How to secure the wireless network of the router and why - video tutorial

Hi friends, in today's tutorial we'll talk about how it secures wireless network router and you have to do this. I decided to make this tutorial for a tutorial made 3 days ago, a visitor in his naivety in the comments box telling us that he has left the free wireless network without password because it is not bothered by the fact that someone can connect to its network wireless and can browse or download files from the internet. I am sure that this user consent are many other users. The main reasons we want to secure your wireless network are totally different.
Why do I secure my wireless network?
- so that those in the neighborhood can not gobble up downloading 30 torrent files at the same time. If this happens, the bandwidth will be choked and your internet speed will be slower.
- there are still many malicious people who, once they have access to your wireless network, can scan your traffic and find out what sites you access, what passwords you enter, what searches you do on google, what your interests are
- another and most important reason is that a cybercriminal, once he has access to your wireless network, can launch attacks on other people or even on you, can commit crimes, can make purchases with fake cards, can penetrate websites institutional, governmental. If this happens, you will be held accountable because the offender launched all these attacks and committed all these iniquities on the IP of your connection.
What can we do to secure our wireless network router?
It is extremely important to take the security of the wireless network very seriously and to apply all the settings of your wireless router that are related to this. A first step is to disable the routing of the SSID and avoid creating a wireless WEP network. This type of security is very easy to penetrate. By unchecking "Enable SSID Broadcast" your wireless network will be hidden and you can only connect if you know the SSID of the wireless network and the authentication key to it. Another important aspect is to apply MAC (Wireless MAC Filtering) based filtering. This means that only devices for which you have entered the MAC address in the filter list will be allowed to access the wireless network. Another great advantage of using MAC-based filtering is that even if someone knows the network SSID and authentication key, they will not be able to connect to your wireless network if their device's MAC was not. added to the filter list.
If your router supports WPA security / Staff WPA2-PSK with AES encryption then select this option to create a wireless network when you configure.
That said, I invite you to watch the video tutorial to see exactly how to implement all the settings mentioned to secure a wireless network router.
If you do not know how to set up a router and how to create a wireless network, I invite you to watch the tutorials:
How to make the connection settings for RDS and a wireless internet router (RDS)
D-Link DIR router configuration 655 for Romtelecom, RDS, UPC, internet starter, 3G(For other connection types)

Remember, if you have suggestions, complaints or additions do not hesitate to write in the comments box, de-also if you met the comments box a user has a problem and you can help him, do not hesitate to do it, the only way we can do this place better, see the comments box!
On the comments box trying to get somewhat on the subject so other visitors can offer a tutorial + comments relevant comments may be extra support for user errors, or desire to learn.
Before asking a question try looking through the comments oldest, most times there already answered your question.
Use more categories at the top of the site and the search engine from the right corner to quickly get to what you are interested, we have over 800 tutorials that cover almost every genre of software, we have realized, I you just have to search for them and watch them.

Instructions for use videotutorial.ro

Search Engine.
If for example you have a problem with Yahoo Messenger, you can enter in our search engine terms like Yahoo, Mess, Messenger, id mess, multimess problem messenger, messenger error, etc., you will see that you will have a choice.

Categories.
If you use category drop-down, they find the bar under Home categories: Office, Graphic-Design, Hardware, Internet, Multimedia, Security, System, Storage, Backup, under these categories are organized sub-categories and sub-sub -categorii, that's a more accurate filtering. To find something related to Yahoo Messenger using the categories you can lead the category:InternetThere will open other subcategories where you choose Voice-ChatFrom there you can go on the subcategory YahooFinally, with these filters will arrive on a page where the only items related to Yahoo Messenger or Yahoo Mail.

Archives.
On the page Archives You can find all our tutorials organized beautiful days saptameni, months and years.
Everything is logical, just follow the logic.

Enjoy !

Adrian...... ..linux.videotutorial.ro



Related Tutorials



about Adrian

Flemish information and knowledge, I like everything about art and share my knowledge with great pleasure. Those who give themselves to others will lose themselves but usefully, leaving something useful fellows. I enjoying this privilege, I will never say "do not know" but "not yet know"!

