Skip to main content

How to Secure a Wireless Wi-Fi Network

With the world going wireless in every sphere of technology, the question of security has often been raised. The same is true for wireless internet networks or Wi-Fi networks with hackers and Wi-Fi intruders always looking for ways to gain access to unsecured networks. There are several reasons why you might want to protect your Wi-Fi network. Prominent among them include better privacy, reduced internet bills and faster internet speeds.This post contains few simple techniques you can use to make sure that your wireless network is as secure as it possible can be.

Protect your Wireless Internet Network

1) Encrypt your Wi-Fi Network: When you use a Wi-Fi network for accessing the internet, every piece of data you send and receive over the air can be easily snooped by anyone with the right set of tools. Packet sniffers can be used by even the most novice of users to sniff your data. This means that a hacker can not only see which websites are you accessing but also get the login details of your personal and professional accounts. 

Encryption basically involves scrambling the data that is transmitted and received by you while using a wireless network. This means that even if a hacker intercepts your data transmission, (s)he will not be able to exploit the information contained within it.
Protect WiFi Internet Network

There are two encryption standards available that you can use: WEP (Wired Equivalent Privacy) and WPA (Wireless Protected Access). WEP is the older standard of encryption and can now be bypassed in a matter of minutes. WPA is relatively newer but it still has security holes. AirCrack and coWPAtty are two free tools that allow anyone to easily crack WEP and WPA encryption using bruteforce technique. WPA2 is the latest standard and is what you must use if you want the highest level of protection for your wireless network. The encryption keys used change each time a device accesses the network making WPA more difficult to hack. 

The encryption used by all devices in the network must be the same for the network to work properly. Your network will only be as secure as its least secure device. Make sure all devices you use support WPA2 encryption. Use a strong encryption key. Make sure that it is longer than 10 characters and contains a mixture of capital and small letters, numbers and symbols. Do not use common words and stuff that people can guess about you as your password. 

2) Replace default passwords on your router with strong passwords: The biggest mistake most wireless internet users make is not changing default passwords on their routers. Hackers utilize public databases that contain default passwords and usernames from virtually every manufacturer. This enables them to change the security settings of your router according to their needs. Using a strong password for your router ensures that hackers and miscreants cannot change your network's security settings. To change the password on your router, visit Administration settings on your router's settings page. Also, do not store passwords in browsers as they can be easily made visible.

3) Change default SSID
Your network's SSID or Service Set Identifier is the name of your wireless network. Usually, the SSID is the name of the router's manufacturer along with the model number of the router. Changing it to not display this information prevents you from giving additional information about your router to prospective hackers.

4) Do not broadcast your SSID
Hiding SSID prevents unsophisticated and inexperienced hackers and wifi intruders from determining that your network exists. Hiding your SSID is relatively easy and the option to do so is usually under basic wireless settings on your router's settings page. However, it is important to note that some devices, including those running newer versions of Windows, will show every network even if they cannot identify its name. Moreover, your network will still contain the SSID in data packets making unmasking ridiculously easy with tools like inSSIDerKismet and Commview for WiFi

5) Use scary names to discourage Wi-Fi theft: If your wireless network has a name like C:\virus.exe, most people who might otherwise access your network will not for the fear of getting their devices infected. You can use your creativity to find more dangerous names for your wireless network.

6) See Connected Devices List: Almost every new router will have a page which displays the list of every device that is connected to the network. You should check this page at regular intervals to see that unknown devices are not leeching your network. When you see an unknown device, you can be certain that someone has breached your network. You can try AirSnare, a free utility which scans your network for unexpected MAC addresses and also looks into DHCP requests.
Secure Wireless Network

7) Turn off Guest networking: While most routers will have guest networking disabled by default, it always pays to see that you may not have accidentally enabled it. Guest networking allows others to access your network.

8) Enable MAC address based filtering: Media Access Control or MAC address identifies each device connected to your network. MAC address is an alphanumeric key separated by colons. Enabling MAC address based filtering allows only devices having particular MAC addresses to access your network. You need to enter the MAC address of every device you wish to allow to connect to your network on your router's settings page. This prevents unknown devices from connecting to your network even if they know your password. To find the MAC address of your computer, open command prompt and execute “ipconfig /all” without quotes.

While it may prevent inexperienced users from getting access to your network, experienced hackers and advanced users can use a wireless network analyzer like Nmap and then change the MAC address of his computer with another free tool MAC Shift.

9) Keep your firmware up to date: Router vendors regularly release firmware updates and post them on their websites. You should occasionally check the manufacturer's website to see if a new firmware update has been released. Newer routers will automatically inform you when new firmware is available.

