I don't know if you have been plagued by the nuisance of the network card, in fact, as long as you set up your own network, the network card will be invisible, the most important is still encryption In terms of methods, ordinary encryption methods can't resist the NIC or some hackers. Today, teach you how to encrypt.
So, how to protect our wireless network security? The most direct way is to give our wireless security lock, which is to set a password for our wireless network, which is equivalent to a The key, the user can hold this key to access our wireless network, so the hard-hitting person has to be "indecent".
To know how to protect our wireless network, first of all, we must first understand the mainstream wireless encryption method, which is WEP, WPA, WPA2 and the security settings often found in wireless routers. WPA+WPA2 encryption methods.
WEP (Wired Equivalent Privacy). A data encryption algorithm used to provide protection equivalent to wired LAN. Its security technology is derived from RSA data encryption technology called RC4, which is the necessary security layer for wireless LAN WLAN. Currently common are 64-bit WEP encryption and 128-bit WEP encryption.
WPA (WiFi Protected Access). The WPA protocol is a system that protects wireless network (WiFi) security. It is based on the previous generation of Wired Equivalent Privacy (WEP) and solves the problem of the predecessor WEP. It uses TKIP (Temporal Key Integrity). The protocol is a transitional solution in the IEEE 802.11i standard. Among them, WPA-PSK is mainly for individual users.
WPA2, an upgraded version of WPA encryption. It is the authentication form of the IEEE 802.11i standard verified by the WiFi Alliance. WPA2 implements the mandatory element of 802.11i. In particular, the Michael algorithm is recognized as a completely secure CCMP (Counter Mode Cipher Block Chain Message Complete Code Protocol) message authentication code. Instead, the RC4 encryption algorithm is also replaced by AES (Advanced Encryption).
WPA-PSK+WPA2-PSK. It can be seen from the literal, it is obvious that the last one is a combination of two encryption algorithms, which can be said to be a strong combination. WPA-PSK is also called WPA-Personal (WPA Personal). WPA-PSK uses TKIP encryption to link wireless devices to access points. WPA2-PSK uses AES encryption to link wireless devices to access points.
Several mainstream encryption algorithms for wireless devices are listed, and they are also introduced one by one. How many security modes are better or worse? Which security should users choose during use? Modes? Will they have any effect on the speed of wireless transmission? Let's take a look.
1, better than no WEP
WEP as an old-fashioned encryption method, it is characterized by using a static key to encrypt all communications, which means that if the network administrator In order to update the key, each host must be accessed in person, and the RSA data encryption technology adopted by the RC4 is predictable. It is easy for an intruder to intercept and crack the encryption key, so that the user's security protection is ineffective. It is not recommended to choose this security mode if it is a last resort.
2, upgraded WPA
After WEP, people will turn to their upgraded WPA. Unlike the previous WEP static key, WPA needs to constantly convert keys. WPA uses an effective key distribution mechanism that can be implemented across wireless NICs from different vendors. As an upgraded version of WEP, it is more secure than WEP in security protection, mainly in the aspects of identity authentication, encryption mechanism and packet inspection, and it also improves the management capabilities of wireless networks.
Know the common process Just press “Ctrl+Alt+Del” to open the task manager, click &ldquo
WinXP use the default Windows Media Player to watch WMV video always appear flower screen, this situ
There is a really nice new feature in Windows XP: Add the “read-only' property to the USB
From Windows XP, Windows provides a feature called Security Center, including automatic updates, ant
After the computer overclocking, the network card has a solution
Boot.ini boot file to modify the Windows boot screen
Share the problem of SATA hard disk installed XP system
A recipe for preventing the damage caused by SSLtrip
Thunder download has a high trick, good configuration is king
The "murderer" that caused the notebook to slow down is exactly who
Quickly install Windows operating system exclusive cheats
The master's detailed explanation of the maintenance of the liquid crystal display
The magic Windows system boot method collection
Win10 WordPad saves documents in TXT format
Solve Windows8 system can not identify anti-virus software
How to install Office 2010 in Win8.1?
How to add news to the Edge browser reading list under win10 system
Win8 Quick View of Computer Port Skills
Win8 system dual graphics card switching method diagram
How to turn off Win8.1 and turn off wireless and Bluetooth?
How to keep IE8/9/10 win7 system IE11 shield update prompt method in Win7 system