Solve software problem quickly Share experience to help others Improve the ability of solving problem
how to block wireless thieves?

03/30/2012 03:28 by MikeChin

First answer posted by PPrashanth at 03/30/2012 03:29
Add Your Answer
10~1000 characters in length CAPTCHA:
1 Answers
  • PPrashanth
  • Simple Security
    Every router comes with three basic wireless security protocols: Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2). These securities work by scrambling information before transmitting wirelessly, and then unscrambling the information when it is received by another device. The only way to intercept this information is to have the key code.
    WPA2 is the newest and hardest security to crack, and will protect you from a curious neighbor, but a hacker with the right software can break the key code in less than an hour.

    Impenetrable Network
    The most secure network available is a hard-wired connection. By plugging in an ethernet cord and turning off the wireless adapter, there are no wireless signals to intercept. The most secure information in the world is kept in a hard-wired network with no access to the Internet. This type of network is much like an island of information with no ability to send or receive messages.

    A firewall filters all incoming networking traffic and will block any potentially harmful information from harming your computer. All computers and routers come with a basic firewall. The basic firewall will protect you from any outside influence trying to break-in. However, the basic firewall is vulnerable from the inside. A virus hidden in an e-mail, flash-drive, or downloaded attachment can punch holes through the firewall giving a hacker complete access to your files. There are more advanced firewalls that can be purchased to protect from internal risks, but they can cost more than the computer you are trying to protect.

    Public Network Risk
    Any time you connect to a public network there is a risk of intercepted information -- know who is providing your connection. A reputable business that offers free wireless would be a safe bet, but a random wireless connection could mean trouble. A wireless thief can set up a local Wi-Fi connection in hopes of luring in a victim. Any critical information such as personal passwords, credit card numbers or Social Security numbers sent through this wireless connection can then be intercepted.
  • Was this answer helpful? 00 · 03/30/2012 03:29
Add Your Answer
10~1000 characters in length CAPTCHA:
Related Questions
Q:what are social networks sites like facebook?

A:Twitter Twitter is a real-time information social media website. Some call it a "micro-blogging" site. It seeks to spread information in 140 ...(more)

Q:how to post a hypster playlist on tagged?

A:Visit Hypster's main page and log in. If you need a Hypster accont, click "Register" and set up a new user name and password. You do not need ...(more)

Q:how can I block hackers on facebook?

A:Enable HTTPS You can access Facebook through one of two Internet protocols which include the standard Hypertext Transfer Protocol (HTTP) or S...(more)

Q:Where to buy TESO Gold,elder scrolls online Gold cheaply buy 2015,need ESO gold fastest and cheapest really 2015
Q:how do I make a rock fist emoticon?

A:Hands Only Log in to your chat, email or social networking account. Start a chat session with a friend. Type \m/, \w/ or \,,,/ to suggest a...(more)

Added Successfully!


Are you sure to delete your answer?



Are you sure to choose it as the best answer?



Voted Successfully!


You can't vote for yourself


You can't choose your own answer