Skip to main content

How to Secure Your Wireless Home Network

After the Varanasi bomb blast, Indian Mujahideen terrorists hacked a wireless network to send email for taking the responsibility of this act. Most of the wireless networks are unsecured in INDIA. It is recommended
Unsecured networks are an open invitation to hackers seeking access to vulnerable computers.


 

 
Use these simple ways in which you can secure your wireless network.



Change The Admin Password
The default password for most wireless kits is ADMIN or something else set by manufacturers. If you haven't changed this password then change it as soon as you can. It is surprising the amount of wireless networks that are hacked into or accessed by a third party because the ADMIN password is still ADMIN. All manufacturers manuals can be downloaded from the Internet with their admin password easily.


Enable MAC Address filtering
Each wireless device has a unique identifier called the physical address or MAC address.
Access points and routers keep track of the MAC addresses for all devices that connect to them.Wireless routers offer the option to key in the MAC addresses of your home equipment so as to restrict the network to only allow connections from those devices.It ensures that rogue users cannot connect to the wireless router without using advanced MAC spoofing techniques.


Turn on encryption
All wireless devices support some form of encryption. Encryption technology scrambles messages sent over the air and ensures that they cannot be intercepted by hackers. Several encryption technologies exist for wireless communication today.
WPA is the strongest commonly available encryption technology for home devices. While WEP can also be used cracking WEP is just a matter of few minutes.
We would advice corporates to go for WPA with EAP Authentication, TKIP/RC4 Encryption or WPA 2 with EAP Authentication, AES-CCMP encryption for better security.

Change the default SSID
Access points and routers all use a network name called the SSID. Manufacturers normally ship their products with the same SSID set for all routers.
For example, the SSID for Netgear devices is normally 'NETGEAR'. The default SSID can be changed from the administrative panel and should be set to something unique.


Disable remote login
The first router worm brute forces its way into the router in this manner. Most default usernames are set to Admin. It isn't hard for a virus/worm to crack the password if the username is known. The good thing is that routers normally have this disabled by default. Be sure to confirm that it is disabled when you first set up your router and periodically thereafter. If you need to update your router setting remotely, only set up access for the time you are going to be connected.


Do not auto-connect to open wireless networks
Connecting to an open wireless network like a free wireless hotspot or your neighbour's router exposes your computer to security risks and attacks.
Although not normally enabled, most computers have a setting available allowing these connections to happen automatically without notifying the user. This setting should not be enabled except in temporary situations.

 

Turn off network during extended periods of non-use
Turn off network while not in use. When you do not need the internet, turn off your router. While it is impractical to turn off and on the devices frequently, at least consider doing so during travel or extended periods of downtime.

Position the router or access point safely
Wireless signals normally reach to the exterior of a home. A small amount of signal leakage outdoors is not a problem, but the further this signal reaches, the easier it is for others to detect and exploit.
Wireless signals often reach through neighbouring houses and into streets.hen installing a wireless home network, the position of the access point or router determines its reach.
Try to position these devices near the centre of the home rather than near windows to minimize leakage.Many routers allow you to reduce the range of your router from the administrative panel to prevent the signal leakage.


follow these simple steps and secure your connection .

please comment below if this post is useful for you :)

Comments

Popular posts from this blog

Defenders of Internet Freedom

From Politicians and professors to computer scientists and the first programmer, take a look at the champions of open internet. Julian Assange    Editor-In-Cheif, Wikileaks Assange has directed the publication of secret documents on the afghan wars and Guantanamo Bay Prisoner files and US Cables and also disclosed many facts which were unknown to world. He defaced many big companies and reiceved many death threads and became a Bad person in the eyes of the world. Sir Tim Berners-Lee Inventor of the world wide web Tim is instrumental pushing open data at high level to governments around the world and is a campingner against two tier internet. He also strongly supported a group putting pressure on the US government over the proposed US PIPA Act, which aims to impose restrictions and censorship on the internet. Jimmy Wales Chairman, Wikipedia Jimmy Wales is the man behind wikipedia wales participated in an internet blackout, closing the site for a day, in protest against the pro

What is Steganography

Steganography is the art and science of hiding messages. Steganography is often combined with cryptography so that even if the message is discovered it cannot be read. The word steganography is derived from the Greek words “steganos” and “graphein”, which mean “covered” and “writing.” Steganography, therefore, is covered writing. Historical stenganography involved techniques such as disappearing ink or microdots. Modern steganography involves hiding data in computer files. It is fairly easy to hide a secret message in a graphic file without obviously altering the visible appearance of that file. Steganography software OutGuess is a universal steganographic tool that allows the insertion of hidden information into the redundant bits of data sources. The nature of the data source is irrelevant to the core of OutGuess. The program relies on data specific handlers that will extract redundant bits and write them back after modification. In this version the PNM and JP

Windows Basic Security tutorial

Hey guys, I just wanted to quickly write a tutorial about some basic computer security. First, you have Windows 7 installed freshly with no current infections. A fresh install is best. Second, you are a moderate user of the internet. Basic Security Applications You are going to want a few applications to help you out along the way. First off, you will need two (2) anti-malware programs. This is to ensure that if one misses something, you have a second one to make sure. I personally use Microsoft Security Essentials (MSE) and Malwarebytes Anti-Malware (MBAM). Update these as often as they need to be. Run both of these every single day. Once a week minimum, but daily is far more advantageous. If you torrent, you will want PeerBlock . PeerBlock basically blocks your peers, especially RIAA, the govt, and other unsavory sorts from tracking who you are and what you're downloading. If you don't use PeerBlock, you can almost guarantee getting cau