Results 1 to 1 of 1
  1. #1
    New member Mmandy is an unknown quantity at this point Mmandy's Avatar
    Join Date
    2012 Aug
    Maringa - PR
    Thanked 39 Times in 23 Posts
    Rep Power

    Protecting your Wireless

    Hello Progamercity members.
    I’m Mandy, and today I’ll show methods to protect your Wireless.
    Lets go?
    1) Change the password and user management on the router.
    Changing credentials to access the router, which come by default, must be immediately replaced.
    WEP – Wikipédia, a enciclopédia livre ---> WEP
    WPA – Wikipédia, a enciclopédia livre ---> WPA
    2) Change encryption.
    The 64-bit WEP encryption is not widely used because it was broken in 2001. I advise to use a 128-bit encryption. But even perfect, perfect, perfect is to use WPA or WPA2.
    3) Disable the SSID broadcast.
    Thus we hid our network, specifically the name of our network (SSID - Service Set Identifier), making it more difficult for intruders to discover.
    SSID (Service Set IDentifier) ---> SSID - Service Set Identifier
    4) Filter clients by MAC Address.
    We include the MAC address of each interface, the machines that will be allowed to connect to the network and block all others. To find the MAC of the interface go to command prompt and type ipconfig / all.
    MAC Address ----> MAC Address
    5) Make upgrades to the firmware of the router.
    It occasionally check for updates for your router. Usually, these updates resolve bugs checked the machine and in many cases improve performance.
    6) Disable the DHCP.
    By disabling DHCP (Dynamic Host Configuration Protocol), the user must manually configure the IP address, subnet mask, gateway and DNS on your machine. Thus, the intruder must know the IP range of the network's used in our.
    Dynamic Host Configuration Protocol – Wikipédia, a enciclopédia livre ----> DHCP
    7) Observe daily logs.
    Record everything that normally happens in our network: authentication, access, unauthorized access, etc etc.. On my router (Belkin), the logs are in the Security logs.
    8) Use a Radius.
    For those thinking of having a more professional must use a RADIUS (Remote Authentication Dial In User Service - to authenticate users). As an example we have the free freeradius which is an excellent choice.
    FreeRADIUS: The world's most popular RADIUS Server -----> Radius

  2. The Following User Says Thank You to Mmandy For This Useful Post:

Visitors found this page by searching for:
Nobody landed on this page from a search engine, yet!


Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts