Sabtu, 19 September 2009

Wireless Network Security

foto berita artikelUse of the Internet network that today's gathering popularity has encouraged the growth of the Internet network technology itself, which then was born of a wireless network technology (Wireless Network), a very easy user in accessing the Internet. But once there are some things that must be observed that the use of wireless networks can be run safely.

Birth of Wireless Networks for Home

Previously the computer was more regarded as a luxury than a necessity. Only the rich and fortunate are able to have a computer, while the network is only available to large companies.

However, in line with the rapid progress in this decade, so now everyone can each have their own computer. As many of us meet, it usually every parent has his own computer, as well as the child can have his own computer although it may only be used for playing and working on school assignments. The home users have also evolved from the original does not have Internet access, and then began using dial-up Internet with speeds exceeding 9600 kbps 56 kbps dial-up access, and is now developing a rival broadband connections T1 connection is often enjoyed by people at work.

As the Internet and World Wide Web has become a trend in our culture and replace the other media formats to deliver the information sought, ranging from news information, sports, weather, recipes, yellow pages (phone book), and many other things all of which is a new way, not only in the use of computers in the house, but also in terms of the use of an Internet connection.

Meanwhile, hardware companies and software now offers a variety of solutions that allow Internet users at home sharing a connection between more than two computers. Though all these computers must be connected to the network.

To connect one computer to another computer usually requires a variety of physical media, such as telephone cables, coaxial cable, CAT5 cable or telegraph wires are everywhere. But recently has found a new way of using the Internet without using a variety of media liaison terseut, this technology is now commonly called the Wireless network connection (no cable). Use of the Internet by using wireless network connection is of course very easy user in accessing the Internet, without going through the process of installation and wiring headaches.

The arrangement of the wireless network connection is very simple. Internet connection in the Internet Provider and then connected to a wireless access point or the successor router that emits a signal. When you connect by using the card or wireless network antenna to receive signals, and vice versa, then you have successfully connected.

Problems that often arise at the time to enjoy wireless signal connection is difficult to know to what extent these signals can be received. If the signals can be captured from the second floor of an office, it should also be captured from the basement which was 100 feet below ground. This can only make a hacker looking for a gap from a wireless connection to a variety of important information about you.

But that does not mean do not recommend the use of wireless networks. It's just that you have to careful in using this wireless network, and taking some basic prevention to the use of this technology can be completely secure. Here are a few simple steps that can be done to secure the wireless network you use.

Basic Security Step 6 Network:

1. Change the System ID (Identity)
Usually a wireless service equipped with a standard security or identity is often called the SSID (Service Set Identifier) or ESSID (Extended Service Set Identifier). Very easy for a hacker to find out the identity of the default of a service or network, so you should immediately turn it into a unique identity, which is not easy to guess someone else.

2. Turn off the transmitter identity
By announcing to the public that you have a wireless network will make for curious hackers breaking into your wireless network. Having a wireless network that does not mean to share it with everyone. Check the hardware manual that you used for the wireless network, and learn how to turn them off.

3. Provide encryption
WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access) encryption can be to your data so that only the recipients are expected to read the data. WEP (Wired Equivalent Privacy) has many weaknesses that make it easily infiltrated. 128-bit key only has the level of achievement is relatively low without significant security improvements, while for 40-bit or 64-bit on some other equipment, has as good encryption. With a standard way of securing it must still be easy for hackers to infiltrate, but with the way this encryption will surely make your network more secure from hackers. If possible, it is better to use WPA encryption (the older equipment can be upgraded in order compatible with WPA). WPA can be very promising in securing your wireless network security, but can still be defeated by a DOS attack (denial of services).

4. Restrict the use of unnecessary traffic
Many cable network routers and wireless-equipped firewalls. Not intended to promote firewalls, but firewalls have helped in network security defense. Read the user manual of your hardware and learn how your router configuration settings, so that only traffic that you only have permission to be executed.

5. Change 'password' you belong to the default Administrator
This is good for all use of hardware or software. The default password is very easy to be misused, especially by hackers. Therefore should change your password, avoid using the word of the personal things you are easily known people, such as last name, date of birth, and so on.

6. Lock and protect your computer
This is way past security to your computer. Use firewalls, anti-virus software, Zone Alarm, and so forth. At least one week each maintaining Anti Virus you use.
(dna)

http://www.beritanet.com/Technology/Security/keamanan-wireless-network.html

Tidak ada komentar:

Posting Komentar