How to Protect Your Wi-Fi Full

The WiFi networks they have carved a significant hole in our homes and businesses. They’ve been with us for few years, but in that time they have become almost indispensable in multiple daily activities that go beyond the Internet connectivity, since also allow us to handle all kinds of gadgets and devices distance.

Despite their growing importance, many users just pay attention to the your wireless network settings. Simply plug the router of the operator and it is already, to start navigating. In general there should be no major problem, but if we don’t take certain precautions, may any intruder enters our network and may cause us more than one headache.

Normally will not be treated as spies, or evil hackers as those who appear in films that deal by all means take advantage of our WiFi to commit offences, although any Hayles. It is to be a neighbor who tries to sneak into our network to save the connection, making us responsible step in the first instance of the pages you visit.

How to avoid these intrusions unwanted in our WiFi? Thus although total security does not exist (for that you have to turn off the network, clear), we can follow a series of tips and tricks, both simple and more complex, which we shall explain below.

Protect access to your router

First, we have to make sure that anyone outside the US will be able to access the router to control our WiFi. Otherwise, everything we do will be futile, since they may enter and reverse it or even to deny us access to our own network.

Therefore, the first step is to upgrade the router firmware to the latest version available to correct possible vulnerabilities that have been detected, process that depends on each brand and model, and then we begin by change the access password by default It is normally given by the manufacturer or the operator.

Don’t let that the door to your hub of the home opening with the classic 1234 / 1234 or admin/admin.. Search for a user name and a personalized key remember well or that can be left parked somewhere you know in case you forget them.

It may also be useful change the default router IP address. It normally tends to be 192.168.1.1, first digits that all avid users of hacking your WiFi tecleará in your browser. Simply changing the last digit can achieve delay or throw back to the less experienced hackers or to that neighbour Stud who wants to take advantage of your connection.

You change the name of the SSID

The SSID (Service Set Identifier) or the wireless network ID serves precisely for that, to identify it among others many. It is usual that by default come given by the operator provided by the router, showing at times more information that should on the type of router we have and their possible vulnerabilities.

The ideal is that we use a name easy to remember or find that any personal relationship but that do not make reference to us directly or to our home. We can be as creative as you want, even entirely hide the SSID router permitting or create several with different access permissions for guests.

But never say our name, nick or physical address (4th B WiFi) or email (Yes, it seems absurd but happens), since we will be giving unnecessary clues upon who is the network.

Select the best encryption system, and change the key by default

A basic aspect of security in wireless networks is the data encryption you will pass by them. There are mainly three systems or different protocols that can be found in most modern routers: WEP, WPA, and WPA2.

WEP has been deprecated. Whenever you can choose WPA encryption system or better still WPA2 for added security

WEP is the most basic of the three, provides a layer 2 encryption and It has been deprecated to be able to break protection with average in a few minutes power device or a computer. The next option is WPA, which was born just as the solution to the most obvious vulnerabilities in WEP. “Its acronym means something like”Access protected Wi-Fi”and is a system much safer password attacks not being so limited in the number of characters that you can enter.

Finally have the evolution of WPA, WPA2 and that It offers the highest level of protection of the three. Whenever we can we will have to choose it, although it is necessary to be careful of all the computers on the network to support it (the oldest may not be compatible) or if not, do not communicate.

Of course, we choose choose it, we must put a complex enough key so that no one can or at least comfortable assail it by brute force, but that we are relatively easy to remember, especially if we want to use new devices frequently requiring the insertion of the key when connecting for the first time. Nor is it more change this password once in a while to prevent possible intrusions with brute force attacks.

Use MAC filtering

Another layer of security that may be helpful is called MAC filtering (is not not fail to connect to the computers of Apple, not). Also called physical address or MAC addresses are which is assigned each network card recorded directly in the hardware and identify it uniquely from the rest. It is something like an IP address but lower level and is used only within the same subnet.

MAC filtering allows you to create a sort of list of allowed network equipment

Is composed by 48-bit and it is represented in 6 groups of hexadecimal numbers separated by colons or dashes. It goes something like this: 01:23:45: 67:89: AB or well expressed as 01-23-45-67-89-AB.

Where do I find it? Because it depends on the device and operating system that you use. Even in some gadgets we can see it on a sticker or on the box of the device. In this article you have several examples of where and how to find it.

MAC filtering will consist in creating a kind of list of allowed network equipment to connect to our WiFi. For this we will have to enter the corresponding option of the router and enter the addresses you want to allow on our network. Depending on the model, we will also make black lists of blocked computers, preventing access to devices that we know for certain they are intrusive or scroungers our WiFi. In this article you have more details on how to properly perform this MAC filtering with a concrete case.

It reduces the allowed IP addresses ranges

If we are always going to have the same equipment connected to the network, we can use the option to disable the automatic operation of the DHCP (Dynamic Host Configuration Protocol) service on the router which is in charge of assign IP addresses each computer connected to the network.

This will force us to have to configure the settings manually on all devices that we have at home, but can provide one degree of safety. We also can play with the range of allowed IP addresses and restrict it to the values that we want to avoiding that they are a multitude of free addresses.

