How to Make Your Wireless Network Hacker-Proof

Security has become second nature to people in the past few years, when your home, car or personal belongings. Our computers are no exception, as digital thieves are lurking everywhere and can be almost impossible to detect by the average user. Prevent unauthorized access to your mobile home or corporate network (Wi-Fi) is a very important step to take, because there is not a hacker necessary that you should be treated personally, and perhaps in a house or an apartment in the near or even inside a car parked in the street. Wi-Fi hackers have been known to through neighborhoods looking for wireless networks in people's homes, go to the access through the open doors of several in the configuration of a wireless router, and then have a field day, the with your information. In this article we are going step by step through the various settings of your wireless router to go leaving your network vulnerable, and what needs to protect the network against hackers to change most.

Step 1: The first thing to do is to enter the configuration utility of our router. To do this, you must first know the IP address of your gateway. You can do this, go to Start> Run and type cmd start. This opens a command prompt session. At the command prompt, type "ipconfig" without the quotes, type and press. When this is done, while connected to the network, the return of the various figures. The requirement is listed as "Default Gateway". Take the IP address as "Default Gateway" and enter specified, or copy them. If you are not familiar with IP addresses, is a series of numbers separated by periods are as follows: 192.168.1.1 In fact, this particular IP address I used the gateway as an example the most common, but it may be something otherwise appear. Now copy the IP address, open a web browser such as Internet Explorer or Firefox, and paste or type the IP address displayed in the address bar and press Enter. It opens the login page for the router. If your login information to come here know, if not, see the manufacturer's identification, user name and password of your router. You can find it available in the manual with the router, or visit the website of the manufacturer and model number of your router's manual (this can be found on a sticker on the back, side or bottom of the router.) Everything First to the common user ID as "admin" and "password" or try the password "admin" as username and password. If this fails, the data refer to the manufacturer's user ID and password. If your user ID and password, and I forgot, or the ID and password default setting does not work if others in your household has access to the router or had the owner, the user name and password can be changed by default. In this case, you can reset the default values ​​by pressing the reset button on the back of the router for at least 5 seconds. Now you can log in with your user ID and password by default set by the manufacturer.

Step 2: Change the user name and password when you set the standard manufacturer. If someone access to your wireless network, you can easily change access to your router settings and to meet.

Step 3: Change your SSID. The SSID is the name you see on your wireless network if you are looking for open networks via Wi-Fi device. If the default SSID set by the manufacturer, any person who is an open network in the vicinity of his saw, and with a little research on the internet you can find the model number of your router, help them get access to the configuration of your router.

Step 4: Turn off the SSID broadcast. Broadcast SSID, it's just that displayed when searching for open networks in the region, the name of open networks on your device. If your SSID, turn off the transmission, if users search on open networks, not even his own show, so do not know the reason, your wireless network is available. You will still be able to connect to the network, enter the SSID enabled Wi-Fi is in its manual.

Step 5: If available, can WPA2 encryption. If WPA2 is not available, enabling WPA encryption. If it is not available and that WEP is not available, you can find your router's manual or website for more information about updating the firmware of your router. An update of your router can support for WPA or WPA2. If no updates are available for your existing router, you can consider buying a new router like yours is probably very outdated. WPA2 is ideal because it is much more secure than WPA and WEP, in particular.

Step 6: Setting up a pre-shared key or PSK or network key. Regardless of the router, it calls the "Password" on the network. This should not be using the password you changed in step 2 are mixed on the router. Your pre-shared key installation must be impossible to guess, and should be uppercase and lowercase letters, numbers and special characters. It is very important to include these provisions make it almost impossible to break, but not so long that it takes 5 minutes to get into all devices. If it is difficult to remember, always available when you need it, call back the configuration of your router.

