The Shocking Truth About Wireless Networks
The Shocking Truth
The shocking truth is that many wireless network users out there, and you could be one of them, are not securing their wireless modems at all. This is further confirmed by a television program I saw in which a television presenter drove down a street until he found a signal from an unsecured wireless router being used in a nearby house. He then hacked into this mans computer and recorded his entire Internet activity including websites visited, items purchase, holidays booked, passwords and even credit card details. When the unsuspecting computer user was confronted with the information gathered about him he was understandably upset. He had been sold the modem with security software by a high street store that had told him that this would provide adequate security. They were wrong!
How to Secure Your Wireless Network
Although every wireless router is different and will have its own instructions these can sometimes be hard to follow, the steps below will help to guide you through the process.
Set Up Your Modem Password
Every router can be set-up by using your browser to access it by typing in its IP address. This IP address can be found in your router instructions and will be something like this:
http://192.168.1.1
When you have input this address into your browser and pressed enter you will be taken to a login page where you must input the user name password. By default the router will have a generic password which you will also find in your instructions. Login using the default details and then navigate to the 'change password' page where you can change it to your own secret password.
If you do not do this, a hacker could gain access using the generic password. After any changes have been made you must apply the changes and restart your router. Your instructions will tell you how to do this.
2. Configure Your Router for Data Encryption
Login to your router as outlined above and browse to the security page where you can set-up your security type and input a cipher key. Most of the settings in these pages should be left as they are if you don't know what you are doing. You can usually choose between different types of security, such as WEP, 802.1 or WPA. There are different opinions as to, which is best, I personally use WEP. If there is an 'enable WEP wireless security' check box or similar you must check it. You will then need to make up a cipher key using hexadecimal digits, which consist of random numbers from 1-9 and letters from A-F. I recommend a minimum of 128 bit encryption which will need a 26 digit key. If you wish to use 256 bit encryption your key will have to be 58 digits long. Input this key into the form provided and make a note of it for setting up your other computers. As stated above you will now need to apply any changes made and restart your router.
3. Configure Your Wireless Enabled Computers
After setting up the above encryption on your wireless network you will then need to input your new cipher key into each wireless computer that you want to connect to the network. Your other wireless enabled computers will search for any wireless network it can find and then ask if you would like to connect. If you attempt to connect to a newly set-up encrypted network it will ask you for the cipher key. Input the cipher key you made up in the previous section and click 'connect'. When doing this for the first time it may take a while for the new configuration to take effect so be patient before trying to use it. The next time you boot up your wireless computer it will connect automatically.
4. Install Internet Security Software
Whether you have a wireless network or not, it is essential nowadays to protect you computer by using good quality internet securities software. Purchasing this from a reputable security company is recommended to ensure that your software is kept up to date with the most recent virus signatures. If you are not up to date, an unrecognised virus will not be stopped by the software. It is not advisable to use a free anti-virus service as these do not provide adequate protection and are a false economy. Security software will also detect and block any attempt to hack into your computer via the internet or local network. Recommended internet security software companies are - Norton, McAfee and others.
Conclusion
In short then, following the above procedures will make it very difficult for the would be hacker to use your wireless network to gain access to your computer. I also strongly advise you to read your wireless router manual thoroughly.
Related Tags: networking, computer security, wireless network, network security
Speed up your PC. Clean your registry Now at http://www.registry-cleaner-magic.com/error-doctor/
Your Article Search Directory : Find in ArticlesRecent articles in this category:
- What Is An Sd Card? What Are Main Types Of Sd Cards
Manufactured as a competition offering to Sony's Memory Stick, the SD Card was developed by the SD C - Industrial Computers
In this day and age you can't afford to run an industry efficiently without a computer as it plays a - Computer Fix Services - Tips To Choose Good Quality Personal Computer Maintenance Online
Online computer repair services have become a fast and reliable problem solution for day to day tech - Reverse Engineering Romer For Aerospace
One of the most amazing things about reverse engineering is its significant contribution in any fiel - How To Buy The Best Projector Bulb
It is very important for you to know the right time to change the projector bulb before it will burn - Laptops Vs Desktops- Their Significance
Computers obviously are commonly used for more or less everything from entertainment to office work. - Cooling Your Laptop
It is common knowledge that laptops are commonly used by everyone but one must also know how to take - Dymo Labelwriter Fast Performance & Reliability
I don't think I'm the only one who has gotten tired of trips to the post office, standing in endless - Buying Dell Laptops A Long Time Investment
Today if you go to an office or a school, Dell laptops can be seen very commonly. Though we do not b - Hard Drives - Digital Space
The first hard drives (Hard Disk Drives, HDD) were developed by IBM in 1956. Since then the need for
Most viewed articles in this category:
- Video Killed the Beautiful View
"The sound brought our group to a stop; we turned around to see the ice mass collapse with a roar. A - Crossfire: The Dual GPU System Gamers Want
CrossFire is the new dual graphics card system from ATI. It offers remarkable image quality improvem - Canon PIXMA IP1600 Photo Printer Review & Its True Cost of Ownership
With Canon PIXMA iP1600 Inkjet Printer you can make high quality photo printings at home. No need to - Basic Information about Nero Burn DVD
Nero is a popular burning ROM designed to burn DVD's. The way this product got its name is very inte - The Development of the Vital IBM PC in Spite of the Corporate Culture of IBM
The public history of the PC began in August 1981, when IBM first announced "The IBM Personal Comput - PC Repairs
PC Repairs are often needed when we need our computer the most. One way to take away many problems o - Affordable Computer Printer Ink
The computer - once considered a luxury item - has easily become a staple in today's modern homes; a - Build your Own PC
Build your own PC! Simple and Fun. Just follow these instructions and you're on your way to a rel - Extending the Life of an Inkjet Printer with Proper Cleaning and Maintenance
Inkjet printers are becoming another "throw away" electronic device due to reducing costs and high i - Check Printers
A check printer is a printer that hooks up to a computer that has the capability of printing checks.