Username: Save?
Password:
Home Forum Links Search Login Register*
    News: Welcome to the TechnoWorldInc! Community!
Recent Updates
[April 24, 2024, 11:48:22 AM]

[April 24, 2024, 11:48:22 AM]

[April 24, 2024, 11:48:22 AM]

[April 24, 2024, 11:48:22 AM]

[April 03, 2024, 06:11:00 PM]

[April 03, 2024, 06:11:00 PM]

[April 03, 2024, 06:11:00 PM]

[April 03, 2024, 06:11:00 PM]

[March 06, 2024, 02:45:27 PM]

[March 06, 2024, 02:45:27 PM]

[March 06, 2024, 02:45:27 PM]

[March 06, 2024, 02:45:27 PM]

[February 14, 2024, 02:00:39 PM]
Subscriptions
Get Latest Tech Updates For Free!
Resources
   Travelikers
   Funistan
   PrettyGalz
   Techlap
   FreeThemes
   Videsta
   Glamistan
   BachatMela
   GlamGalz
   Techzug
   Vidsage
   Funzug
   WorldHostInc
   Funfani
   FilmyMama
   Uploaded.Tech
   MegaPixelShop
   Netens
   Funotic
   FreeJobsInc
   FilesPark
Participate in the fastest growing Technical Encyclopedia! This website is 100% Free. Please register or login using the login box above if you have already registered. You will need to be logged in to reply, make new topics and to access all the areas. Registration is free! Click Here To Register.
+ Techno World Inc - The Best Technical Encyclopedia Online! » Forum » THE TECHNO CLUB [ TECHNOWORLDINC.COM ] » Techno Articles » Mobile Computing
  3 Important Techniques for Securing a Wireless Network
Pages: [1]   Go Down
  Print  
Author Topic: 3 Important Techniques for Securing a Wireless Network  (Read 992 times)
Daniel Franklin
TWI Hero
**********


Karma: 3
Offline Offline

Posts: 16647


View Profile Email
3 Important Techniques for Securing a Wireless Network
« Posted: October 23, 2007, 05:29:53 PM »


Have you recently gone wireless? If you have a wireless network at home or in the office, it is critical to have it secured. Wireless networks are prone to attacks from outsiders - perhaps even more so than with wired networks. This article shows how you can implement 3 techniques to secure a given wireless network.

1. Disable Broadcast SSID
One of the key things to do is to secure a wireless network is to disable broadcast SSID. WiFi WLANs identify themselves with a service set identifier (SSID), which names the network and works (loosely) like a password.

Unfortunately, most wireless access points transmit their SSIDs by default, which is pretty much like standing in the street and shouting your bank card PIN. Unless you have equipment that requires the access point to broadcast the SSID, turn this feature off. If you do leave it on, change the SSID to something other than the default.

2. Turn on WEP
Another thing to do is to turn on WEP, and use 128-bit keys. You shouldn’t rely on WEP to be absolutely secure, but the cracker next door isn’t less likely to have the tools, systems, or know-how to break it. WEP is a lot better than nothing (unless you’re using 64-bit keys, which are far weaker than 128-bit keys).

Access points and adapters typically let you set up the WEP key either by typing a passphrase or by entering a hexadecimal (base 16) value. We’ve had trouble making passphrases work across multiple vendors’ equipment, so we recommend generating a hexadecimal value using a long passphrase and then using the hexadecimal value everywhere. Keep a copy of the key somewhere secure because you can’t be sure you can regenerate it later.

3. Set MAC address restrictions
You should also set MAC address restrictions. Most access points let you list the physical (Media Access Control — MAC) address of equipment allowed to connect to your LAN. A typical MAC address looks something like 00-0C-38-55-F4-AD. You can use a MAC restriction list containing all your devices to ensure only authorized devices connect, although you can’t limit who might be able to listen.

Conclusion
Hopefully, this article has shown you how you can secure a wireless network to give it some basic level of protection against attackers. Good luck and happy networking!

Gary Hendricks runs a hobby site on building computers. Visit his website at http://www.build-your-own-computers.com for tips and tricks on assembling a PC, as well as buying good computer components.

Article Source: http://EzineArticles.com/?expert=Gary_Hendricks

Logged

Pages: [1]   Go Up
  Print  
 
Jump to:  

Copyright © 2006-2023 TechnoWorldInc.com. All Rights Reserved. Privacy Policy | Disclaimer
Page created in 0.103 seconds with 24 queries.