10) Reduce wireless signal range: If you reduce the range of your wireless network, common sense tells that it will prevent hackers located at a distance from detecting your network. This has the advantage that if hackers do not know that a wireless network exists, they will not try to break into it. You can place your router at places which would block the Wi-Fi signals. While this technique is advantageous, a hacker keen on hacking into your network will just have to use a larger antenna to pick up your router's signals. Moreover, reducing the range of your wireless network might cause troubles for genuine users. 

11) When not using your internet network, turn it off: This is self explanatory. If you are not using your network, turning it off saves you from giving extra time to hackers to try and hack into your wireless network. While it may be impractical to turn every device on your network off every time you are not using the network, it still is advisable to do so during extended periods of non use.

If you follow all these techniques, your Wi-Fi network will be a lot more protected and hackers will have a tough time breaking into it.

Comments

Popular posts from this blog

Maxon Cinema 4D Studio R13.058 full Keygen Cracked Version | Mediafire Torrent Download Link

Download Maxon CINEMA 4D Studio Full Version With Keygen -Everything You Need for High-End 3D 32 and 64 bit MAXON CINEMA 4D STUDIO R13.058 (x86/x64) CINEMA 4D Studio is the very best that MAXON has to offer for professional 3D artists. If you want to create advanced 3D graphics but need a helping hand to ensure you create jaw-dropping graphics quickly and easily, then this is the choice for you.                     All You Ever Wanted This is our top-of-the-line product. It not only contains everything the other CINEMA 4D versions offer - it goes far beyond. CINEMA 4D Studio has all the tools you need to tackle even the most complex project. Minimum System Requirements Windows XP, Vista or 7 running on Intel or AMD CPU with SSE2-Support; Mac OS X 10.5.8 or higher running on an Intel-based Mac; 1024 MB free RAM, DVD ROM drive. Standard DVD installation can take up to 4 GB of disk space. Software m...

Minitool Power Data Recovery 6.6 Activation Key

- Technician License: MSMCS3KFS58YUPUYVA3388SVC4PPC4P8 SS45A5MMPAXAU3CXKAA8U88A5CY3SVPU ASAAXUKCVM8UYXMSKVXSU55A5434UKP5 5S8P4UMC8544M8A5K88KAPC8W4CKK8PM 4SSXYAMWUM8SSASKYXSMSY35WCKX5PPK ASK4M3M4MAF3C3MXFWUWSV3MV4PKMCPY SSFF3PM835YK8UUVMPFW4SCSMC3YXAPY 5SXVFYMY8MF333SYKMY8KCPUP4AWYFPU CSVKKSKV45MM58M8MUKWA4KUKCA5AWP5 YS8C88KPFMKFK5P84WUAMSU3CC4U8AP4 CSY54KMVFMY8CU4AS5PPPUYP8CP3F8PM 5S3CMXM38AUKYPYUSWVVW3FPX4VUVCPM CS58YMKC3AVVU4KK8843WSYKKCY8M8P5 MSVKKSMUXMWVF5KU4AMM4AV8Y4A55WPU - Enterprise License: 33M5V84A3V44AMVUWVUFXKWXCCU3SUUC X3PFS54PM5SFCKP5W5YY4VXCS44YPWU3 K3KSKP434MWKASWYUK3PPXVP8CWS3PUX P3A3PM4U8VM4F4SKCCPP845FA48X5CUV U3Y5AK4335SXAYWPC3CA4MK834U8XYUX K3M8SXPS4MUXCAY5X4K4A5A5FCW3UFUS K35KC843YAW4UXFFFWMAX8V8FCYVCWUX K3FAW84CWV3UCY35K5YY4UY33CKSUXUX 83PCFMPXY5PVFKKY8KKFMAV45C4UP4UW 8388PU48AAWVAKCVA5FP4853ACSFVCU3 U3YVYU4SXM834AUXWVWAWV3434WPKSUC F3YSS5PMVAWWWSCYFKCFX85SPCP4WWUA 33MY5S4UXVUS45YCMY5UPKVY4CXV5MUV F3XFK445A55A48CWX4SWM3VSWCVYFPU...

The Man Killing Game: Blue Whale Game

Hi Folks,  Today am gonna share with you some information about the game that went too horrifying. Last day I saw a news, titled a 14-year-old Mumbai, Indian boy died by playing a game.  So, I was wondering how could it is even possible for a game to kill a man, Then I searched over Google to find some mysteries about the game.  The name of the game was "Blue Whale" since its name can mean a game about blue whales!! Guys, you are wrong!. Blue whale game is a Virtual game. It cannot be downloaded like other games you download from playstore or apple store. You cannot find the link to download this game by just searching over the internet. The link of this game is shared so secretly using private chat rooms and forums. This game was developed by a 21-year-old Russian guy named "Phillip Budikin" , he says that he developed this game in order to remove all the wastes from the world. It simply means: He wants everyone to die. So, this game is a death...