Saturday, October 6, 2007

How do you secure your wireless network?(Assignment 4b)

Because of the convenience of a wireless network, people using wireless to access the internet is now very popular and advantageous. However, beginner computer users usually do not understand how to secure their wireless networks. It is not very hard to eaves drop a wireless network if the owner of the wireless network does not set a password or other identification.
There are several ways to secure your wireless network all of which can be done together to prevent unauthorized network access:
1. Turn off broadcasting of your Service Set Identifier (SSID). The SSID is a broadcast message notifying every device within range of your network’s presence. Most wireless routers have the option to turn off broadcasting your SSID. This is by far the easiest way to prevent hackers from accessing your network.
2. Change the default settings of your router’s Web-based administration. Changing your admin login won’t stop anyone from intercepting your wireless traffic, but it will prevent them from changing your settings. Most wireless routers allow you to change your admin name and password. While you’re at it, change the name of the SSID. If someone detects your SSID as being named “Linksys,” they can assume that your default username is “admin” and your default password is “admin” because that is the factory setting.
3. Enable WEP (Wireless Equivalent Privacy) or WPA (Wireless Protected Access) encryption. WEP and WPA are ways of forcing users to enter a password, which is encrypted, before they can access a wireless network. WEP is the most commonly used, but some experienced hackers can still break the protection after a while. WPA is so far not crackable and is offered on the latest WiFi devices.
4. Allow access based on MAC (Machine Access Code) address. A MAC address is a unique number that every network-enabled device can be identified by, such as a fingerprint. Most wireless routers will allow you to set up access based on MAC addresses, allowing access to only the computers or devices which you have entered into the table. This can be more time-consuming but will certainly prevent all but the best equipped crackers from accessing your network. These four ways are powerful and effective ways to solve the problem, and are totally free. Everyone could just do it easily by themselves.

1 comment:

Roumen said...

great posting. you are only missing some multimedia.