GreenPoison

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Monday, 26 July 2010

How to Prevent Others from Using Your Wireless (Wi-Fi) Network

Posted on 03:24 by Unknown

This article describes how you can secure your Wireless Network from hackers and you’ll also learn about free tools that people generally use to intercept your Wi-Fi signals.

Wireless networks (wi-fi)Wireless Networking (Wi-Fi) has made it so easy for you to use the computer, portable media player, mobile phones, video game consoles, and other wireless devices anywhere in the house without the clutter of cables.

With traditional wired networks, it is extremely difficult for someone to steal your bandwidth but the big problem with wireless signals is that others can access the Internet using your broadband connection even while they are in a neighboring building or sitting in a car that’s parked outside your apartment.

This practice, also known as piggybacking, is bad for three reasons:

  • It will increase your monthly Internet bill especially when you have to pay per byte of data transfer.
  • It will decrease your Internet access speed since you are now sharing the same internet connection with other users.
  • It can create a security hazard* as others may hack your computers and access your personal files through your own wireless network.

[*] What do the bad guys use - There have been quite a few instances where innocent Internet users have been arrested for sending hate emails when in reality, their email accounts where hacked though the unsecured Wi-Fi networks that they had at home. Wireshark is a free packet sniffing tool for Linux, Mac and Windows that can scan traffic flowing though a wireless network including cookies, forms and other HTTP requests.

How to Secure Your Wireless Network

The good news is that it is not very hard to make your wireless network secure, which will both prevent others from stealing your internet and will also prevent hackers from taking control of your computers through your own wireless network.

Here a few simple things that you should to secure your wireless network:

Step 1. Open your router settings page

First, you need to know how to access your wireless router’s settings. Usually you can do this by typing in “192.168.1.1” into your web browser, and then enter the correct user name and password for the router. This is different for each router, so first check your router’s user manual.

You can also use Google to find the manuals for most routers online in case you lost the printed manual that came with your router purchase. For your reference, here are direct links to the manufacturer’s site of some popular router brands – Linksys, Cisco, Netgear, Apple AirPort, SMC, D-Link, Buffalo, TP-LINK, 3Com, Belkin.

Step 2. Create a unique password on your router

Once you have logged into your router, the first thing you should do to secure your network is to change the default password* of the router to something more secure.

This will prevent others from accessing the router and you can easily maintain the security settings that you want. You can change the password from the Administration settings on your router’s settings page. The default values are generally admin / password.

[*] What do the bad guys use - This is a public database of default usernames and passwords of wireless routers, modems, switches and other networking equipment. For instance, anyone can easily make out from the database that the factory-default settings for Linksys equipment can be accessed by using admin for both username and password fields.

Step 3. Change your Network’s SSID name

The SSID (or Wireless Network Name) of your Wireless Router is usually pre-defined as "default" or is set as the brand name of the router (e.g., linksys). Although this will not make your network inherently* more secure, changing the SSID name of your network is a good idea as it will make it more obvious for others to know which network they are connecting to.

This setting is usually under the basic wireless settings in your router’s settings page. Once this is set, you will always be sure that you are connecting to the correct Wireless network even if there are multiple wireless networks in your area. Don’t use your name, home address or other personal information in the SSID name.

[*] What do the bad guys use - Wi-Fi scanning tools like inSSIDer (Windows) and Kismet (Mac, Linux) are free and they will allow anyone to find all the available Wireless Networks in an area even if the routers are not broadcasting their SSID name.

Step 4. Enable Network Encryption

In order to prevent other computers in the area from using your internet connection, you need to encrypt your wireless signals.

There are several encryption methods for wireless settings, including WEP, WPA (WPA-Personal), and WPA2 (Wi-Fi Protected Access version 2). WEP is basic encryption and therefore least secure (i.e., it can be easily cracked*, but is compatible with a wide range of devices including older hardware, whereas WPA2 is the most secure but is only compatible with hardware manufactured since 2006.

To enable encryption on your Wireless network, open the wireless security settings on your router’s configuration page. This will usually let you select which security method you wish to choose; if you have older devices, choose WEP, otherwise go with WPA2. Enter a passphrase to access the network; make sure to set this to something that would be difficult for others to guess, and consider using a combination of letters, numbers, and special characters in the passphrase.

