You are here: hacking technology > network management > Content
Hot Articles
Recommend Articles
New Articles
The expert analyzes ten big wireless network security suggestion
  Add date: 07/08/2008   Publishing date: 07/08/2008   Hits: 11
Total 2 pages, Current page:1, Jump to page:
 
Since near section time, the wireless network security has become a hot topic of discussion, how some about to protect the wireless network security at many forums the suggestion, but many these suggestion fish item of promiscuous, many are in fact harmful to the wireless network security.
  The following IT expert net will give the user some basic wireless network security to suggest that these suggestions will be helpful to the user are better assure their wireless network security:
  1. Wireless network adapter
  When the user does not use the network, suggests the user closure wireless network adapter, the reason that does this, has two reasons. First, lengthens the battery life; Next, the guard use “Microsoft Windows silent ad hoc network advertisement” seeps the attack the best method. Microsoft uses from the network is zero default setting visit, this gives the aggressor by the opportunity to be exploited.
  2. verification wireless network SSID
  Verifies SSID (Service Set Identifier or ESSID, uses for to differentiate different network, most may have 32 characters, wireless network card established different SSID to be possible to enter different network) to be helpful in prevents evil twin. even if evil twin the aggressor has the wrong wireless network using the attack. The simple spot said that the user simply did not know what connection is the wrong network, such hacker might gain the user to accept with transmission any current capacity.
  3. Guarantees the software firewall's security
  Windows XP and Vista built-in firewall, but insufficient. In the market condition has many function more formidable firewalls, definitely may meet the notebook user's need.
  4. Closes Windows the document and the printer sharing function
  The Windows default setting has closed this function, but many users in practical work time needs to use this function. Opened this function in fact to open “gate of the troublesome”. So long as any person without authorization appears in this wireless network time may visit these documents.
  5. do not use the wireless network online transmission sensitive information
  This does not need the superfluous word. Importance it can be imagined, but must remind.
  6. the operating system needs the real-time promotion
  Except operating system, but also has kills the poisonous software, the firewall, the network browser as well as the wireless network client procedure, these need the real-time promotion, like this to be possible to reduce the attack which, because itself flaw causes.
  7. protects any sensitive information
  In the middle of the homepage retains individual information will become the hacker attack to provide the very useful value. Therefore like the condition permission may use certain encryption tool.
  8. the use encryption technology carries in-line surfing
  Are not correct in not the hypothesized individual network perhaps the hypothesized individual network settings, this is very important. In the market condition has provides SSL (Security Socket Layer, encrypts sleeve joint character protocol layer) the VPN technology, like this may transmit the confidential paper in a secret channel. Also has some more advanced service, for example super proxy and so on.

 
Other pages: : 1 * 2 * Next>>
Next:Safeguard system clean neat unloading stubborn procedure small skill

Comment:

Category: Home > network management