When using a wireless network, do you often worry about your WiFi? "When you are smashed?" We can set MAC filtering in the router, or you can set it in Win8.1 system so that only Allowed people to access the network. The following is a small series to introduce you to the Win8.1 system wireless network encryption skills.
1. Wi-Fi Protected Access (WPA and WPA2)
Wi‐Fi Protects access to encrypted information and ensures that network security keys have not been modified. Wi‐Fi Protected Access also authenticates users to help ensure that only authorized users can access the network.
There are two types of WPA authentication: WPA and WPA2. WPA is designed for all wireless network adapters, but may not work with older routers or access points. WPA2 is more secure than WPA, but it cannot be used with some older network adapters. WPA is designed to distribute 802.1X authentication servers with different keys to each user. This is called WPA-Enterprise or WPA2-Enterprise. WPA can also be used in Pre-Shared Key (PSK) mode, which grants each user the same password. This is called WPA-Personal or WPA2-Personal.
2. Limited Equivalent Encryption (WEP)
WEP is an older network security method that can still be used to support older devices, but it is recommended that you do not use it. When WEP is enabled, a network security key needs to be set. This key may encrypt the information that one computer sends over the network to another. However, the WEP security mechanism is relatively easy to crack.
System Home Suggestions: It is recommended to use WPA2 whenever possible. It is recommended that you do not use WEP. WPA or WPA2 is safer. If you are trying to use WPA or WPA2 but they don't work, it is recommended that you upgrade your network adapter to an adapter for WPA or WPA2.
3.802.1X Authentication
802.1X authentication can help enhance the security of 802.11 wireless networks and wired Ethernet networks. 802.1X uses an authentication server to authenticate users and provide network access. On a wireless network, 802.1X can be used in conjunction with WPA, WPA2 or WEP keys. This type of authentication is typically used when connecting to an office network.
Our computer usually uses the sleep function, that is, the comp
Sometimes, you will find that manufacturers custom applications pre-installed on Windows 8 PCs are v
1. Press the windows+C key on the keyboard to bring up the charm bar, click “Set”; 2. Cl
Win8 notebook method for detecting battery information
A quick way to see if your Win8 system is healthy
Win8.1 software compatibility problem solution
Win8.1 upgrade Win10 failure error 0xc1900101-0x40017 What should I do?
Win8.1 how to remove the residual items of the control panel after uninstalling the program
How to retrieve the uninstall confirmation dialog for Win8 system
How to open and reduce the win8 magnifying glass
Lenovo Win8 notebook mouse wheel no response how to solve
How to do Windows 8.1 CPU share?
How to set different network locations for Windows 8 system
Win8 boot prompt "Your computer has a problem need to restart" What should I do?
Win10 10240 activation failed and error 0xC004C003 solution
How does the Win7 system save web pages as images?
Vista workstation system security measures
Win7 boot prompts for a long time not logged in. Remember how the password has expired?
Clever use of Thunder download skills six
Solve four typical failures of IE in the system.
Routers are also entering the era of wireless
Change DNS server to solve the problem of Win10 system update download failure