[*] What do the bad guys use - AirCrack and coWPAtty are some free tools that allow even non-hackers to crack the WEP / WPA (PSK) keys using dictionary or brute force techniques. A video on YouTube suggests that AirCrack may be easily used to break WiFi encryption using a jail-broken iPhone or an iPod Touch.

Step 5. Filter MAC addresses

Whether you have a laptop or a Wi-Fi enabled mobile phone, all your wireless devices have a unique MAC address (this has nothing to do with an Apple Mac) just like every computer connected to the Internet has a unique IP address. For an added layer of protection, you can add the MAC addresses of all your devices to your wireless router’s settings so that only the specified devices can connect to your Wi-Fi network.

MAC addresses are hard-coded into your networking equipment, so one address will only let that one device on the network. It is, unfortunately, possible to spoof a MAC address*, but an attacker must first know one of the MAC addresses of the computers that are connected to your Wireless network before he can attempt spoofing.

To enable MAC address filtering, first make a list of all your hardware devices that you want to connect to your wireless network**. Find their MAC addresses, and then add them to the MAC address filtering in your router’s administrative settings. You can find the MAC address for your computers by opening Command Prompt and typing in “ipconfig /all”, which will show your MAC address beside the name “Physical Address”. You can find the MAC addresses of Wireless mobile phones and other portable devices under their network settings, though this will vary for each device.

[*] What do the bad guys use - Someone can change the MAC address of his or her own computer and can easily connect to your network since your network allows connection from devices that have that particular MAC address. Anyone can determine the MAC address of your device wireless using a sniffing tool like Nmap and he can then change the MAC address of his own computer using another free tool like MAC Shift.

Step 6. Reduce the Range of the Wireless Signal

If your wireless router has a high range but you are staying in a small studio apartment, you can consider decreasing the signal range by either changing the mode of your router to 802.11g (instead of 802.11n or 802.11b) or use a different wireless channel.

You can also try placing the router under the bed, inside a shoe box or wrap a foil around the router antennas so that you can somewhat restrict the direction of signals.

Apply the Anti-Wi-Fi Paint – Researchers have developed a special Wi-Fi blocking paint that can help you stop neighbors from accessing your home network without you having to set up encryption at the router level. The paint contains chemicals that blocks radio signals by absorbing them. "By coating an entire room, Wi-Fi signals can’t get in and, crucially, can’t get out."

Step 7. Upgrade your Router’s firmware

You should check the manufacturer’s site occasionally to make sure that your router is running the latest firmware. You can find the existing firmware version of your router using from the router’s dashboard at 192.168.*.

Connect to your Secure Wireless Network

To conclude, MAC Address filtering with WPA2 (AES) encryption (and a really complex passphrase) is probably the best way to secure your wireless network.

Once you have enabled the various security settings in your wireless router, you need to add the new settings to your computers and other wireless devices so that they all can connect to the Wi-Fi network. You can select to have your computer automatically connect to this network, so you won’t have to enter the SSID, passphrase and other information every time you connect to the Internet.

Your wireless network will now be a lot more secure and intruders may have a tough time intercepting your Wi-Fi signals.

Who is Connected to your Wireless Network

If you are worried that an outsider may be connecting to the Internet using your Wireless network, try AirSnare – it’s a free utility that will look for unexpected MAC addresses on your Wireless network as well as to DHCP requests. Another option is that you open your router’s administration page (using the 192.168.* address) and look for the DHCP Clients Table (it’s under Status > Local Network on Linksys routers). Here you will see a list of all computers and wireless devices that are connected to your home network.

*It is also a good idea to turn off the router completely when you are not planning to use the computer for a longer period (like when you are out shopping). You save on electricity and the door remains 100% shut for wireless piggybackers.

**If you ever want to let a new device connect to your network, you will have to find its MAC address and add it to your router. If you simple want to let a friend connect to your wireless network one time, you can remove his MAC address from the router settings when he or she leaves your place.

