Are You Ready For A Wi-Fi Network In Your Home?

Izvor: KiWi

Skoči na: orijentacija, traži

One of the fastest growing segments of Internet connection today is Wireless Internet. Wi-Fi, or Wireless Fidelity, is Internet connectivity over dual group communities which are classified security alarm system with a pair of standards mostly known as 802.11, 802.11a, and 802.11b. While there are many requirements, these three are the most frequent at this time. Access of these types of sites can be acquired in many major cities in the Usa, and the technical standards used to establish Wi-Fi entry are in use in many other countries.

The 802.11 standards could be classified by many special features, as well as the possible speed available. 802.11b and 802.11a are considered the two quickest wireless network standards offering uploads up to 11mbps and packages at a brisk 54mbps. Clearly these rates can take on any satellite or DSL Internet presenting, and many wire services are somewhat slower.

Security Issues:

The comfort and ease of use of Wi-Fi connection also includes several security issues. Combined with the normal security issues inherent in a wired connection, data sent and received via a wireless connection can be intercepted and received very nearly anywhere inside a given range. With the introduction of Wired Equivalent Privacy, or WEP, encryption has turned into a common security measure with virtually every wireless high speed internet connection. Despite a WEP type in place the data may be captured, it is just unlikely that the information will be helpful. Of course a determined hacker could eventually access the data, but this will be the exception not the rule.

an Evil Twin Attack a more common Wi-Fi security issue is referred to. This kind of attack takes place when a hacker hijacks a radio network signal. The hijacker makes a access point in their own mobile computer, generally supplying a wireless network to anyone within selection of their transmission. The hacker then enters a favorite wireless entry region like a coffee shop or mall and makes their network available. When a person tries to log into the community provided by their favorite coffee shop, it's possible they mistakenly pick the hacker's wireless access point. This is a way many security measures can be bypassed by a hacker often including security. Every package of data sent or received via an Evil Twin can be acquired to the hijacker. There are many safety measures that may be taken fully to prevent an Evil Twin strike as well as other risks. These include:

Use WPA or WPA2 protection. That prevents any unencrypted knowledge from being delivered, and configures all security keys at the switch. This is often only available with a property service.

When establishing home instant access, rename the system from the factory preset to something unique. This may guarantee that the right network is always used.

Never sign into a wireless network that doesn't use Secured Socket Layer (SSL) security.

Use a smart computer software consumer that encrypts all data before it's ever sent to the Web.

Try to just work with a wireless link providing you with Wi-Fi Protected Access (WPA). WPA further strengthens the protection given by WEP.

Osobni alati