
- Enhancing Business Communication with 3CX: A Powerful Unified Communications Solution
- How to Fix "No Signal, Please Check Your Antenna Connection" Error
- AN INTRODUCTION TO INTERNET MARKETING
- Passwordless is the New Cyber Security, Emir Ceric’s Meveto Transform Verification, Logging In and Remote Sign Out
- The Ultimate Guide to Master YouTube and Monetization
- Preventing data theft in an enterprise environment
- The Art Of Cold Calling [Mastery In Seven Simple Steps]
- Quantum Computing and the future of IT Security
- 5G TECHNOLOGY AND IOT: HOW DO THESE TRENDS RELATE?
- SkyVPN Launches New Gaming Servers with Dedicated Servers for PUBG
- Smm reseller panel
- Steps to Transfer Files Using Kindle Desktop Application
- Save time on your FTP updates with FTPGetter Professional
- Add a file hosting and sharing service to your site with YetiShare
- MCS Multicast Switch for Next Generation ROADM
- Business Networking Tips for Beginners
- Using Virtual Serial Ports in Proteus
- Network Security Checklist for All Types of Businesses
- Create Your Own File-Hosting Website with YetiShare
- Cat5 cable vs Cat6 Cables: What are the Contrast?
- Automate FTP Downloads and Uploads with FTPGetter Professional
- On Demand Freelance Marketplace For Field Engineers
- Cisco Network Infrastructure Services in San Francisco