Step 7: Enable MAC address filtering and MAC address authentication. This step is optional and should only be performed if you are with your visitors, the Wi-Fi, or if they use the equipment your Wi-Fi devices have to be the same. A MAC address is an identifier that almost all the Internet or a network-enabled device, which looks like this: 00:20: E0: 00:41:00. Each device is created has a unique MAC address, so that they are properly identified as an individual in a network. With the MAC-address filtering or authentication, allows you to select specific devices to connect to your wireless network. All external devices unable to connect because their MAC address is not made in the list of approved devices. To add your Wi-Fi is enabled to access the list, you must first set the MAC address of each device. For computers and laptops, you can simply go to Start> Run and type "cmd" without quotes. This opens a command prompt. Then type "ipconfig / all" without quotes and press Enter. Something that "Physical Address", says should appear somewhere near the top. Next to him, you see the MAC address of the computer. Can be used with hyphens between the two characters appear instead of two points, as in the example above. That's fine, just make sure that when you enter the MAC address access list, as it appears in the format requested by the router, you may need to change to all dashes, colons. Do this for all computers that connect to your wireless network. For devices such as iPods, iPads, cell phones, etc., you should use the device information is very likely that in the setup menu (or maybe somewhere else, depending on the device). In this case, when a device is Wi-Fi, is the MAC address. Do this for all non-computer devices that connect to your wireless network and each access to notes. Remember, if you buy a new person or to visit and want to use your Wi-Fi, you need to do this step.

It is important to take all appropriate measures to protect your wireless network to implement, with the exception of the optional step # 7. There are other security measures can be implemented, but the above steps are the most important and necessary to prevent unauthorized access to your wireless network. When you have completed all the steps in this tutorial, you can be sure that your wireless network is now virtually impenetrable.

» Read More...

About Network Designers

About the Network Designer

This knowledge allows the architects, clients with a network that meets the requirements of availability, security and scalability requirements. The architect has to follow the life cycle phases PPDIOO network planning and engineering. In some small companies, a system administrator can "play" ticket, the role of the network architect and designer. Large companies usually have a team of specialized networks into a single project.

A network designer would take the time to study the organization of the customer and trying to understand the needs of customers on the network. Anticipate this will enable the architect to concerns possible changes in society and developed. An architect is responsible for:

  1. To define consideration of client objectives and constraints, the technical requirements for the new project,
  2. Evaluation of the existing network is installed,
  3. To incorporating the technologies and capabilities of devices to meet specific network,
  4. The siting and interconnection of various network devices and services,
  5. Planning and management of proof of concept test
  6. Help the account managers in creating presentations.

The staff includes network design of highly qualified specialists. The network architect must be current on the network technologies and new design practices best. In addition, a good designer to get professional networks known technical certifications. A very good and recognized certification, the Cisco Certified Design Professional (CCDP) is. By obtaining this certification online first, the designer has shown that the skills needed for a large enterprise network design.

Interpersonal skills

Decent interpersonal skills are important when working with clients. A peaceful and friendly, inspires confidence in customers. The customer must believe that the designer is able to make the necessary tasks to fulfill. The following skills are essential when working with clients: 1 listen and summarize information correctly, 2nd It provides well-organized material in a logical technical. The ability to build relationships with customers is essential. In a business where the relationship of trust reduced several potential problems and contributes significantly to the success of the project for both companies.

To a larger plan must recognize the architect of the network, how users interact with network devices and network services. The designer collects data on all internal and external access to the existing network. In the absence of knowledge of who has access to the corporate network, the designer can follow some of the requirements of the users. Therefore, the design engineer a model that is inappropriate. The failure to create an appropriate design delays and additional costs.

» Read More...

Determine the Impact of the Application in Network Design

His knowledge that the user, as it is based on the Network Applications.

Often, to provide essential services to network-based applications to users. These services are available in the network are among the most important elements to ensure the demand of the customers and the users are satisfied.

The collection of statistical data from routers, switches, servers and other network devices, you can decide whether a device is operating in accordance with the manufacturer. Are on the other hand, for the procedures are not sufficient to regulate success.

The success is based on, what are the customers, contractors and vendors, network performance is based. From the perspective of end users, application performance depends on the availability and responsiveness.

Application performance must combine customer satisfaction with the standard network parameters such as network performance, or the sum of positive transactions. Application for classification allows the network designer to combine business goals and technical specifications in the design of the network. The classification includes the practical work of network applications: 1 Behavior of applications in network 2 technical requirements of the application, 3 how applications work together on the network.

According to information gathered through the initial phases of the design process, the architect decides which applications are important for the company. The architect to assess how these applications work with the proposed network.

The classification process provides data on the use of bandwidth and response time for certain applications. These factors can really design decisions, such as the selection of the transmission medium or assessments required bandwidth.

