Feb 8, 2011

How to Secure a Wireless Network from Hackers?

Having a wireless network can be a good way for computers and laptops to connect to the internet but it is always key to make sure that the proper security is setup on a wireless network to prevent hackers or people from abusing a wireless network for the wrong purposes.

The reason a wireless network should be secured is to stop people from using the services of a network that don’t have the permission to utilize them. Although it is harder to secure a wireless network from hackers compared to a wired network is due to the fact that a wireless network can be accessed from anywhere inside the range of its antenna.

The following steps below will help you secure a wireless network from hackers

  1. Position the access point’s antenna in a place that restricts the range of its signal beyond the required area do not put the antenna close to a window because glass can’t obstruct it. Place it in a central location in the building.
  2. Use WEP, WPA, or WPA2 which stands for Wireless Encryption Protocol, Wi-Fi Protected Access, and Wi-Fi Protected Access 2. All three of these protocols will protect and secure your wireless network.
  3. Change the SSID; disable the broadcast of SSID which stands for service set identifier. SSID utilizes wireless access points which allow users to start wireless connections. Always select a unique SSID and if it is attainable hold back the broadcast of the SSID over the wireless antenna so that it won’t appear in the listing of networks.
  4. Disable DHCP doing this will prevent hackers from decoding TCP/IP parameters, subnet masks, and the IP address in order to hack a wireless network.
  5. Disable or modify SNMP settings: Change the private as well as public community settings of SNMP. You can also just disable it. Otherwise the hackers will be able to utilize SNMP to get significant info regarding your wireless network.
  6. Utilize Access Lists: For additional security of your wireless network, and if your access point support this feature, employ an access list. An access list lets us determine precisely which machinery is permitted to attach to an access point. The access points which include the access list can employ trivial file transfer protocol (TFTP) now and then in order to download modernized lists to steer clear of hackers.

These are the key six steps to protect your wireless network from intruduers invading and abusing the uses of a wireless network..

For more computer tips and tricks from New Millennium Computers please follow our weekly blog posts at http://newmillenniumpcs.blogspot.com

 

No comments:

Post a Comment

Related Posts Plugin for WordPress, Blogger...