Wireless technology has been used many products. Ranging from cordless phones, cellular to the notebook. Many users are comfortable with this hardware. Understandably they were not in a more-complicated by the brittle cable.
However, wireless network was vulnerable to the problem and not free from threats. Here are tips from CNET him safe.
Step 1: Know your network
Learn how your wireless device to work. Inside the cable technology, data is sent from the computer to the web via a cable connected to the port. In contrast with wireless technology, data is sent via radio waves. Without security, one particular device can take it away.
Step 2: Change Password and SSID
The first tactic, hackers are opening the door to know the personal identity. Each wireless network, from large corporations to home-based scale, has a number SSID (service set identification) To protect in order not to give way, you should change the SSID number and password.
Step 3: Set up MAC Filter
This step supposing change the key to the house by leaving the key in the door. Media Access Control (MAC) is a filter that gives you control over many of the access network. If not change it, the hackers may use it.
To make computers more specifically, you need an additional 12-digit MAC addresses on each device such as PC, notebook or router. MAC filtering process is different for each device, but in many ways opened the wireless software and melokalisasinya's the right thing. Find the MAC addresses for each device.
Step 4: Encrypt, encrypt, encrypt
Encryption is the key. There are two types of rule mengenskripsi: WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access). Both block intruders, which is usually more secure WPA for a dynamic process. When you can not access the WPA encryption, a combination of WEP and MAC filters usually enough to deter hackers. In short, WPA is a newer router instead of WEP.
Step 5: Fill in the Gap with Software
In all types of security, hackers trying to incapacitate any way. The software may be able to protect him. Software such as Trend Micro PC, Zone Alarm Internet Security Suite and McAfee Wireless Home Network Security can monitor your wireless network and alert you when there is an intruder. Product from AOL called Active Security Monitor will diagnose and protect your network and recommend improvements if needed.
However, wireless network was vulnerable to the problem and not free from threats. Here are tips from CNET him safe.
Step 1: Know your network
Learn how your wireless device to work. Inside the cable technology, data is sent from the computer to the web via a cable connected to the port. In contrast with wireless technology, data is sent via radio waves. Without security, one particular device can take it away.
Step 2: Change Password and SSID
The first tactic, hackers are opening the door to know the personal identity. Each wireless network, from large corporations to home-based scale, has a number SSID (service set identification) To protect in order not to give way, you should change the SSID number and password.
Step 3: Set up MAC Filter
This step supposing change the key to the house by leaving the key in the door. Media Access Control (MAC) is a filter that gives you control over many of the access network. If not change it, the hackers may use it.
To make computers more specifically, you need an additional 12-digit MAC addresses on each device such as PC, notebook or router. MAC filtering process is different for each device, but in many ways opened the wireless software and melokalisasinya's the right thing. Find the MAC addresses for each device.
Step 4: Encrypt, encrypt, encrypt
Encryption is the key. There are two types of rule mengenskripsi: WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access). Both block intruders, which is usually more secure WPA for a dynamic process. When you can not access the WPA encryption, a combination of WEP and MAC filters usually enough to deter hackers. In short, WPA is a newer router instead of WEP.
Step 5: Fill in the Gap with Software
In all types of security, hackers trying to incapacitate any way. The software may be able to protect him. Software such as Trend Micro PC, Zone Alarm Internet Security Suite and McAfee Wireless Home Network Security can monitor your wireless network and alert you when there is an intruder. Product from AOL called Active Security Monitor will diagnose and protect your network and recommend improvements if needed.
0 komentar:
Post a Comment