Traffic from different applications produce different demands on the network. The network architect identifies four basic types of communication of the application: 1 From customer to customer, 2 Client-server distributed third Client to the server in the farm, 4 Client-to-edge companies. Day, is the first step in applications classification of data both from the network to collect as possible. This data collection contains first Entry into the organization, 2 Verification Network 3 Traffic analysis.

The organization of the input stream contains data about the network and verbal information for network administrators. An examination of the network collects data about network devices, monitors traffic, and shows the details of the current system design. Traffic analysis provides information about the protocols and applications use the network. It can be exposed to errors in the network design. For example, many high-bandwidth applications over the same link generate large amounts of traffic. This represents a potential bottleneck in the design of his.

I hope you flush the foundations of the impact of the application in network design!

» Read More...

Is There Someone Intruding on Your Home or Office Wireless Network?

Broadband wireless has become very popular because of its simplicity and ease of access to the Internet. Unfortunately, it leaves us vulnerable to serious security breaches in which they could carry out our information and transaction costs to hazards.

This utility vehicle parked on the streets of your home can be a thief from the Internet via a mobile device to use its wireless network to download pornography or other activities that do not return to their own computer.

Likes a spammer can with an unsecured network at home or without access point Wi-Fi connection, an IP address to connect to an open mail relay somewhere on the Internet, please send a million e-mails and it seems that from your Internet connection.

It is necessary to note that anyone driving by your house to your wireless network to see and maybe even be able to access it. Intrusions and disruptions that can lead to this, some problems with law enforcement and / or Internet service provider.

Wireless networks are loose borders, the other teams receive the signal and allow you to use without his knowledge defined. If illegal aliens to your network that can easily steal your confidential information access and download files.

Now, before you fret, there are some simple ways to help you get a secure wireless network.

• Install and update anti-virus and anti-spyware on a regular basis

• Do you regularly scan for viruses on your computer

• Turn off your network when not in use

Wireless router to send a beacon called the Service Set Identifier (SSID) that contribute to wireless devices such as laptops connect to the Internet. The main goal of the wireless signal is transmitted to SSID and available devices in the area to invite them to join.

Most of the points of the wireless router for broadband access and publish this SSID. While this makes it easier to connect to the network, but also tell everyone that you are using a wireless network. Disabling this extension prevents other easy to know that you are using a wireless network.

You can keep outsiders away some of the parameters to change the SSID. If a device does not know, do not connect to an SSID of the network in the situation. Therefore, if you change the SSID, only people who know the SSID to be able to connect to your wireless network. To improve security, it is best to allow only specific computers to access your wireless network.

You can change the connection to the router and the password to the default settings. Most routers are named "default", which is very easy to crack by hackers. Change the router password before sunset for the administration and make sure it is strong enough. The stronger the password the harder it is to crack for hackers. If you use your phone in your home, you must now stop and go and change it to another number! It is too easy to decode.

It's a good idea to try the wireless router as close as possible to place the center of your home or office. This will ensure that the signal is strong throughout the home or office and reduces the chances of the wireless signal is filtered.

You need the encryption to prevent unauthorized aliens. This prevents the router that provides access to all wireless devices, offers unless the specified password. Also encrypt the communication so that no one be able to see what happens between your computer and the router. Select the encryption method that is compatible with your computer configuration. If you have a choice, use Wi-Fi Protected Access (WPA), because it stronger than Wired Equivalent Privacy (WEP) is.

Here are some suggestions for a secure wireless network. However, each router is different, for security, please contact the manufacturer's manual. It can give detailed instructions, adapted to your wireless network to keep intruders. If you need help, call a professional to help you ... It will be interesting.

» Read More...

How to Improve Network

The main objective of quality service is a priority and are committed bandwidth, reduce latency and less jitter and packet loss eventually.

By establishing the quality of service standards for a business that is important to note that the traffic requires special treatment. Network architects should consider how the quality of service problems not only on the network equipment, but also applications that use the network. The employer, the service quality to identify the basis of two measures: the rate at which the network meets their needs and ease of use applications.

Quality service helps to reduce these problems. Multiple Cisco network devices are equipped with quality of service mechanisms. Specific applications are very sensitive to bandwidth requirements, packet delay, jitter and packet loss. IP telephony and real-time video streaming nor any particular treatment.

