First time on my blog "WiFi Security?" Want to know more about WiFi Security? Need some fresh software to secure your WiFi connection?

Subscribe to blog updates by Email or RSS

Each week you will get a new post about WiFi Security. I promise you, my dear reader! Or you will unsubscribe :-)



Wednesday, August 24, 2011

All You Need to Know About Wi-Fi Security

All You Need to Know About Wi-Fi Security

Wi-Fi technologies and Wi-Fi Security are rather meaningful nowadays. Their importance rises because of frequent usage internet technologies both at home, office and in hot spots. The global village widens its borders now; the security becomes more and more concerned. Many users do not even bother about the internet security while using they it computers or laptops everywhere they need. It’s in vain. While installing Wi-Fi software one need to set up all possible settings and follow necessary measures before demonstrating these or that data to one of your friends or colleagues.

What should user know about the Wi-Fi measures while using in everyday life. Of course you are to follow the rules of Wi-Fi Security and to change passwords as often as possible. Most of the Wi-Fi base stations may provide default keys or may give the password which is already being using by several computers simultaneously. Of course it obviously makes your PC data rather vulnerable to hacker’s attacks. What’s more hackers are very developed nowadays. Recently one of the Facebook bloggers threatened of destroying this system one day.

How to avoid all the evident and up- to- date difficulties. The answer is rather simple - keep your password in the place accessible only to you, make it easy to remember to you. Only then you will feel that your network is sufficiently secure.

You are also to remember that every operating system has its own peculiarities and the manner of compounding the password may also differ. Much also depends on the type of the modem being used. Usually all WIFI modems have range SSID (Service Set Identifier).
Much depends on the traffic available, if an outsider identifies the name of network you are working in all measures of protection have been done in vain.

One more thing that can help you in organizing secure functioning is scrambling the passwords of the net. WEP may help in this. Disinterested hackers are not able to destroy private data but determined ones can break it.

Every computer has its own machine access code (MAC). You may configure your base station so that it would give the access only to your MAC addresses.

So now we know all the possible measures of creating secure Wi-Fi network.


Like this post? Why not to Subscribe to WiFi Security news by Email for FREE

Wednesday, July 20, 2011

Check Home Wireless Security Basics Once Again


Wireless Internet is comfort and mobility at the same time. Protection of the network consists of several steps. Communications in the network are specially encrypted. One may choose between Wi-Fi Protected Access or Wired Equivalent Privacy.
  • Apply spyware software or antivirus programs or firewall
  • Identifier broadcasting is some kind of wireless router
  • Remember only being turned off computer will be safe from signals from any devices
  • Changing of the pre-set password makes the situation more reliable. The longer password is the more difficult it to be cracked.
  • In purpose of security your computer should be let down for access only by specific PCs of wireless network
  • It’s better to turn off when it’s not used.
Public “hot spots” are not always secure; other people can get the access to your data and observe all your actions.

Wireless Network Security

Wireless network attracts more and more users nowadays because of comfort and mobility. Up to date businessmen being on their vacations can be in touch with their staff with the help of wireless network or lazy shoppers if there are such at all can purchase all they need being on-line.

Wireless network can be set up in any part of the lodging without any cords and any kind of staff and one can get the access to the net in any possible place where the network is available.

Wireless connection usually requires broadband Internet access in home or some kind of “access point”, it can DSL cord switch into the modem. Setting up to the kind of network consists of several steps:
  • Connection to the access point
  • Broadcasting a signal
  • One should know that computers are equipped with special client card pulling signal in the air and gaining web access.
The possibility of unauthorized users to log in to the wireless net is its only pitfall. It makes hackers or neighbor active in its malicious actions. It arouses the level of web criminality or other similar actions.

Fortunately, there are steps protecting security of PC data. They are as follows:

1) Encryption prevents any interference or communications in the net. Wireless routers, base stations and access points possess encryption mechanism. Usually encryption feature is turned off, it must be set up. There are two types of encryption: Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). It depends on the user choice what to set up. The most popular and often used encryption is WEP.

2) Then follows firewall installation, it provides anti-virus protection. The second step is manual connection to the net with the help of SSID name, then one should change the identifier up to the standard otherwise it can be caught be hackers, configure unique ID in wireless router, use password consisting of at least 10 symbols. Treat your net carefully, turn it off when it is not used. Do not switch to in “hot spots”, always save information you got in wireless connection.

3) Using WiFi Security Software like SmartHide to ensure your WiFi Security. It is easy and not free solution but when you are using it, you can be sure that your wireless network are safeguarded for sure.

Tuesday, July 19, 2011

How to Protect Wireless Network – Five Easy Steps

The popularity of Wireless Network becomes more and more evident. It can be used in laptop IPhone, mobile devices. The only disadvantage and inconvenience of wireless nets is the possibility of interference into it and downloading data. Wireless also allows stealing laptop battery resource to be stolen. Only protection of information can help to find out the solution.

The essence of wireless network is usage of radio signals for communication. They travel outside home network; other wireless devices can pick up unprotected signals and connect to network, caught information which has not been sent yet. One of the best examples of wireless devices which can be created at home is Dell Inspiron 6400.

Ways of protection wireless network

You should consider safety factors in setup of wireless network. One of them is transmitter in wireless networks. Wireless firewalls and security protocols are offered at gateways, routers, cellular base stations. They provide protection networks from risks.

1. Usage of firewall

Firewall is some kind of barrier which helps to through away all the suspicious objects and data which intrude into the net. Dell Latitude D420 Battery is the device which provides the protection of the network while being in use. Firewalls can be reached in various variants, hardware and software. Both variants can be used, it depends on the situation.

2. Wireless encryption

Wireless network has a great variety of protocols with encryption. There are great variety of methods in network security functioning.

Equivalent Protocol of wired nets

WEP is encoded security protocol, it uses in all network bases of information with the help of WEP key. It assigns to the network and setups it with the WEP key. One can have personal key or create different with selected options. Correct password allows user enter into the network from battery 4 us.

3. Wi-Fi protected access

WPa security settings are used to decrypt and encrypt data transmitted in the network. Static security key in WEP encryption is not used. Instead of it Temporal Integrity Protocol is dynamically generated with a new key for each packet.

4. Connection to the private network

While creating the private network point one should avoid network names in transmitter. Because the networks mostly transmit the default names, and all the computers in the neibourghoud can intrude to your data. While creating new working network station one should remember the SSID for connection new points in the net no matter whether it closed or there is no SSID broadcasting.

5. Public safety

Talking about public safety in is necessary to consider that “hot spots”: cafes, airports, are very dangerous places from the point of view of security information. Wireless networks should be highly protected in order not to be destroyed. It is better to limit the activities to the dangerous e-mails, and basic security points while being in such kind of net.

...Last but not least

If you do not want do all these steps and you need an easy solution to protect your WiFi, use SmartHide to protect your wireless connection in public places and at home.



Like this post? Why not to Subscribe to WiFi Security news by Email for FREE