Results 1 to 4 of 4

Thread: Make your Wireless Network Secure

  1. #1

    carbon copy is offline
    Member Array
    Join Date
    Oct 2009
    Country: Pakistan
    Rep Power

    Make your Wireless Network Secure

    Wireless network is relatively cheap to deploy, easy to setup and configure. In order to make it more secure following steps will be helpful.

    Change the default password

    Almost all wireless devices can be managed via a web interface that can be accessed by simply typing its IP address in a browser’s address field. While the admin interface is password protected, the default password set by the manufacturer is always the same. Anybody can download the manual from the manufacturer’s website, and get the default password. As a result, an intruder can hack our system.

    Disable SSID Broadcast

    The SSID is the name of the wireless network. In order to connect to a wireless network, its name needs to be known. By default, wireless gateways happily broadcast the SSID to be picked up by any wireless network device for easy configuration. Hiding the SSID by disabling SSID broadcast will make it much harder for an intruder.

    Change the SSID

    Disabling SSID broadcast doesn’t help much if the SSID remains the manufacturer’s default, which is just as easily found in the manual as the default admin password. The SSID should be changed to a custom phrase.

    Enable encryption

    Wireless devices support the wireless encryption protocol (WEP) with either 64-bit or 128-bit encryption. 64-bit encryption has been proven to be very weak and easily broken, 128-bit encryption is recommended. Encryption works by entering the encryption key on the wireless gateway as well as on the PC with the wireless card. All transmitted data is encrypted for the transfer between the two devices. If the encryption key does not match, the wireless gateway will not communicate.

    Disable DHCP

    Most gateway devices by default have DHCP enabled. This means that any new host on a network that makes its presence known and broadcasts a request for an IP address and TCP/IP configuration information will be automatically provided this information without questioning. This is very convenient for the legitimate user because it means real plug-and-play (minus the “plug” part since it’s wireless). However, it also makes it very easy for the intruder to connect to a wireless network.

    While it is an inconvenience and requires more maintenance from the legitimate user, disabling DHCP and manually assigning static IP addresses creates another hurdle for the intruder.

    Change the default subnet

    Disabling DHCP doesn’t help much if the subnet remains the manufacturer’s default, which is just easily found in the manual. Most devices use the common default subnet of with a subnet mask of The subnet should be changed.

    Use MAC address filtering

    Each network adapter has a unique hardware address also called MAC address. The first half of the MAC address identifies the manufacturer of the network adapter, the second half identifies the network adapter. This hardware address is unique (more or less) for each network card. Most wireless gateway devices support MAC address filtering. The way this works is that the legitimate user creates a list and enters only the MAC addresses for network cards that he is aware of and that he wants to be able to access the wireless network. Only machines with an authorized MAC address are allowed to participate in the network.

    Practice safe computing

    Even though the network is private and hidden behind a gateway device with a firewall, common sense precautions still need to be used, like:

    Use safe passwords for all user accounts.

    Change passwords every month.

    Password-protect any network shares.

    Require a user login for all computers, disable the guest account.

    Install Antivirus software on all computers and keep it current .

    Install software firewalls on all computers .

    Monitor log files such as event logs, firewall logs, antivirus logs, etc. for unusual activity.

  2. #2
    Member Array
    Join Date
    Nov 2010
    Country: Pakistan
    Rep Power
    very informative,,, thanks

  3. #3
    Junior Member Array
    Join Date
    Nov 2010
    Rep Power
    That's a very good piece of information that you have provided over here and I must say that it was quite informative and explanatory to the best possible extent. I think that it will be without a doubt be termed as being one of the best source of information regarding this,

  4. #4
    Junior Member Array
    Join Date
    Dec 2010
    Rep Power
    I must say that this is a very good piece of information you have provided over here. The new ones looking for a good source are the ones who will benefits the most from this though it is quite difficult to have it implemented in a proper way the first time itself but is sure to have the process understood in a proper way.

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Similar Threads

  1. How to make network cable?
    By admin in forum Internet
    Replies: 6
    Last Post: 07-16-2011, 10:27 AM
  2. How to: Secure Your WLAN
    By orion in forum Computers and Laptops
    Replies: 0
    Last Post: 05-07-2011, 03:12 PM
  3. How To Create a Wireless Network At Home
    By sadia in forum Audio Video
    Replies: 0
    Last Post: 08-25-2010, 01:42 PM
  4. Side Jacking– Now Secure is not secure
    By darani in forum Computers and Laptops
    Replies: 1
    Last Post: 07-23-2009, 03:29 PM
  5. F-Secure Internet Security 2007
    By darani in forum Talk Shaak
    Replies: 0
    Last Post: 03-14-2007, 06:55 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts

Like us on Facebook | Get Website Updates | Get our E-Magazine

Get Daily Forum Updates

Get Most Amazing E-mails Daily
Full of amazing emails daily in your inbox
»» Join Nidokidos E-mail Magazine
Join Nidokidos Official Page on Facebook