IT tutorials
 
Technology
 

Windows Home Server 2011 : Implementing Wireless Network Security

9/18/2013 8:52:17 PM
- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
Wireless networks are less secure than wired ones because the wireless connection that enables you to access the network from afar can also enable an intruder from outside your home or office to access the network. In particular, wardriving is an activity in which a person drives through various neighborhoods with a portable computer or another device set up to look for available wireless networks. If the person finds a nonsecured network, he uses it for free Internet access or to cause mischief with shared network resources.

Note

If you don’t believe that your wireless signals extend beyond your home or office, you can prove it to yourself. Unplug any wireless-enabled notebook and take it outside for a walk in the vicinity of your house. View the available wireless networks as you go, and you’ll probably find that you can travel a fair distance (several houses, at least) away from your wireless access point and still see your network.


Here are a few tips and techniques you can easily implement to enhance the security of your wireless network:

  • Enable encryption— First and foremost, enable encryption for wireless data so that an outside user who picks up your network packets can’t decipher them. Be sure to use the strongest encryption that your equipment supports. For most home routers, this is Wi-Fi Protected Access (WPA), particularly WPA2, which is more secure than regular WPA.

    Note

    If you change your access point encryption method as described in the previous tip, you also need to update each wireless client to use the same form of encryption. In the Network Connections window, right-click your wireless network connection, and then click Properties. Display the Wireless Networks tab, click your network in the list, and then click Properties. Change the following three settings, and then click OK:

    • Network Authentication— Select WPA-PSK.

    • Data Encryption— Select TKIP.

    • Network Key— Type your shared key here and in the Confirm Network Key text box.


  • Disable network broadcasting— Windows sees your wireless network because the access point broadcasts the network’s security set identifier (SSID). However, Windows remembers the wireless networks that you have successfully connected to. Therefore, after all your computers have accessed the wireless network at least once, you no longer need to broadcast the network’s SSID. Therefore, you should use your AP setup program to disable broadcasting and prevent others from seeing your network.

    Caution

    You disable SSID broadcasting by accessing the wireless access point’s configuration page and deactivating the broadcast setting. (Exactly how you do that varies depending on the manufacturer; see your documentation or just poke around in the settings page.) However, when previously authorized devices attempt to connect to a nonbroadcasting network, they include the network’s SSID as part of the probe requests they send out to see whether the network is within range. The SSID is sent in unencrypted text, so it would be easy for a snoop with the right software (easily obtained from the Internet) to learn the SSID. If the SSID is not broadcasting to try to hide a network that is unsecure or uses an easily breakable encryption protocol, such as Wired Equivalent Privacy (WEP), hiding the SSID in this way actually makes the network less secure.


  • Change the default SSID— Even if you disable broadcasting of your network’s SSID, users can still attempt to connect to your network by guessing the SSID. All wireless access points come with a predefined name, such as linksys or default, and a would-be intruder will attempt these standard names first. Therefore, you can increase the security of your network by changing the SSID to a new name that is difficult to guess.

  • Change the access point username and password— Any person within range of your wireless access point can open the device’s setup page by entering http://192.168.1.1 or http://192.168.0.1 into a web browser. The person must log on with a username and password, but the default logon values (usually admin) are common knowledge among wardrivers. To prevent access to the setup program, be sure to change the access point’s default username and password.

  • Consider static IP addresses— Dynamic Host Configuration Protocol (DHCP) makes it easy to manage IP addresses, but it also gives an IP address to anyone who accesses the network. To prevent this, turn off DHCP in the access point and assign static IP addresses to each of your computers.

  • Enable MAC (Media Access Control) address filtering— The MAC address is the physical address of a network adapter. This is unique to each adapter, so you can enhance security by setting up your access point to allow connections from only specified MAC addresses. (Unfortunately, MAC address filtering isn’t a particularly robust form of security. The problem is that wireless network packets use a nonencrypted header that includes the MAC address of the device sending the packet! So any reasonably sophisticated cracker can sniff your network packets, determine the MAC address of one of your wireless devices, and then use special software to spoof that address so that the AP thinks the hacker’s packets are coming from an authorized device.)

    Note

    To find out the MAC address of your wireless network adapter, open a Command Prompt session and enter the following command:

    ipconfig /all

    Find the data for the wireless adapter and look for the Physical Address value. (Alternatively, right-click the wireless connection, click Status, display the Support tab, and click Details.)


  • Avoid windows— When positioning your access point within your home or office, don’t place it near a window, if possible; otherwise, the access point sends a strong signal out of the building. Try to position the access point close to the center of your house or building.

 
Others
 
- Windows Home Server 2011 : Securing Network Computers (part 3) - Avoiding Phishing Scams , Sharing a Computer Securely
- Windows Home Server 2011 : Securing Network Computers (part 2) - Creating Accounts for the Kids
- Windows Home Server 2011 : Securing Network Computers (part 1) - Thwarting Spyware with Windows Defender
- Windows 7 : Tweaking and Customizing Windows (part 6) - Miscellaneous GUI Tips, Configuring the Recycle Bin
- Windows 7 : Tweaking and Customizing Windows (part 5) - Display Properties - Setting Desktop Icons, Display Settings
- Windows 7 : Tweaking and Customizing Windows (part 4) - Display Properties - Sounds, Screen Savers
- Windows 7 : Tweaking and Customizing Windows (part 3) - Display Properties - Window Color and Appearance
- Windows 7 : Tweaking and Customizing Windows (part 2) - Display Properties - Themes, Desktop Background
- Windows 7 : Tweaking and Customizing Windows (part 1) - Tweaking the Start Menu
- Windows Small Business Server 2011 : An Active Directory Primer (part 3) - Using AD DS Tools - Using ADSI Edit , Using Group Policy Management
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us