The first thing you have to do is to position the access point's antenna in a place which restricts the range of its signal to go further than the required area. You should not put the antenna close to a window because glass can't obstruct its signals. Place it in a central location of the building.
2. Use WEP
2. Use WEP
WEP stands for Wireless encryption protocol. It's a customary technique for encrypting traffic on a wireless network. You should never skip it as that will allow hackers to get instant access to the traffic over a wireless network.
3. Change the SSID, disable the broadcast of SSID
SSID stands for service set identifier. It is the recognition thread utilized by the wireless access point due to which the customers are capable of starting connections. For every wireless access point arranged, select an exclusive as well as unique SSID. Also, if it's attainable, hold back the broadcast of the SSID out over the antenna. It won\t appear in the listing of offered networks, while being able to provide services as usual.
4. Disable DHCP
By doing this, the hackers will have to decode the TCP/IP parameters, subnet mask as well as the IP address in order to hack your wireless network.
5. Disable or modify SNMP settings
Change the private as well as public community settings of SNMP. You can also just disable it. Otherwise the hackers will be able to utilize SNMP to get significant info regarding your wireless network.
6. Utilize access lists
By doing this, the hackers will have to decode the TCP/IP parameters, subnet mask as well as the IP address in order to hack your wireless network.
5. Disable or modify SNMP settings
Change the private as well as public community settings of SNMP. You can also just disable it. Otherwise the hackers will be able to utilize SNMP to get significant info regarding your wireless network.
6. Utilize access lists
For additional security of your wireless network, and if your access point support this feature, employ an access list. An access list lets us determine precisely which machinery is permitted to attach to an access point. The access points which include the access list can employ trivial file transfer protocol (TFTP) now and then in order to download modernized lists to steer clear of hackers.
2 komentar:
artikelnya mantabz bro,,
tapi lbh enak klo udah diterjemahin..he..
mau Jual Beli AMAN ??
kunjungi kita,, :)
Thx Comentnya.. Di menu kiri atas ada pilihan bahasanya koq. Sengaja pake english (walau belepotan..he3x) krn harus sesuai dgn TOS Google Adsense. Blogku msh sederhana. Maklum br belajar blog sejak punya Akun Google. Adsense
Post a Comment