When you set up a wireless home computer network, it’s critical to keep it safe and inaccessible to outsiders.
You may think you’re nice, by your neighbors through your Internet connection, but if you want, you can also hire in all others. These include the identity thief, the personal information from your PC, you can resort to the guy on the floor, the three films downloads per night and the kid next door, to ensure that you can blame for his illegal music sharing.
Fortunately, most wireless routers, also known as gateways, comprehensive, easy to understand instructions to ensure that you control who uses them. Here are some tips to get you started. Change the wireless gateway default administrative user name and password. If you replace a new wireless router, both the administrative user name and password directly after power-on. If you have had the router for a while, check your manual to be sure you’re not using the default settings.
“Most wireless devices can actually work out of the box, implemented thanks to the variety of technologies and features to facilitate use, even for non-technical consumers,” said Alexandru Catalin Cosoi, head of online threats laboratory in Bucharest, Romanian security company BitDefender. But keep router to “factory” settings, the most common mistake users make is. Hackers know that many people never change them so that they find the default login information, such as “admin” and “password” to them in full control. Turn on wireless network encryption.
“Home wireless devices usually come with two built-in encryption protocols, that Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA / WPA2),” Cosoi said. Unfortunately, WEP, common on older routers, have found serious security flaws. Each router sold since 2006 support WPA or WPA2. If you have an old gate, which have only supports WEP, it’s time for an upgrade. Check your router in the user guide for the encryption switch, which will ensure that no outsiders can snoop on your communications. Create a strong network access password and then set up any laptop, tablet and smartphone automatically use in your household. [Create Super-Secure and remembering passwords] Destroy the gate of the administrative remote access, if possible.
“Most routers and access points allow an authorized user on the device settings to change – even if not in the building are – simply by entering the IP address in a browser,” said Cosoi. But when remote access is enabled, can someone snooping on your connection to the router to capture the administrative user name and password, and then come back later to change the settings. Check to see your wireless gateway installation instructions that can be remotely disabled, and if so, follow the instructions. You will still be possible, via a computer connected to the router through a physical network cable change.
Turn on MAC filtering. Another method for the invaders to a “white list” of equipment is allowed to use the wireless network. Fortunately, each network interface from any Internet-enabled device – computer, Smartphone, tablet, or game consoles – has a unique, durable Media Access Control (MAC) address “. Most wireless routers let an “invitation list” of MAC addresses provide. “But some wireless adapters, the user can change the MAC address as necessary, so that alone means MAC filtering is not an efficient solution to keep intruders at bay,” Cosoi warned. “However, there is an additional precautionary measure, coupled with a strong WPA [password], your wireless network security will increase.”