It seems that everything new in communications must be Wi-Fi.The brand new notebooks and palmtops offer the possibility of shaft to connect to other computers without wires. With them, many arm a wireless network at home. But few people know that the signals over the air are easier to hack than those who travel by cable.
Thus, many households and small companies with networks wirelessly keep its doors open to the delight of digital criminals. In this way, they can get into computers and steal keys, enter viruses and more. But with only set good connections, the security level increases tremendously.
According to experts, much of the secrecy is to establish the connection. That would not be an unbreakable barrier. But a well-high wall, which at least discourage intruders.
First Things First
Password: All access point (the device that receives and transmits signals through the air) brings a default password. Each manufacturer will put a user name and password for all its models. As a result, the first thing that makes a hacker may be to try these user names and passwords. So the best thing is altered keys difficult to detect.
Encryption: The information that travels through the air on a network without wires must be unintelligible to the intruders. More precisely, if a hacker can see what goes from one place to another network, it is best to do so without being able to read or decipher what he sees. To that end, the communication must be encrypted or encrypted.
For networks by air, there are 3 types of encryption: The known as WEP is the most common. Specialists maintain that reaches a level of encryption weak. WAP is a type of encryption latest, recommended by those who know. The third type is the new WAP 2. "It's much stronger. It has a high level of encryption. That is why we recommend, especially in companies," said Fabian Chiera, ReyCom, security consultant specializing in Wi-Fi.
To activate some sort of encryption, the system calls for entering keys, usually in letters and numbers. Then, those keys will be paid in PCs that connect to the network.
If those same computers permitting, it is best to use WAP 2, but allow it but we must use WEP or WAP.
Equally important is the encryption that some ISPs have in mind the theme. The company Flash, for example, it configures the wireless access point to their residential customers with a key WEP security. But if the client may want to leave their network open.
Far from windows: As the access point has a specific range, to reduce the possibility of intruders must be placed away from windows . And it will be more difficult to enter from outside.
Especially for businesses, there is a soft determining the coverage area of the access point. This is ideal for those who do not want to share network access with the office next door. "It's called Wireless Site Manager. And also gives them low to those who seek to use the network without authorization and automatically changes the encryption keys, for example WEP, who come from the factory default," says Nestor Diaz, CA, company marketing the program.
MAC Address: Any plate network (which allows the computer to connect to the network) is a combination of letters and numbers that make up the number of hardware or MAC address. The program configuration access point can be configured MAC addresses what may join the network. For example, if a notebook intrusion wants to join, and the network does not list their houses in the MAC address of that notebook, the system will not fail to enter, "clarifies Chiera.
Not propagate the SSID: Is the name of your wireless network. It can be configured to spread or not to spread. If it is set to spread, the network will become virtually public. Because so inviting anyone enter.
Bookmarks