US Toll Free: 888-702-3410
THE FAS SOLUTIONS – Quality Software Development | High Quality Software Solutions
  • Home
  • About
  • Clients
  • Portfolio
  • Services
  • Technology
  • Blog
  • Contact
  • Home
  • About
  • Clients
  • Portfolio
  • Services
  • Technology
  • Blog
  • Contact

Why & how to secure your network

Home » How to » Why & how to secure your network
  • Fakhar
  • September, 2011
  • How to, Security, Tips
  • 7 Comments
  • Share It

Most people don’t really realize the risk of leaving their wireless network wide open. I think they understand that it means that anyone can use their internet connection, but I don’t think they understand the issues beyond that. Honestly, here’s what an open wireless network allows a hacker to do:

  1. One can sniff all of your information going out to the internet including credit card numbers, social security numbers, pictures, chats, everything.
  2. One can browse through your files, email, etc. Let’s hope you don’t have any risqué pictures on your computer of yourself, because if you do, one can have them, too
  3. One can take over your computer, your web cam, your mic. So, not only will one can see all of your communications, can also be able to listen to you and watch you when you’re not even ON the computer
  4. And worst of all, one can commit crimes online and have you take the heat for them because your internet connection is being used.

Are you taking wireless security seriously yet? Apply the following simple steps to mitigate your exposure.

  1. Create a strong router administrator password – If a wireless router does not have a strong password and someone able to crack the password from the outside, the network security can be compromised. By letting the unauthorized outsider to have the authority to access the router administration settings, one can do so many things up to even take control of the entire network. As a result, it is not safe to use a weak password especially the default administrator credentials.
  2. Turn of SSID  – When connecting to any wireless network, the operating system will load the entire list of SSID names which are within the range of the person who connects. look into how to turn off SSID broadcasting. If hacker war driving and your SSID doesn’t pop up, hacker won’t be targeting it.
  3. Enable network encryption – Visit the website of the vendor of your wireless equipment and learn how to enable WPA level security. No, it’s not perfect, but if a hacker faced with a house that has a WEP secured wireless and one that’s using WPA, hacker will choose the WEP network every time. Every piece of data transferred around the network should be encrypted where it can be configured in the router settings. If the network is not encrypted, there is a possibility that someone will attempt a ‘Man in the Middle’ attack in the network. It is recommended to use Wireless Protect Access encryption or Wireless Protect Access II encryption.
  4. Filter MAC address – Every electronic device comes with a unique MAC address. Filtering MAC address can ensure that only the specific device that the owner of a wireless network recognized is allowed to connect into the network.
  5. Reduce wireless signal strength – There is no reason for wireless signal strength to be super strong unless the network is deployed in a mansion. Therefore it is advisable not to be so generous by offering free wireless network connection to all the people who do not live in your house. Routers today can come with very powerful signal strength and if the wireless network signal is just for a studio apartment size, you can reduce the strength by changing the mode from 802.11g to 802.11b.
  • How to
  • How to protect wireless network
  • Network Security
  • Protecting Network
  • Security
  • Tips
  • why to protect wireless network
  • Wireless Network
  • Wireless Security
Previous Next

Related Posts

Important Web Designing Tips

Important Web Designing Tips

Benefits of Encryption

Benefits of Encryption

How to save Time and Money

How to save Time and Money

15 Tips for being safe while Online

15 Tips for being safe while Online

Best Quality Assurance Practices

Best Quality Assurance Practices

Security, Privacy and Computers

Security, Privacy and Computers

ERP – Advantages VS Disadvantages

ERP – Advantages VS Disadvantages

Useful Tips To Defend Against Computer Attacks

Useful Tips To Defend Against Computer Attacks

Importance of SDLC

Importance of SDLC

Importance of Website in Every Profession

Importance of Website in Every Profession

Typical Internet Marketing Myths

Typical Internet Marketing Myths

Superb Marketing Strategies

Superb Marketing Strategies

How to create a productive environment

How to create a productive environment

Importance of Privacy

Importance of Privacy

Importance of Visual Consistency

Importance of Visual Consistency

Time to Revamp Your Website

Time to Revamp Your Website

7 Motivations For Workflow Management

7 Motivations For Workflow Management

Key Components of Compelling Website

Key Components of Compelling Website

Cloud Computing is the Future

Cloud Computing is the Future

Taking care of your PC

Taking care of your PC

Why Software Testing Is Important

Why Software Testing Is Important

3 Secrets to have Success in Internet Marketing

3 Secrets to have Success in Internet Marketing

Software Definition Enhancement

Software Definition Enhancement

What Is Cloud Computing and Why Use It

What Is Cloud Computing and Why Use It

7 Comments

  1. 1

    Michael Garcia

    December 4, 2011 at 2:36 am

    Never thought about this from that prespective, will definitely look into it.

  2. 2

    Billy Bob

    December 4, 2011 at 2:43 am

    thanks for useful info.

  3. 3

    Lucas Begolli

    December 13, 2011 at 6:53 am

    I used to be very happy to find this web-site.I needed to thanks for your time for this wonderful learn!! I definitely having fun with every little little bit of it and I’ve you bookmarked to check out new stuff you blog post.

  4. 4

    Sulligent

    March 15, 2012 at 1:07 pm

    Yay google is my king aided me to find this outstanding web site! .

  5. 5

    Modzelewsk

    May 7, 2012 at 9:40 pm

    This actually answered my problem, thank you!

  6. 6

    Moxley

    May 9, 2012 at 7:09 am

    This genuinely answered my dilemma, thank you!

Comments are closed.

Open-Source Technologies
  • LAMP (Linux/Apache/MySQL/PHP)
  • Joomla Solution Development
  • Drupal Web Development
  • WordPress Integration and Customization
  • Magento E-Commerce Solutions
  • DotNetNuke Solution Development
  • Ruby on Rails Solution Development
  • Zend Framework
  • Rich Internet Applications Development
Proprietary Techonlogies
  • Microsoft.Net
  • ASP.Net Application Development
  • AJAX Development
  • Microsoft Silverlight Development
  • Microsoft Sharepoint
  • Microsoft Dynamics
  • Java Development
Software Development Services
  • Retail Software Development
  • Desktop Application Development
  • Content and Document Management
  • Secure Intranets / Extranets
  • Customer Relationship Management
  • Supply Chain Management
  • Workflow Management
  • Interactive Learning
Web Development Services
  • Web Application Development
  • Web and Enterprise Portal Development
  • Website Design and Development
  • E-Commerce Solutions
  • Web-based Database Programming
  • Social Engine Development
  • Open Source Solutions
Search Engine Optimization
  • Search Engine Optimization (SEO)
  • SEO Copywriting
  • Pay Per Click (PPC)
  • Search Engine Marketing (SEM)
  • Social Media Marketing (SMM)
  • Google Analytics Service
Quality Assurance
  • Quality Assurance
  • Automated Software Testing Services
  • Information Security and Code Review

Terms  | Privacy Statement  | Disclaimer  | Careers 

 


Copyright © THE FAS SOLUTIONS 2023 All Rights Reserved.