Comments

  1. I want to see how insecure WEP is conecsiunea and how to access.

  2. Hi Adrian I want a tutorial on how vurnelabila's WEP connection

  3. leave it with a password that you can not see the password if your network scans. As controls on my ip you guess who takes them to the one who ordered the package that just has to put the address of delivery. Who uses numbers knows exactly how to do the job search not unsecured wireless networks in the city. and if the police come to me can figure out the problem. I do not get in trouble. anyway it's good to set the password on wireless router and password management.

  4. and watch the demonstration that all routers wep Romtelecom and UPC if the set of active safety 2 types, WEP and wpa2. I know you want to do good and to demonstrate how easy it can intercept and decrypt WEP but not to get somewhere that boys could not wait to "break" network neighbors

  5. I'd like a little help or even try. In a few weeks you do a tutorial on GBO TV Player but there was a problem. When you open the stream and finds no error occurs.

  6. Sorin Chiran said

    And I'm interested in the vulnerability of WEP!

  7. I'm curious to see how vulnerable is WEP security

  8. AdrianGudus said

    Andrew:
    leave it with a password that you can not see the password if your network scans. ordering as the IP packet meughici you who takes them to the one who ordered that only has to put the address of delivery. Who uses numbers knows exactly how to do the job search not unsecured wireless networks in the city. and if the police come to me can figure out the problem. I do not get in trouble. anyway it's good to set the password on wireless router and password management.

    The entered can not get you in trouble but you will be called and held by departments / police station is clearing up job and do not think you want to waste your time with this.
    Regarding passwords, I suggest you document yourself regarding a cookie. Do not be naive. If you do not know how to do all these things does not mean that there are no methods or that others do not know how to do.
    It's not just about cybercriminals scanning the slap, it may even be a curious person in your block, a "friend" who wants to find out more or an enemy.

  9. And I want to see the vulnerability of WEP connection

  10. lucyana said

    and WPA / WPA2 can break

  11. AdrianGudus said

    lucyana:
    and WPA / WPA2 can break

    Yes, it is but a little harder.

  12. AdrianGudus said

    Andrew:
    and watch the demonstration that all routers wep Romtelecom and UPC if the set of active safety 2 types, WEP and wpa2. I know you want to do good and to demonstrate how easy it can intercept and decrypt WEP but not to get somewhere that boys could not wait to "break" network neighbors

    What I like people like you. Above seems like no big cheese wireless to secure the site and suddenly you panicked.
    Our tutorials are for educational purposes. If we show you something, do not necessarily mean you have to put into practice. Everything you do, do or make on your responsibility. Nobody is responsible for the actions they make especially as we specified in each tutorial that exemplify sensitive things that we do not take our responsibility as an educational tutorials and nothing more.
    If you are not able to distinguish right from wrong then you do not belong in front of a computer. If evil does not mean hiding remove. Who wants to do that (to penetrate wep wifi network) can find even now in the billions of websites on the internet without the need of our tutorial. These sites are explaining that "life", there on the internet and today.

  13. We want to show how easily it penetrates WEP connection.

  14. Very good tutorial no offense but how can I see if someone uses net nice thank you from me good luck.

    • Galaxy S said

      Hey Marius… If you had watched the tutorial, you would have seen how you can see if someone is using your network… ..somewhere after the mac filtering this is specified …….

  15. And please make a tutorial about those routers from Romtelecom, that we give them when stuffing default net.

  16. AdrianGudus said

    marius:
    Very good tutorial no offense but how can I see if someone uses net nice thank you from me good luck.

    We also showed in this video tutorial. if you scroll and watch the tutorial head-tail is also this.

  17. How to crack WEP test very easily. I had WPA-Personal. I want to see how to break the WEP.

  18. Hi Adrian I have wi-fi in the house at UPC and they came at me meow mounted ala all well and good Addicted go on wi-fi and cable used. But I also have a PSP and it does not support Wi- be only WEP and no password and I guess that is NONE of them routeru UPC is WPA2-PSK! You think you can change? There are settings that change the type of bonding hatchet? Please raspunedemi are desperate!

  19. Great tutorial! I connected 2 already completed according to the instructions given (hidden SSID, MAC filter), but I had a problem with an LG Optimus Net which connects to the router. Configured network appears on it but not get IP, therefore not connecting. You could help me with any ideas?