Requirements of the IP-telephony

Voice traffic requires more than just a connection between the devices. The transfer quality is very important. If delays occur, the voices are separated, and the sound is distorted. IP telephony requires that the quality of service mechanisms are activated. It is important that the language of a low latency, low jitter, and have directly on the individual along a predetermined path.

Streaming video needs

Streaming video is a sound system that is normally sent from the recorded files. This power of the media is sent as multicast, so that many employers see the current can, at the same time. In a network without QoS, all TCP / IP packets are treated equally and therefore suffer from real-time applications.

QoS policies do not create more bandwidth, of course. Alternatively, the priority use of the bandwidth to support new technologies like IP telephony. QoS handles the traffic priority of network convergence.

Voice and data traffic

In a convergence of networks, contests continuously with small packets of voice traffic with data from large asymmetric flows and file transfers. Although usually the packets, the voice traffic in a network are not great, the delays that occur when crossing the network, creating a low voice quality. Files in real-time applications have the same ratio as they are received, processed. Therefore uses the User Datagram Protocol VoIP That a transport protocol is best. On the other hand, packages, file transfers usually large. These packages use the Transmission Control Protocol.

It is likely that the diffusion part of a data file, but you can not voice mail dialogue. Therefore, the voice and video traffic have higher priority over data traffic.

» Read More...

Network Transactions Design

Applications are the backbone of the central functions. In order to achieve the objectives of the client's business, must guarantee the architect of the network application performance. However, each type of traffic or an individual application, different requirements, the performance problems have to be created.

Application processing transaction Transaction Processing is a type of treatment in which the computer responds immediately to user requests. Each application is created by a user transaction. All these operations must take place additional operations. Therefore, application transactions, and an important consideration in key network design.

Nuclear

An atomic transaction ensures that all processes are executed or a transaction, or any of them. If the transaction is fully processed, then the entire process is aborted.

Coherent

Confirmed that a transaction with partial operations are not allowed. If a partial transaction takes place, the system immediately returns to its previous state.

Isolated

A transaction is a secure transaction isolation, which is completely isolated from all other transactions on the network. Safety is a concern of the basic network design. Control Lists (ACLs), firewall and data encryption in the network topology is recommended for all modern networks.

Durable

A transaction is safe, sustainable, after the transaction has been completed, can the transaction be reversed even if the system is confronted with an error. Robust design for transaction processing needs of various levels of redundancy. These values ​​take into account the physical layer connections, servers and network devices such as switches and routers. The expert evaluates network redundancy and security features that support requests.

Redundancy

The integration of transaction applications means that the designer must consider the influence of individual transactions in the network. This process is essential, since the additional cabling and network equipment will be required to provide redundancy performance or provision of these operations need to make available. Redundancy provides the following benefits: 1. reduces network downtime second improved application availability.

Networks with redundancy to minimize single points of failure. If a path or device fails, the redundant path or a device to be used. Server that the shops are another way to receive and transmit traffic. This ensures that the application can be accessed if the client so requests.

In addition, routers can provide redundancy if installed protocols such as Rapid Spanning Tree Protocol (RSTP), Hot Standby Routing Protocol (HSRP). RSTP barrier layer 2 switch inputs, which can occur with redundant switches. Furthermore, redundancy can offer Layer 3 HSRP and reliable recovery mechanism.

» Read More...

Fundamentals of Network Design

Provide high availability

In addition to providing an additional level of security, server clusters are often necessary to provide high availability of applications and services complex. A good network should be able to reduce the potential impact of disruptions. This defense may be the network administrator to business needs at all times.

Redundancy

To ensure high availability, the servers are connected redundantly to two different switches in the access layer. This design provides a route from the switch when the first server main surface fails. Changes to the distribution and core layers are also connected redundantly. Rapid Spanning Tree Protocol can also manage redundant Layer 2 links. A router that is using the Hot Standby Router Protocol in a position to provide support for Layer 3 redundancy and failover.

Virtualization

Several virtual servers can be installed on one physical server. Developed the physical server operating system, to support multiple virtual images. This design is called virtualization. Virtual Server in order to reduce service costs redundant, failover and load balancing for important network services.

