Nowadays, everyone generally uses laptops, so the wired network is not so popular. On the contrary, wireless networks have become a must, but wireless networks have security risks. Is it good to protect it? In the previous tutorial, we have talked about some setup techniques for wireless networks. If you think that it will only be set up, then you are all wrong, because you still need to consider wireless security issues because he is Exposed, people around the effective range are acceptable. Today, I want to introduce you to the security of wireless networks.
Security has always been an eternal topic. With the popularity of wireless networks, the security of wireless networks is more prominent. Because wireless networks do not require physical connection to the wired network compared to wired networks, they are more susceptible to intrusion by connecting entirely with wireless electromagnetic waves. The system home secretly tells you: As long as we pay attention to the following items when using the wireless network, we can also ensure the security of the network.
1. Disabling SSID Broadcasting
Enabling SSID broadcast will help the wireless network client to automatically receive the SSID number without knowing the SSID setting of the wireless router. But for home users or friends with fixed users, there is absolutely no need to enable SSID broadcasts, because it is easy to establish connections for some unknown intruders. As an environment with a fixed user client, we can tell them the SSID identifiers and let them manually enter them directly to establish a connection.
2, set the key
For wireless settings, generally require us to perform security authentication settings. In this regard, although the key is set, it will increase the operational complexity of the use of the wireless client, but this is still very important compared to security.
3, filter settings
The general wireless broadband router will have filtering settings. Filtering generally includes two types of IP address filtering and MAC address filtering. The IP address filtering setting is relatively complicated. Generally, the operation window for creating a filtering rule is opened by clicking the button of “Add new item”, and then setting the IP address of the operation. For example, we can use the IP address that is allowed to be used. Add it in and set it to “Allow access", so that the IP address that has not been added cannot be connected; for the same reason, if you want more advanced security, you can allow access in MAC address filtering. The MAC address of the wireless client NIC is added and set to allow access.
4, the default settings can not be used
Since one of the most important devices in the wireless network is a wireless router or repeater. Generally speaking, the wireless access addresses of the same brand are the same, such as 192.168.1.1, etc., and the user names and passwords of the same brand are mostly admin; the SSID identifiers are also the same. If you do not modify these default settings, then the intruder can easily find these devices through the scanning tool and enter the management interface to gain control of the device. Therefore, modifying the default settings is one of the most basic security measures. This is not only useful for wireless network devices, but also for other ADSL, routing, etc. sharing the Internet.
Reinstalling the system using the u disk is currently the most common method, but in the process of
During the use of the computer, the blue screen problem is our most common problem. Recently, some u
In our daily work, we often use the screenshot function of the computer, and there are many kinds of
Most people use Thunder to download files, so how do I set Thunder as the default download software?
The reason why the system suddenly encounters a restart during work
How to install ADSL broadband connection in win7 system
Beware of misunderstandings: You need to do this after computer poisoning
How to ping Windows and VM without connecting the network cable
Windows, Centos dual system can not start the problem
Two computer maintenance corners that are easily overlooked
Three strokes teach you quickly Win2003 registry can not use the problem
Hard disk formatting partition prompt "cannot operate" error solution
Batch Advanced Commands: setlocal Command The
How to avoid the situation of pirated Microsoft system black screen
How to do computer C disk space 50G how to do
Analysis of several computer hardware common sense that must be known
Win8.1 how to remove the folder Win8.1 delete six folders methods
How to change the WIN7 family group password
The 64-bit version of Chrome tragedy in Win10 Build 10525 Three-step fix
Win10 starts the notepad method from the start menu
Win10 Mobile preview version 10240 will officially open the general application download August push
The desktop does not display the solution under Windows system
Implement Outlook and Foxmail mail mutual guidance