  20. We want to see how easy it can crack a WEP

  21. vicentiu said

    We want to see how easily it can crack a WEP disabled QSS

  22. AdrianGudus: Yes, it is but a little harder.

    Harder? Do not look here Linuxu Beini can break any password with a few clicks. Tutorials found on Youtube, do not know if Spanish and English but sure.

  23. AdrianGudus: What I like people like you. Above seems like no big cheese wireless to secure the site and suddenly you panicked.
    Our tutorials are for educational purposes. If we show you something, do not necessarily mean you have to put into practice. Everything you do, do or make on your responsibility. Nobody is responsible for the actions they make especially as we specified in each tutorial that exemplify sensitive things that we do not take our responsibility as an educational tutorials and nothing more.
    If you are not able to distinguish right from wrong then you do not belong in front of a computer. If evil does not mean hiding remove. Who wants to do that (to penetrate wep wifi network) can find even now in the billions of websites on the internet without the need of our tutorial. These sites are explaining that "life", there on the internet and today.


    it is true what he says Andrei
    recommend encryption wpa2 and prefer to break WEP encryption :))
    yet everyone does what he wants we should not announce ourselves we can do nothing but to report to the police

  24. Would you please show us the vulnerabilities of the wp-type security of wireless networks?
    Thank you

  25. Thanks for the tutorial… I have an 841n tp-link and the menu is the same… Both tutorials came to me fixed…

  26. For a while, I only used mac filtering, I thought that if a certain user's network access is denied, he can't do anything. (Data collection) How much do you know is enough? or so data can be collected (I know he can change the poppy but if he doesn't know which poppy to change it with…)
    And I tried something else through the password and I noticed a certain slowing down of the speed towards security through poppies - do you know anything reverent about that?

  27. To see the connections in the router there are many softwares on the internet to do this job, I recommend zamzom wirlles network tool. The sofa has 2 options, the free version that will show you the connections in the router, ie the attacker's IP, connections and MAC address. In the pro version, it will also show you the name of the PC, the name you chose during installation. Congratulations for the tutorial, I live in Spain and here passwords are broken on the agenda, With that Linux Beini mentioned by me in the first comment. I want to tell you that I also suffered from my wifi network being broken. Not infrequently I had to change the password on the router, in order to get rid of breaking my network neighbors I did exactly what is presented by you in this tutorial, I recommend to all those who use wifi connections to do it.

  28. ZOLE2013 said

    and I vote PRO for WPA tutorialu

  29. HOW TO GET YOUR PASSWORD TO A wireless WEP security?

  30. liviu_florin said

    … Can be explained on other types of routers, such as the one from romtelecom HG655b, where other options also appear such as: AP isolation or Hide broadcast. ; Or if the TKIP mode is weaker than the AES.

  31. The ciphers Cracking WPA / PSK WPA2 If you have already captured packets, you can use ordinary Cain, where importing the file with. head. Cain will look and tell us if there is any valid handshake from which to extract cipher PSK:

  32. Yes, it would be interesting to see how easy it is to break a WEP network…

  33. adrian76 said

    see behind the camera and definitely write 192.168. and so on

  34. vicentiu said

    Zoltan Teszari mask and wine RDS FREE WI-FI SPOT

  35. Hello, how can I find out if someone is connected to my routeru wirelessly, in the cases where I would have broken your password?

    • Floryn:
      Hello, how can I find out if someone is connected to my routeru wirelessly, in the cases where I would have broken pa

      Floryn:
      Hello, how can I find out if someone is connected to my routeru wirelessly, in the cases where I would have broken your password?

      Floryn:
      Hello, how can I find out if someone is connected to my routeru wirelessly, in the cases where I would have broken your password?

      You can find all these things by looking at Wireless Statistics in your router. My advice is to watch the tutorial again and be careful…. something… I can't tell you..because you couldn't understand Success

  36. Alex:
    Hi Adrian I have wi-fi in the house at UPC and they came at me meow mounted ala all well and good Addicted go on wi-fi and cable used. But I also have a PSP and it does not support Wi- be but I guess that is WEP and NONE of them without password sirouteru UPC is WPA2-PSK! You think you can change? There are settings that change the type of bonding hatchet? Please raspunedemi are desperate!

