Improve The Security of Your Network Wi-Fi Is Possible Just by Changing Four Parameters

Through these pages we have spoken on several occasions of the importance of having the properly configured home Wi-Fi network. It is not just a matter of search optimization for better performance, Yes it is, but look that it is really safe and that is something that is extremely simple to carry out.

And for that the first thing that we have to face is that the router, the gateway of our home with the jungle that is the network of networks that exist beyond the box entry of our House, It is also the first filter to avoid arriving strange presences and thus we are not speaking of shadows that sometimes speaks Iker Jiménez.

Is not night visitors, but vampires of the Wi-Fi which are constantly looking for the lesser weakness of a system to get a sack and benefit (that is the lesser of two evils) of our coverage. And is that if you only were to use our bandwidth.

We must take into account travelling content of all kinds by our network. Personal data, identities, very appealing… contained bank details for any friend of the alien and we already know it. Information is power and your data, my data, the data of the neighbor are worth much in opaque markets.

So the time comes to sit in front of your router either yours or that of your operator and get ready to change four very basic but at the same time fundamental parameters. We speak of the user name, key access and how not, the name and the key to your Wi-Fi network. Remember that if someone access to your router may have possibilities of access to the devices you have connected to your network.

Changing the username and the password

The first step is that concerns to the change username and password to our router. No good having high security in the rest of parameters if our user is still “admin” and the password “1234” in such a way that anyone can alter them and leave us without defenses.

We must therefore start the browser and well connected to our Wi-Fi network or cable access the router with the ip corresponding (192.168. X. X where are found the most common) generally is typified in the instruction manual or at the base of the appliance.

Once inside we find the management section of the router to It tends to vary slightly from one to another brand. In my case, making use of a router D-Link DIR 879 access to there changed the password to the router to a Digital Alpha-based signs at the same time. Does not need to be very long, that simply combine well all kinds of elements. It’s put things as difficult as possible from the impossible… There is no.

Once the parameters changed equipment we will return to the initial screen for us “logueemos” but now with the new key (and if your browser asks you if you want to keep, in my case always say that no).

Once we control the possible breach of security to access our router touch change our Wi-Fi network name and the network key. And before you follow one caveat is that you must take into account that if you have already connected devices to the network, with the change of name, password or both, you should return to synchronize them again (this includes Extenders network that drink from the main network to expand it by the entire floor).

To this point we will find a section that Wi-Fi Settings, Wireless Settings or similar (as in the previous case may vary depending on brand and model of router) and once inside look for the name of our Wi-Fi network “Network name (SSID)”. A name that generally comes by default in such a way that it refers to our operator (if the router is provided by the) or the brand name (if free). In this case it is convenient to use names of network not too flashy but that at the same time can easily distinguish.

Looking for a good cipher

When it comes to proceed with the change, we’ll see how we can find options that may sound strange to us. It is of the type of encryption being able to choose between three systems or different protocols that can be found in most modern routers: WEP, WPA, and WPA2.

  • The older WEP It has become obsolete and the least advisable. It provides encryption level 2 and I could break with device easily.
  • The successor to WEP WPA stands out by offering more security to not be so limited in the number of characters that you can enter.
  • WPA2 the more secure protocol, which offers the highest level of protection of the three

Now and without giving the Save button or similar must change the password to connect to our network. It tries to avoid that comes by default and even do not have to make use of those that can be found on the Internet. You can create your own key network but always without that is associated with a parameter (registration, dates of birth) logical or mathematical formulas. It is so interesting as we saw before, using letters, numbers and signs.

The most common is that once we have changed the network name and key the router restarts, going to be disconnected seconds. In addition, if we did it via Wi-Fi it is recommended to do a copy paste of the key to take less when it comes back to connect to the network.

How you can see it’s a very simple steps but will allow your network to have a safety plus and is that although full impermeability is impossible to achieve (theirs is to disable the WPS button) if that will get things a bit more difficult.

Gallery

Essay to of unpublished essay examples can > Universal …

Essay to of unpublished essay examples can > Universal ...

Source: www.gartenpflege-schmitt.ch

Solved: Classify The Following Pair Of Compounds As The Sa …

Solved: Classify The Following Pair Of Compounds As The Sa ...

Source: www.chegg.com

NCERT Solutions for Class 9 Hindi Chapter 11 सवैये …

NCERT Solutions for Class 9 Hindi Chapter 11 सवैये ...

Source: schools.aglasem.com

Artist & Style Research Pages

Artist & Style Research Pages

Source: www.sonomavalleyhighschoolart.com

How to Create Partner Function & Partner Determination …

How to Create Partner Function & Partner Determination ...

Source: www.guru99.com

FAQ

FAQ

Source: wiki.imacros.net

Free Printable Chapter 12 Mendel and Meiosis Worksheet …

Free Printable Chapter 12 Mendel and Meiosis Worksheet ...

Source: goodsnyc.com

Preview English writing skill 15 pages of 210 pages

Preview English writing skill 15 pages of 210 pages

Source: fr.slideshare.net

Solved: Classify The Following Pair Of Compounds As The Sa …

Solved: Classify The Following Pair Of Compounds As The Sa ...

Source: www.chegg.com

Solved: Classify The Following Pair Of Compounds, As The S …

Solved: Classify The Following Pair Of Compounds, As The S ...

Source: www.chegg.com

http://www.gogofinder.com.tw/books/pida/2/ 2013 Display …

http://www.gogofinder.com.tw/books/pida/2/ 2013 Display ...

Source: www.gogofinder.com.tw

http://www.gogofinder.com.tw/books/pida/2/ 2013 Display …

http://www.gogofinder.com.tw/books/pida/2/ 2013 Display ...

Source: www.gogofinder.com.tw

Solved: Classify The Following Pair Of Compounds As The Sa …

Solved: Classify The Following Pair Of Compounds As The Sa ...

Source: www.chegg.com

http://www.gogofinder.com.tw/books/pida/2/ 2013 Display …

http://www.gogofinder.com.tw/books/pida/2/ 2013 Display ...

Source: www.gogofinder.com.tw

http://www.gogofinder.com.tw/books/pida/1/ OPTOLINK 2013 …

http://www.gogofinder.com.tw/books/pida/1/ OPTOLINK 2013 ...

Source: www.gogofinder.com.tw

http://www.gogofinder.com.tw/books/pida/2/ 2013 Display …

http://www.gogofinder.com.tw/books/pida/2/ 2013 Display ...

Source: www.gogofinder.com.tw

Computer Hacker: April 2008

Computer Hacker: April 2008

Source: bens-qiu.blogspot.com

6 – Geh-6126c_vol_ii Hmi Manual

6 - Geh-6126c_vol_ii Hmi Manual

Source: edoc.site

http://www.gogofinder.com.tw/books/pida/2/ 2013 Display …

http://www.gogofinder.com.tw/books/pida/2/ 2013 Display ...

Source: www.gogofinder.com.tw

http://www.gogofinder.com.tw/books/pida/2/ 2013 Display …

http://www.gogofinder.com.tw/books/pida/2/ 2013 Display ...

Source: www.gogofinder.com.tw