Wireless data connection is now common nowadays in most businesses and households. It allows users to tirelessly connect on the Internet without just being stuck to a single place. And thanks to the technology of wireless modem routers.
These wireless modem routers are devices that connect multiple wireless networks. It can send information to where it was directly needed in the network. And they only require minimal amount of cables. There are two popular kinds of wireless connection: the 802.11g and the 802.11b connection. This wireless router also acts as a firewall, wherein it protects the network from any kind of malicious attacks like malwares and viruses. Read the rest of this entry »
Getting wireless surveillance cameras for home security are preferably chosen than common wired surveillance cameras due to the bulk of wiring involved and ease of installation and management. These wireless surveillances are primarily used from home surveillances especially in keeping strict tabs on your babysitter to securing the office or factory warehouse. Read the rest of this entry »
This article shows you how to configure the wireless security feature on a Linksys router to enable wireless encryption. This article is designed for students in CCNA, network engineers, and anyone looking to encrypt wireless communications with the Linksys wireless router. This article is part of the CCNA curriculum objective “Explain and select the appropriate administrative tasks required for a WLAN.”
Read the rest of this entry »
This is a brief timeline of Wireless technologies development :
1896 Guglielmo Marconi develops the first wireless telegraph system
1927 First commercial radiotelephony service operated between Britain and the US
1946 First car-based cellphone set up in St. Louis, exploitation ‘push-to-talk’ technology
1948 Claude Shannon publishes two benchmark papers on Information Theory, containing the basis for data compression (source encoding) and error detection and correction (channel encoding)
1950 TD-2, the first terrestrial microwave telecom system, established to support 2400 telephone circuits
1950s Late in the decade, several ‘push-to-talk’ mobile systems established in big cities for CB-radio, taxis, etc.
Read the rest of this entry »
The communications over wifi links have been realizable for a very long time. Radios were used for Communications in the late 1800s. Guglielmo Marconi demonstrated the transmission of Morse Code over wireless links for the British Post Office in 1897. In 1898, the Russian navy cruiser Africa used a wireless Communicating device to communicate with operators on shore. TV signals were first broadcast in 1928. The very first visual picture sent over TV signals was Felix the Cat.
The adoption of wireless devices continues to grow as they become more affordable. The rapid spread of wireless technologies among both business and personal systems has improved interoperability and accessibility. However, this very ubiquity has also led to an increase in the number of threats to computer networks. Wireless technologies have given attackers new ways to steal sensitive information, tamper with business processes, and subvert network security enforcement mechanisms. As new threats and attacks are found against wireless networks, they are addressed with changes and additions to the protocols and standards. This book will introduce the basic concepts underlying the evolution of wireless security-the threats, the exploits, and the remediation strategies.
If your neighbours are stealing your wireless connection, you may be able to notify from the logs on your router or modem.
You might look for logs such as LAN users, connection or status log, or connected MAC addresses. And you can also use a tool to check the IP/MAC on your wireless network IP range.
Verify the MAC addresses
To find out who is on your network, you have to make a list of all the devices that are meant to be connected. Find out their MAC adresses and their IP addresses if they are static.
To find out the MAC and IP address on Windows OS, click the Start menu and choose Run. Type cmd and click OK. In the screen that opens, type ipconfig/all and hit Enter. The MAC address will be shown as the physical address.
Once you know the MAC addresses of each of the computers on your wireless network, you will recognise any addresses that don’t belong under the window that shows the MAC addresses of current clients.
WEP (Wired Equivalent Privacy) is a deprecated algorithm to secure IEEE 802.11 wireless networks. Wireless networks broadcast messages using radio and are thus more susceptible to eavesdropping than wired networks. WEP was proposed to give confidentiality comparable to that of a classic wired network.
To address the confidentiality issues of trade wireless networks, the 802.11 standard includes a simple mechanism for encryption of data, it is Wired Equivalent Privacy.
Today’s wireless networking products don’t always help the situation as configuring their security features can be time-consuming and non-intuitive. The tips below go over the steps you should take to improve the security of your home wireless network.
- Change the default wireless settings
You can read about changing default setting (username, password ans SSID) here :
- Enable WPA / WEP encryption
All wireless equipment supports some form of encryption. Encryption technology scrambles messages sent over wireless networks so that they cannot be easily read by humans.
Many encryption technologies exist for Wifi. Of course you will want to pick the strongest encryption that works with your network. However, the way these technologies work, all Wifi devices on your network must share the the same encryption settings. Consequently you may need to find a “lowest common demoninator” setting.
Change your default username and password :
Most of wireless access points & routers permit an admin to manage their WiFi network through a special admini account. This root account provides complete superuser access to the device’s configuration settings with a special username and password.
Manufacturers set both the account user/pass at the factory. The username is often basically the word admin or administrator. The password is typically empty (blank), the words “admin,” “1234,” or “password,” or some other simple password.
To improve the security of a wireless network, you ought to change the administrative password on your wireless access point or router immediately when installing the unit.
The default passwords for popular models of wireless network gear are well-known to hackers & often posted on the Net. Most devices do not permit the administrative username to be changed, but if yours does, you have to change this name too.
Finally, to maintain home network security in the future, continue changing this root password regularly, not three times. Lots of experts recommend changing passwords every 30 days. Use words that would be impossible for others to guess.