30 Mai 2020
Wireless home networks have several advantages: the whole family can access the Internet at once. You can use a laptop anywhere around the wireless network to free funny wifi names yourself from physical limitations. You don't need to connect a CAT-5 cable to your entire home network (or even a hole in the wall!) - but WiFi networks also have their own security issues. The recommendations below describe what steps should be taken to improve the security of your WiFi network.
1. Bring the point access point to the center position
WiFi signals are emitted through a router or access point. If you keep the device access device as central as possible, two goals are achieved. First, it ensures that the WiFi signal reaches all areas of your home, and second, it reduces signal leakage outside your property. This is important to reduce the possibility of drive-by-access access to your system. If someone on the street can access your signal, it can be identified and exploited by unscrupulous people. If your network security is insufficient, they may be able to access your confidential information.
2. Activate an encryption scheme for devices in your network
All WiFi devices support some form of encryption, making it possible to read messages sent by an external unit over a wireless network. The available encryption schemes change, with WEP being the weakest (and oldest) and WPA - and now WPA2 - stronger and better. However, you cannot merge and match because all the WiFi devices in your network must use the same encryption scheme. WEP may not be as good as WPA settings, but keep in mind that it is better than encryption.
new. Choose new default default username and admin password
An access point or router is the heart of a WiFi home network. This is given from the factory with the standard manager username and password. Manufacturers set both a username and an account password in the factory. The user can use an administrator account to enter network addresses and account information. The username is always the word "admin" or "admin". Passwords are usually blank or contain the words "admin", "public" or "password". Hackers are aware of these default default settings, and if you do not change them, there is a big risk that your network will be open to villain access. Once you set your access access point or router, change the username and password of the administrator. It is appropriate to change this regularly, for example every 30 to 60 days.
4. Rename Default LT SSID
WiFi access point and router manufacturers typically ship their products with a standard network name (SSID). The SSID stands for Service Set Identifier, a 32-digit sequence that uniquely identifies the WLN. In other words, SSID is the name of a wireless network. To connect a wireless device to a wireless network, it is necessary to know the SSID of the wireless network in question. If you connect your wireless router or access access point and keep the default SSID, it will not take much longer for an attacker to determine the SSID. Once you have configured your access access point or router, change the SSID to a unique name that is difficult to guess.
5. Disable SSID Broadcasting
The SSID broadcast occurs every few seconds through your access point or router and is designed to enable users to detect, identify and connect to Wi-Fi networks. If you have a wireless device, you can use this function to determine which networks are in range and what their names are. This is the first step to connect to the WiFi network. However, this function is not necessary and undesirable in home networks, as external companies can determine the SSID of your network. It is recommended that home network users disable this feature to improve the security of your Wi-Fi network.
6. Enable MAC Address Filtering
A function called MAC address filtering (media access control) uses the computer's physical hardware. Each computer has its own specific MAC address. MAC address filtering allows network administrators to enter a list of MAC addresses from which they can communicate over the network. The network administrator may deny access to MAC addresses that are not on the network.