Email ThisBlogThis!Share to XShare to Facebook
Posted in Computer and Internet Tips, Tips and Tutorials | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Adobe Photoshop CS5 Me Full with crack
    ...
  • (no title)
  • BMW 3 Series Touring
    The design of the BMW 3 Series Touring is like that of the saloon until the central pillar. As in other cases, the silhouette of BMW 3 Seri...
  • BMW M3 Challenge
    BMW M3 Challenge, a racing game developed by the racing specialists Blimey! Games at the international automobile trade fair IAA. BMW M3...
  • Bookworm Adventures: The Monkey King - internet downloads
    Build words and battle nearly 50 warrior foes in Bookworm Adventures The Monkey King! It's up to you to save the world of books from its...
  • Cute Baby Wallpapers
    Cute Baby Wallpapers 800 x 600 px "A baby will make love stronger, days shorter, nights longer, home happier, clothes shabbier, the...
  • Syncplicity Backup : synchronise & share your files
    Syncplicity Backup, synchronise & share your files As PCs are becoming so cheap, instea...
  • Cute cats, cat wallpaper, cute cat wallpaper, artistic wallpaper, cat wallpapers, cats wallpapers, cute wallpaper, cute cats wallpaper, wallpaper cat
  • Free Internet software downloads
    http://internetdownloadzone.blogspot.com/ Internet Privacy Pro is a powerful and flexible Privacy program meant to be deployed on a single...
  • cute cat pictures, cute kitten cats, really cute funny cat pictures, cute cat and kitten images, cat cute pictures, cute golden cats, cat wallpaper
    Snoozing Time If you've spent any time with cats, you've probably noticed that they spend a lot of quality time snoozing. In fact, c...

Categories

  • 176×220 Wallpapers
  • 240 x 320
  • 240 x 320 Wallpapers
  • 3D Graphics
  • 3GP Videos
  • 3gp Mobile Videos
  • 3GP Videos
  • Action
  • Action games
  • Action games.
  • ad
  • Adsense for domains n feeds
  • Adventure
  • Anti Virus Software
  • Anti-Spam Tools
  • Antivirus
  • Application
  • Arcade
  • Artistic Wallpapers
  • Arts and Humanities
  • Audi
  • Audio and Video Software
  • Automobile
  • Backup Software
  • Big game
  • Big games
  • Business
  • Calendars and Personal Reminders
  • Can multiple computers be connected wireless?
  • Can you use a dell monitor with another brand pc?
  • Car Wallpaper
  • Casino Software
  • CD and DVD Burners
  • CD Authoring
  • CD Authoring 2
  • Chat Add-ons
  • Children
  • Children Obesity Programs?
  • Cleaning off a virus from my pc I need help to get a virus off my pc
  • Codecs
  • Communication Software
  • Computer and Electronics
  • Computer and Internet Tips
  • Cute baby wallpapers
  • Cute cat wallpapers
  • Desktop Enhancements
  • Desktop Utilities
  • Device Drivers
  • Digital Image Editors
  • Digital Photo Tools
  • Digital Photography
  • Disk Imaging Tools
  • Do macs get virus'?
  • Do you believe in karma?
  • Do you like facebook?
  • Download Managers
  • Driver Tools
  • DVD Burners/ Rippers
  • DVD Encoders
  • DVD Tools
  • DVD Tools 2
  • DVD Tools 3
  • E-books
  • Fax
  • Fighting games
  • File Deletion and Data Recovery
  • first-person shooter
  • Flash Tools and Programs
  • Font Tools
  • Games
  • Graphic Editors
  • Graphics downloads
  • Hidden Object games
  • Home and Garden
  • How can i get 20$ daily to webanswer
  • How can we remove boot virus
  • How do i get rid of the virus doctor program?
  • How do you format a cd-rw using windows xp?
  • How do you get rid of a trojan virus?
  • How do you transfer files to memory card?
  • How old do you have to be to move out of your parents home
  • I created a social network
  • ICQ/IRC
  • Image Editing
  • Image Viewers
  • Instant Messaging
  • Internet
  • Internet downloads
  • Internet Phones
  • Internet tips
  • Internet Utilities
  • iPhone Games and Tools
  • Iphone Review
  • Is Moon Secure Antivirus any good?
  • Just for Fun
  • Kids games
  • Legal
  • Linux
  • Media Player
  • Misc downloads
  • Miscellaneous
  • Missing Files
  • Mobile Games
  • Mobile Screen Savers
  • Morphing and Mosaic Tools
  • Mothers day
  • MP3
  • Multimedia downloads
  • Multimedia Players
  • Music
  • nature wallpapers
  • Network Applications
  • No Category
  • Office Software downloads
  • Office Utilities
  • Operating System
  • Pc game downloads
  • Pc Games
  • PDF Converters
  • Personal Finance
  • Pocket PC
  • Portable
  • Programming : Editors
  • Puzzle games
  • Racing
  • Racing games
  • rain wallpapers
  • Relationships and Family
  • Screensavers
  • Security downloads
  • Simulation
  • Sport Games.
  • Sports
  • Sports games
  • State Laws
  • System Information
  • System Utilities and tools
  • t
  • Tech Tips
  • Teens
  • Themes
  • Third-Person Action
  • Tips and Tutorials
  • Trojan Horse Virus Removal? How to Remove Trojan Horse Virus Quickly?
  • Twitter or Facebook? Which would you prefer
  • Tycoon
  • Utilities and Drivers
  • Video Editing
  • Wallpaper downloads
  • Wallpapers
  • Web Authoring tools
  • Website
  • What are some of the best ways to advertise online?
  • What can a virus do to your computer?
  • What is a trojan computer virus?
  • What is ebv virus?
  • What is the difference between stand-by and hiberinate?
  • When do you capitalize the word internet?
  • Which are the classical dances of india
  • Why did christopher sholes invent the type writer?
  • Will downloading music slow down your computer?
  • Win Applications
  • Windows
  • Youtube Downloaders

