Wireless networks has never been taken seriously because we have always been using wired networks  mostly till his date.  wireless networks can be easily exploited by hackers as compared to any wired network and reason is simple ,our wireless technology can be accessed by anyone who has a device with wireless capabilities and then can abuse the information stored on network, but when it’s a wired network, then the person has  to come down physically and connect to that network. Although , hackers know the tricks of penetrating in those networks , you won’t be targeted easily.

So, there  are the many important  of wireless security in day to day life. Some of them are:

  1. It is mainly useful in online banking services. while we use online banking , there may be a chance to leave lot of traces  which can reveal lots of  account related information. And same goes in online shopping too.
  2. Your internet connection may be misused by many other people mainly by hackers , and they increase the cost of bandwidth and you may end up paying huge amount bills. There can be case  where nasty people may try to send your internet connection to send spam and then you’ll be held liable for that.

So to secure home wireless network, there are few things to do to ensure that you ll not give easy access to those who are eyeing on free internet connection or some important information stored in your computer.

  1. Changing  the SSID: SSID [ A service set identifier , or  SSID , is a name used to identify the particular 802.11 wireless LANs to which a user wants to attach.] is a case sensitive name used to identify a wireless network and it has be used by each and every device in that network. By default, it is in manufacturer name but it is advisable to change that and make sure you don’t change it to anything identifiable: e.g.your name, address ,etc.
  2. Use WPA OR WPA 2: when it comes to security in wireless then prefer to use  WPA or WPA 2 over WEP .WEP is vey easy to break as compared to WPA or  WPA 2. WEP is older and WAP is newer  and WAP2 is the newest.
  3. Use a strong and long key : with WPA , you have to specify a pre- shared key and which acts as a password to your network.

So it is important to secure wireless network than using it.

Like it on Facebook, Tweet it or share this article on other bookmarking websites.

Comments (0)

There are no comments posted here yet

Has the TV referral system reduced the chances of Umpire's making decision errors?

Has the TV referral system reduced the chances of Umpire's making decision errors?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 2 answer(s).
[{"id":"20366","title":"Yes","votes":"68","type":"x","order":"0","pct":76.4,"resources":[]},{"id":"20367","title":"No","votes":"21","type":"x","order":"0","pct":23.6,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
bottom 200
No married couple wants to end up getting divorced. It is not like they have planned for it. They try to put up with their partners for as long as they
Due to our modern lifestyle, we feel that digestion related disorders are a common problem. Thus, we neither give importance to them nor seek any help
The bond of marriage brings the two people together. Initially, everything may seem okay and both of them slowly start discovering each other in the journey.
Internet A Growing Need of our Nation, Internet is best option to learn, enjoy, and even earn from it. Internet help students in their studies, a mother
Introduction:  The very word, “cyber crime” has several distinctive connotations for system administrators who deal with a sense of sophistication
Ethical hacking and its opportunities Ethical hacking means hacking a system or a website for to understand the security weakness in order to make the
How to stay secure? We hangout with laptops and smart phones on a daily basis. Every right implies a responsibility. Every opportunity is a possession
How is cyber crime actually defined?: A notorious hacker is seating in somewhere at the outskirts of Russia or China with a laptop in his couch. He is