Solve software problem quickly Share experience to help others Improve the ability of solving problem
how to block wireless thieves?

03/30/2012 03:28 by MikeChin

First answer posted by PPrashanth at 03/30/2012 03:29
Add Your Answer
10~1000 characters in length CAPTCHA:
1 Answers
  • PPrashanth
  • Simple Security
    Every router comes with three basic wireless security protocols: Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2). These securities work by scrambling information before transmitting wirelessly, and then unscrambling the information when it is received by another device. The only way to intercept this information is to have the key code.
    WPA2 is the newest and hardest security to crack, and will protect you from a curious neighbor, but a hacker with the right software can break the key code in less than an hour.

    Impenetrable Network
    The most secure network available is a hard-wired connection. By plugging in an ethernet cord and turning off the wireless adapter, there are no wireless signals to intercept. The most secure information in the world is kept in a hard-wired network with no access to the Internet. This type of network is much like an island of information with no ability to send or receive messages.

    A firewall filters all incoming networking traffic and will block any potentially harmful information from harming your computer. All computers and routers come with a basic firewall. The basic firewall will protect you from any outside influence trying to break-in. However, the basic firewall is vulnerable from the inside. A virus hidden in an e-mail, flash-drive, or downloaded attachment can punch holes through the firewall giving a hacker complete access to your files. There are more advanced firewalls that can be purchased to protect from internal risks, but they can cost more than the computer you are trying to protect.

    Public Network Risk
    Any time you connect to a public network there is a risk of intercepted information -- know who is providing your connection. A reputable business that offers free wireless would be a safe bet, but a random wireless connection could mean trouble. A wireless thief can set up a local Wi-Fi connection in hopes of luring in a victim. Any critical information such as personal passwords, credit card numbers or Social Security numbers sent through this wireless connection can then be intercepted.
  • Was this answer helpful? 00 · 03/30/2012 03:29
Add Your Answer
10~1000 characters in length CAPTCHA:
Related Questions
Q:how to hide the mixpod link?

A:1 Log in to your profile at the social networking site where you have a MixPod player (MySpace, Bebo, Facebook). 2 Navigate to HTML edi...(more)

Q:how to block ID theft on social networking?

A:Set up your social networking profiles using only information you would let anyone know. For example, you can enter your name but leave out pe...(more)

Q:where to buy cheap cabal2 alz 2015?where can i buy cheapest cabal2 gold?
Q:how to make a smoke emoticon?

A:Type :-Q or :-' to indicate that you or someone else smokes. Enter :-p~ or :-d~ to indicate that someone is a heavy smoker or particularly en...(more)

Q:how do you get the emoticon for theater mask?

A:Go online and check out Yahoo's Hidden Emoticon site. This website works only for Yahoo messenger, and if you don't have messenger you can dow...(more)

Added Successfully!


Are you sure to delete your answer?



Are you sure to choose it as the best answer?



Voted Successfully!


You can't vote for yourself


You can't choose your own answer