Blog Archive

  • ►  2012 (2)
    • ►  January (2)
  • ►  2011 (71)
    • ►  December (12)
    • ►  November (1)
    • ►  October (3)
    • ►  September (12)
    • ►  August (3)
    • ►  July (6)
    • ►  June (4)
    • ►  May (19)
    • ►  April (6)
    • ►  March (3)
    • ►  February (2)
  • ▼  2010 (188)
    • ►  October (3)
    • ►  September (49)
    • ►  August (72)
    • ▼  July (38)
      • innocent cute lovely cat wallpaper
      • Sleeping beautifull cat wallpaper
      • Reading cats wallpapers
      • Cute white cats wallpapers
      • Black and white cats wallpaper
      • Lion chating with a cat
      • Cute romantic cat
      • Wild cat wallpaper
      • Beautifull family cats wallpapers
      • Tiger cat wallpaper
      • Lovely cute laughing cat
      • Cute cat near a beautifull flower
      • Cute cats wallpaper
      • See all the wireless keys stored in your PC with W...
      • NANY 2010 entry: Piggy Banks
      • NANY 2010 Entry: SubDiv
      • Top 10 Antivirus, spam, spyware protection softwar...
      • XP Internet Security 2010 Removal Guide, virus pro...
      • Follow Bollywood Celebrities on Twitter
      • How to Prevent Others from Using Your Wireless (Wi...
      • Download Project Igi
      • Hard Disk Partition - Manager Home Edition
      • free High Quality Artistic Wallpaper downloads
      • Cute Baby Wallpapers
      • cute Cat Wallpaper
      • download free Hard Disk Partition using Partition...
      • Download free rain wallpapers
      • Beautifull nature cute wallpaper downloads
      • Cute baby wallpaper free downloads
      • Download Car Wallpaper - Renault Neptune
      • Overspeed: High Performance Street Racing - intern...
      • Top Freewware - Free PDF Converter
      • Hard Disk Partition using EASEUS Partition Manager...
      • A powerful system information tool for Windows - H...
      • Extract MP3 from Video for Free - Video MP3 Extrac...
      • Latest Version of Gmail Backup 0.106
      • Rocket Knight - internet downloads
      • 3D Hunting 2010 - internet downloads
    • ►  April (1)
    • ►  February (4)
    • ►  January (21)
  • ►  2009 (220)
    • ►  December (51)
    • ►  November (169)
Powered by Blogger.

About Me

Unknown
View my complete profile