How to secure the wireless network of the router and why - video tutorial

Hi friends, in today's tutorial we'll talk about how it secures wireless network router and you have to do this. I decided to make this tutorial for a tutorial made 3 days ago, a visitor in his naivety in the comments box telling us that he has left the free wireless network without password because it is not bothered by the fact that someone can connect to its network wireless and can browse or download files from the internet. I am sure that this user consent are many other users. The main reasons we want to secure your wireless network are totally different.
Why do I secure my wireless network?
- so that those in the neighborhood can not gobble up downloading 30 torrent files at the same time. If this happens, the bandwidth will be choked and your internet speed will be slower.
- there are still many malicious people who, once they have access to your wireless network, can scan your traffic and find out what sites you access, what passwords you enter, what searches you do on google, what your interests are
- another and most important reason is that a cybercriminal, once he has access to your wireless network, can launch attacks on other people or even on you, can commit crimes, can make purchases with fake cards, can penetrate websites institutional, governmental. If this happens, you will be held accountable because the offender launched all these attacks and committed all these iniquities on the IP of your connection.
What can we do to secure our wireless network router?
It is extremely important to take the security of the wireless network very seriously and to apply all the settings of your wireless router that are related to this. A first step is to disable the routing of the SSID and avoid creating a wireless WEP network. This type of security is very easy to penetrate. By unchecking "Enable SSID Broadcast" your wireless network will be hidden and you can only connect if you know the SSID of the wireless network and the authentication key to it. Another important aspect is to apply MAC (Wireless MAC Filtering) based filtering. This means that only devices for which you have entered the MAC address in the filter list will be allowed to access the wireless network. Another great advantage of using MAC-based filtering is that even if someone knows the network SSID and authentication key, they will not be able to connect to your wireless network if their device's MAC was not. added to the filter list.
If your router supports WPA security / Staff WPA2-PSK with AES encryption then select this option to create a wireless network when you configure.
That said, I invite you to watch the video tutorial to see exactly how to implement all the settings mentioned to secure a wireless network router.
If you do not know how to set up a router and how to create a wireless network, I invite you to watch the tutorials:
How to make the connection settings for RDS and a wireless internet router (RDS)
D-Link DIR router configuration 655 for Romtelecom, RDS, UPC, internet starter, 3G(For other connection types)

Remember, if you have suggestions, complaints or additions do not hesitate to write in the comments box, de-also if you met the comments box a user has a problem and you can help him, do not hesitate to do it, the only way we can do this place better, see the comments box!
On the comments box trying to get somewhat on the subject so other visitors can offer a tutorial + comments relevant comments may be extra support for user errors, or desire to learn.
Before asking a question try looking through the comments oldest, most times there already answered your question.
Use more categories at the top of the site and the search engine from the right corner to quickly get to what you are interested, we have over 800 tutorials that cover almost every genre of software, we have realized, I you just have to search for them and watch them.

Instructions for use videotutorial.ro

Search Engine.
If for example you have a problem with Yahoo Messenger, you can enter in our search engine terms like Yahoo, Mess, Messenger, id mess, multimess problem messenger, messenger error, etc., you will see that you will have a choice.

Categories.
If you use category drop-down, they find the bar under Home categories: Office, Graphic-Design, Hardware, Internet, Multimedia, Security, System, Storage, Backup, under these categories are organized sub-categories and sub-sub -categorii, that's a more accurate filtering. To find something related to Yahoo Messenger using the categories you can lead the category:InternetThere will open other subcategories where you choose Voice-ChatFrom there you can go on the subcategory YahooFinally, with these filters will arrive on a page where the only items related to Yahoo Messenger or Yahoo Mail.

Archives.
On the page Archives You can find all our tutorials organized beautiful days saptameni, months and years.
Everything is logical, just follow the logic.

Enjoy !

Adrian.... linux.videotutorial.ro


Adrian: Hungry for information and knowledge, I like everything related to the technical field and I share my knowledge with great pleasure. Those who give themselves to others will lose themselves but usefully, leaving something useful to others. Enjoying this privilege, I will never say "I don't know", but "I don't know yet"!

View Comments (66)

  • leave this with passwords so you can't see the passwords if they scan your network. as for the orders on my ip, you can guess who takes the package to the one who ordered that he just has to enter his receiving address. whoever uses numbers knows exactly how to do their job not looking for unsecured wireless networks in the city. and if the police come to me I can figure out what the problem is. I'm not in trouble. however, it is good to set the wireless password and the router administration password.

  • and be careful with the wep demonstration because all the routers from romtelecom seem to have upc set basic 2 types of active security, wep and wpa2. I know you want to do good and demonstrate how easy it is to intercept and decrypt the wep password, but not to get anywhere else that the boys can't wait to "break" the neighbors' networks

  • I'd like a little help or even try. In a few weeks you do a tutorial on GBO TV Player but there was a problem. When you open the stream and finds no error occurs.

  • Andrew:
    leave it with a password that you can not see the password if your network scans. ordering as the IP packet meughici you who takes them to the one who ordered that only has to put the address of delivery. Who uses numbers knows exactly how to do the job search not unsecured wireless networks in the city. and if the police come to me can figure out the problem. I do not get in trouble. anyway it's good to set the password on wireless router and password management.

    The entered can not get you in trouble but you will be called and held by departments / police station is clearing up job and do not think you want to waste your time with this.
    Regarding passwords, I suggest you document yourself regarding a cookie. Do not be naive. If you do not know how to do all these things does not mean that there are no methods or that others do not know how to do.
    It's not just about cybercriminals scanning at the click, it may even be a curious person in your block, a "friend" who wants to find out more or an enemy.

Related Post

This website uses cookies.