    Of course that can change, usually have a lot of settings options to configure a router handy but either way with a password WEP + MAC + network = pretty much hidden safety network. guidelines apply tips-made tutorial and I assure you that you will solve the problem Good luck

  37. WANT necessarily a tutorial on WEP vulnerability larg.merci.

  38. Hello recently I set my router and I hid my SSID not to see me and others on a laptop I have windws xp fail to bag hidden SSID when Windows fails 7

  39. The device, smartphone, as we find MAC IP, to introduce him to the security (also so we find that PC and laptop?). The laptop I understand, but the smartphone is the same?

  40. You said that someone can monitor what we do where we log in with what password etc… .with the help of which software is this done ??

  41. what antivirus software or inpotriva we can protect someone who has connected to my wifi Powered paachetele us and analyze?

  42. Nicolae said

    Very useful, thanks, I learned a lot from videotutorial.ro useful lucruru always you can not find the solution to any problem with PC videotutorial.ro get on here know everything.
    Well there are people who do and free things

  43. Hi! I also have a problem and I need advice. When I enter that code (192.168.1.1) and enter it, it appears directly to me "Username or Password is incorrect.
    Please refer to the troubleshooting below:…. ”I have no idea why, given that I didn't even get the box to write them in. I want to secure it exactly as I saw in this tutorial, but I can't get in. PS: I think someone has access to wi-fi without knowing it.

    • If you do not know the username and password of the router, you can reset the router and then you can reconfigure. The router has a small button that you pressed a 5 seconds and resets.

    • give a reset the router's settings and you still have a buton small factory with a pen or a sharp stick now depends on the router that is the normal button

  44. The problem is that I don't have that window in which to put the username and password and it gives me directly that error I mentioned above. Last night I restarted it and reconfigured it, but the same problem. This is curious for me. Why don't you even let me enter the menu?

    • Adrian Gudus said

      I hope you're not trying to access your router from a laptop you're wirelessly connected to on the WiFi router, are you? Because if so, that may be one of the reasons you are not allowed access. If you watched the head-to-tail video tutorial, I even drew attention to this "do not access your laptop router via wireless connection"
      Access is via wireless router. Connect a wired network card of your PC or laptop and insert the other end it nicely in one of the LAN ports with the initials routerului.marcate

  45. I tried it and the same problema.Nu know what to try acum.Pe write Default access of the router: http://tplinklogin.net.Am fel.Nu tried curiosity and have no idea what it could be.

  46. Thanks a lot, I was very useful
    much and I wanted to learn how to do
    you were very explicit… bravoooo

  47. Hello! Recently I also bought a router, it doesn't have an antenna from that up and it's mertical, the net works on the computer, I can connect with the phone. Now the problem: Canv I want to enter the net from the PHONE, the phone tells me that I don't have a net, although it is connected to wifi and also has a signal… What should I do? I mention that I have windows 7 if I have to change my resume in settings. Thank you.

  48. Hello! So I have a router serioux and I have no box or manual from him and I did not installed so no ip not know him. I want to get my password but do not know how because i do not occur to you that when I try to bag one ip

  49. HELLO! I have a problem! I installed a router TL-WR 740N, IMI GO ON PC AND LAPTOP WI FI BUT NOT go on a SAMSUNG GALAXY MINI 2 although NOT CONNECTED TO WI FI internet access! Thanks in advance

  50. I have the same problem and I scan our wifi andronic router I had a time when I had access to the router but suddenly it doesn't give me the romtelecom address …… what should I do?

  51. I have tutorials for everything? I have found so far the problem has not resolved your website, you are the hottest tinetio all, with as many good tutorials

  52. I want to make his mask my ip if you can wait a Linc poatecum here [email protected]

  53. Daniela said

    I have a little problem!
    I do not allow me to log on the website to change my password.
    A suggestion? What can i do? With the new password can I login?

  54. Hello everyone. I have a problem. How do I set the password to the Wi-Fi network?

  55. Hello, we are given all the information folositoare.Multumim!

Speak Your Mind

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.