WPA encryption is more reliable, and it is virtually impossible to hack a simple enumeration. For cracking WPA, tend to use bruteforce (search) in the dictionary, but this method does not guarantee the successful reception of the password in most cases. Many consumer access point with WPA support only mode with a common password, so called WPA-PSK (Pre-Shared Key) For the majority of private wireless networks use WPA-PSK will provide ample protection, but only when relatively long and complex password. You should not use only numbers or words from dictionary, because some programs still allow dictionary attacks against WPA-PSK. Almost all modern routers and access points support WPA-encryption. Therefore, if your wireless network is still works on WEP, such equipment is very strongly recommended to replace. If your router or access point allow you to use WPA, you just choose this way to the computer and come up with key more complex and longer.
In the Internet you can find special programs for the creation of precisely such complex passwords, but there are ways and simple. I personally have been convinced that good passwords are obtained if just a little walk two fists on the keyboard, like this – 83iWo2qiwo2iq 2'a seWpw:) If you try to connect any device to the thus configured network, the system will ask for the key and let you into the wireless network only if the key will be introduced correctly. Key you can enter only once, further connections will be done automatically. Other methods There are several ways of protecting wireless networks. They are used in conjunction with password protection, that is their use in no case shall cancel the above-mentioned encryption.
For example, connected to the network computers can be filtered by MAC-addresses. This filtering is used to access the network can get (Or, conversely, do not get), only those computers whose addresses are listed. Experts say that this way to protect your network from beginners, but more experienced hackers can easily intercept the MAC-addresses, and substitute your own address on the one allowed. We must not forget about using firewalls. Some of them even has a special feature to protect your computer from Wi-Fi intruders. Finally, the easiest way to protect is off the point access if you do not work with it. No network – no problems. However, despite the triviality of this method, many users often forget about it.
computersSecurity
Internet Access
November 25, 2017
News
Comments Off on Internet Access
adminTree
WPA encryption is more reliable, and it is virtually impossible to hack a simple enumeration. For cracking WPA, tend to use bruteforce (search) in the dictionary, but this method does not guarantee the successful reception of the password in most cases. Many consumer access point with WPA support only mode with a common password, so called WPA-PSK (Pre-Shared Key) For the majority of private wireless networks use WPA-PSK will provide ample protection, but only when relatively long and complex password. You should not use only numbers or words from dictionary, because some programs still allow dictionary attacks against WPA-PSK. Almost all modern routers and access points support WPA-encryption. Therefore, if your wireless network is still works on WEP, such equipment is very strongly recommended to replace. If your router or access point allow you to use WPA, you just choose this way to the computer and come up with key more complex and longer.
In the Internet you can find special programs for the creation of precisely such complex passwords, but there are ways and simple. I personally have been convinced that good passwords are obtained if just a little walk two fists on the keyboard, like this – 83iWo2qiwo2iq 2'a seWpw:) If you try to connect any device to the thus configured network, the system will ask for the key and let you into the wireless network only if the key will be introduced correctly. Key you can enter only once, further connections will be done automatically. Other methods There are several ways of protecting wireless networks. They are used in conjunction with password protection, that is their use in no case shall cancel the above-mentioned encryption.
For example, connected to the network computers can be filtered by MAC-addresses. This filtering is used to access the network can get (Or, conversely, do not get), only those computers whose addresses are listed. Experts say that this way to protect your network from beginners, but more experienced hackers can easily intercept the MAC-addresses, and substitute your own address on the one allowed. We must not forget about using firewalls. Some of them even has a special feature to protect your computer from Wi-Fi intruders. Finally, the easiest way to protect is off the point access if you do not work with it. No network – no problems. However, despite the triviality of this method, many users often forget about it.
computersSecurity