sâmbătă, 29 decembrie 2012

How to secure your Wireless Network from being hacked? - Computers

Insecure Wireless Netwok:

wirless is very insecure when compared to the classic Wired network. Because the It can accessed from anywhere within the range of its antenna.

In order to protect our wireless from being hacked. We should take some steps to secure ourselves. If you don't secure this from hackers, you might end up without its service

Strategic antenna placement:You must take care about the antenna placement.

* You should not place the antenna near to windows because glass can't obstruct its signals. * place which restricts the range of its signal to go further than the required area. * Place it in a central location of the building so that it can be restricted inside the building.

Use WEP:WEP stands for Wireless Encryption Protocol(don't confuse with WAP-Wireless Application Protocol). It's a customary technique for encrypting traffic . If you didn't use this method ,certainly you will loose your traffic .

Change the SSID, disable the broadcast of SSID:SSID stands for Service Set Identifier. It is the recognition thread utilized by the wireless access point due to which the customers are capable of starting connections. For every wireless access point arranged, select an exclusive as well as unique SSID. Also, if it's attainable, hold back the broadcast of the SSID out over the antenna. It won appear in the listing of offered networks, while being able to provide services as usual.

Disable DHCP:By doing this, the hackers will have to decode the TCP/IP parameters, subnet mask as well as the IP address in order to hack .

Disable or modify SNMP settings:Change the private as well as public community settings of SNMP. You can also just disable it. Otherwise the hackers will be able to utilize SNMP to get significant info regarding your wireless network.

Utilize access lists:

For additional security of your wireless network, and if your access point support this feature, employ an access list. An access list lets us determine precisely which machinery is permitted to attach to an access point. The access points which include the access list can employ trivial file transfer protocol (TFTP) now and then in order to download modernized lists to steer clear of hackers.



access point vs router

Niciun comentariu:

Trimiteți un comentariu