It is very simple to do. You just have to look on the router the option within the LAN settings in which to put something like Start IP Address/End IP Address and then specify the desired values (e.g. of 192.168.1.33 to the 192.168.1.35, which would allow us to connect three computers to the network). If also the router allows us to change the time of validity of this assignment, we can also indicate a very high figure and so do not leave any available to an attacker, since they will not be hollow free.

It borders the antennas transmitting power

Simulation of the power radiated by a WiFi signal

It may seem obvious, but it is the most effective method to prevent an intrusion or disallowed use of your wireless network. If it does not signal, hardly someone can locate your network and much less connected to it.

Most routers allow you to manage in a way the power emitted by the antennas and thus handle network coverage radius of approximately. Typically, we find ourselves with an option in which we are allowed vary the percentage of signal level or the transmitted power.

Here we should lower the intensity to continue and can connect to the network indoors, but so that the power decays much outside it. We go ensuring it simply Moving mobile around the House and its surroundings and seeing what WiFi coverage have.

How much have to decrease it? Thus as far as possible while not harmful to you or cut you the connection. It may also be useful guiding the router antennas, If it is that it allows us to do so, towards the interior of the House to provide the maximum power within and out the less as possible towards the outside and if we are somewhat paranoid to use some metal reflector to modify the direction of the beam of energy or even use electromagnetic anti-radiation some type of paint on one of the walls where we don’t want to leave the WiFi signal.

In summary

Although total security does not exist, following the simple tips discussed above can maintain a good degree of privacy on your wireless network that surely will get back the majority of neighbors and possible spies. What steps you have to follow? Here is a summary:

  • Protect access to your router changing the passwords and its default IP address
  • You change the name of the SSID either hide it completely
  • Choose WPA encryption system or better still WPA2 and a key alphanumeric long
  • Use MAC filtering and creates a list of equipment allowed on your network
  • Reduce the ranges of IP addresses supported in your local network
  • Limited emission power antennas to the outside of House

Gallery

Full HD 180-Degree Wi-Fi Camera (DCS-2530L)

Full HD 180-Degree Wi-Fi Camera (DCS-2530L)

Source: ca.dlink.com

How To Make A Wi-Fi Drone Killer With Your Raspberry Pi …

How To Make A Wi-Fi Drone Killer With Your Raspberry Pi ...

Source: fossbytes.com

Strengthening Wi-Fi security at the hardware level …

Strengthening Wi-Fi security at the hardware level ...

Source: e2e.ti.com

Apple iPad Mini w/ Wi-Fi (A1432)

Apple iPad Mini w/ Wi-Fi (A1432)

Source: www.a4c.com

Mi LED Smart TV 4A (43) – Full HD Smart TV

Mi LED Smart TV 4A (43) - Full HD Smart TV

Source: www.mi.com

Samsung Galaxy Tab 3 Wi-Fi + 4G (Sprint) SM-T217S 16GB …

Samsung Galaxy Tab 3 Wi-Fi + 4G (Sprint) SM-T217S 16GB ...

Source: www.a4c.com

Apple iPad 4 w/ Wi-Fi (A1458)

Apple iPad 4 w/ Wi-Fi (A1458)

Source: www.a4c.com

Asus MeMO Pad 7 (ME176C) 16GB Wi-Fi Tablet

Asus MeMO Pad 7 (ME176C) 16GB Wi-Fi Tablet

Source: www.a4c.com

LG LSE4617ST 30 Inch Slide-In Induction Range with 6.3 cu …

LG LSE4617ST 30 Inch Slide-In Induction Range with 6.3 cu ...

Source: www.ajmadison.com

Samsung Galaxy Note 8.0 (GT-N5110) 16GB Wi-Fi Tablet …

Samsung Galaxy Note 8.0 (GT-N5110) 16GB Wi-Fi Tablet ...

Source: www.a4c.com

Samsung Galaxy Tab 3 Wi-Fi + 4G (Sprint) SM-T217S 16GB …

Samsung Galaxy Tab 3 Wi-Fi + 4G (Sprint) SM-T217S 16GB ...

Source: www.a4c.com

Apple iPad Air 2 (A1567) w/ Wi-Fi + 4G (Unlocked GSM …

Apple iPad Air 2 (A1567) w/ Wi-Fi + 4G (Unlocked GSM ...

Source: www.a4c.com

Amazon Fire 7" 8GB Wi-Fi Tablet 5th Generation

Amazon Fire 7" 8GB Wi-Fi Tablet 5th Generation

Source: www.a4c.com

11 Internet Safety Tips for Children & Teens

11 Internet Safety Tips for Children & Teens

Source: www.safervpn.com

Echo & Alexa – Amazon Devices

Echo & Alexa - Amazon Devices

Source: www.amazon.com

Video: Next generation iPhone SE 2 may have a glass back …

Video: Next generation iPhone SE 2 may have a glass back ...

Source: applebase.net

Cisco-Linksys E2000 Advanced Wireless-N Router

Cisco-Linksys E2000 Advanced Wireless-N Router

Source: thetechjournal.com

iCloud vs. iTunes backups: The crucial differences that …

iCloud vs. iTunes backups: The crucial differences that ...

Source: www.pcworld.com

Top 10 Anniversary Update features to know about

Top 10 Anniversary Update features to know about

Source: windowsreport.com

Portable Wireless Wifi Router No Password For Home

Portable Wireless Wifi Router No Password For Home

Source: www.alibaba.com