Home wireless network infrastructure type and security
Wireless Network Infrastructure connectivity is now becoming increasingly popular. Such connections can be easily set up, and most of the time are reliable as long as they are set correctly. Freedom of access to the Internet or other equipment, without any cable help, is very attractive to all users. Most houses and even offices are connected by wireless networks. However, the wireless network poses a danger from wireless wire tapers and wire tapers.
Learn two
types of wireless network settings and two ways to secure wireless connections.
There are two types of radio network connections. Infrastructure network
connectivity and ad hoc network connectivity. Infrastructure uses routers or
gateways to provide an IP address for each device and to share Internet
connections. For example, you have desktops and laptops. For laptops or
desktops, wireless routers or gateways should be available.
Normally,
the modem is set to connect routers, and the laptops and desktops can then be
connected to wired or wireless. No routers or gateways are required for such
connections. The ad hoc connection involves two wireless devices for direct
communication. A good example is two laptops. You can set up a temporary
connection on a laptop. A laptop will serve as a server and broadcast its ad
hoc name.
The second
computer will scan an ad hoc heat signal and should detect computer number one.
The option to connect to an ad hoc network will be given. The wireless signals
your router is playing can be encrypted or insecure. Unprotected signals allow
unauthorized users to connect to your signals and receive free Internet
connections. If there are many unauthorized users connected to your router, the
Internet will slow down, thereby devouring your bandwidth. Not to mention, they
can hack into your computer because you've been connected to a network.
About four
years ago, one of the companies I wrote to asked me to experiment to see how
many wireless networks I could detect and how many of them were nuisances. For
experiment purposes, I installed a copy of Net Stumbler on my laptop and asked
my wife to drive me around, while I tried to locate a wireless network. In my
experience, I found seven networks, none of which are secure. Except for the Wireless Network Infrastructure which is very important.
Of course,
seven wireless networks are not much, but there are some things to remember.
First of all, I live in a rural area in South Carolina, where there is nowhere
to go, not in a densely populated place like New York City. Secondly, I use
wireless access cards without external antennas. Thirdly, I have tried to
detect wireless networks from mobile vehicles using relatively short wireless access
cards. Fourth, it was four years ago.
If I had
detected many networks four years ago, in the wilderness, under very low
reception rates, can you imagine how many networks are in use today? Wi-fi
networks are spread and the vast majority of networks are insecure. In fact, by
December, it was estimated that 60 to 70 percent of all wireless networks were
not encrypted.
My point is
that Wireless Network Infrastructure is everywhere, mostly unsafe, and
bad people know that. Hackers usually practice what they call a war walk. War
walks like my little experiment. It's a foot trip, a car trip, an airplane
trip, or any trip that attempts to place a wireless network. At first, if a
hacker knew you had a wired network, it might not seem a big deal. After all,
most of the neighbors may also have wireless networks.

Comments
Post a Comment