Customer inquiries

Before scheduling an internal network of the architects of wireless LAN need to understand how to use the customer wants to Wi-Fi network.

The architect understands the requirements of the network of customer questions. The answers affect how a Wi-Fi has been designed and implemented.

If the architect does not get good answers to your questions or to fully recognize the needs of the customer, the installation of Wi-Fi will be difficult or impossible. For example, the obligation to provide unsecured access points are much less difficult to plan, to provide authenticated access to internal devices.

Plan physical network

In a traditional wireless networks, most of the energy goes through areas of physical network coverage.

The architect of the network creates a site survey to identify areas of coverage and find the best places to install wireless access points. This report defines the hardware access point and wireless capabilities of your favorite games. The architect must also decide whether the roaming between coverage areas that overlap can be supported.

Designing the logical network

Logical Network Planning Network architects usually causes the greatest difficulty. Customers often want to offer different levels of access for different users. In addition, wireless networks must be easy to use and protected. Determination of the desired properties has many different methods for the design and wireless networks. The free wireless access for visitors and secure wireless access for mobile workers are two basic requirements that companies have the edge.

» Read More...

Network of Technology-Improvements

To get from the resource center and communications benefits, a remote user is usually at least a surface connection to the central site. The bandwidth requirements for connecting large area will depend on network services that employers want to use in their work. When employees are in remote locations of the IP telephony network, a device driver may need to make calls remotely. The network architect must consider whether users need remote access to video assets to think the same. This access will affect the bandwidth. For example, video transmission can be used for a business meeting. These design decisions include the evaluation of the bandwidth Wide Area well.Selecting central location or at the request of a permanent connection

The architect selected when the highest net use permalinks or upon request to the central location. The architect works with clients to address requirements of safety, cost and availability.

A link to high-speed Internet is a good choice for home workers. It is easy to install in remote locations and is also available in many hotels. From time to time, asynchronous dial-up remote access, the only solution is for travelers. Employees who travel can use a laptop with modem and the current telephone network to connect to the company.

Large LAN connections on the part of teleworkers, the following technologies: asynchronous dial-up, ISDN BRI, cable modems, DSL, cable and satellite traffic, VPN.

Data traffic in a network is analogous to the flow of vehicular traffic in the metropolitan streets. Vehicles move from place to place throughout the city. The traffic generated by applications is moving from one place to another network. The road is generally prepared by a layer of TCP / IP. Configured depending on the quality of service policies on the network, the path can be influenced by additional factors that the source and destination transport-layer port numbers. Let's say, a host sends a request for a shared folder on a server in a traffic flow. The server parses the request and if the user has permissions expected returns data to the user in a different traffic flow.

Traffic control

Without a method for traffic control, such as traffic lights or are other ways to keep the flow of traffic on the congested roads. Networks need a way to regulate traffic. Quality of service mechanisms are in place to ensure a smooth flow of traffic for the application of network traffic.

The traffic flow is very important for all networks and that is what really distinguishes a good from a bad network.

» Read More...

The Importance Of Network Cable Test

It is important to test a network cable after installation of cable test tools. Many things can go wrong during the installation, the cables are damaged, can break through the isolation and connections can not be completed successfully. In addition, electrical noise and the environment on the network performance. In most cases, after completion of a project to install the network, is an obligation, a report indicating that the cable passes each of the many parameters required to prepare. Cable testing assures the customer that all work has been performed to the required standard. Prevent test network cable and that the client calls to tell you how to change it to a new port and the connection does not try, therefore, must be a bad cable cable.Network test depends largely on the cable end. For example, in the case of a telephone cable, it requires fewer parameters during the test, but if it is a Category 5e or 6 data cables, a detailed series of tests is required to ensure that you are able to cover the lack of data rate . The tests are much stricter in this plane.

Smaller, less expensive cable tester, a mapping tool, the wire used to ensure that pairs of cable is properly connected to the pin on the system in use. These individual cable testers are inexpensive and can save you time. The tool can be used to check for open pairs, swaps and shorts. Son of open pairs is not attached to the end. This is usually a result of the cables at each end that are not the completion of a background markers are pushed. Small Testers can also check the continuity and the length of a cable to a switch port is patched.

A cable tester can test the cable length. Although it detailed specifications for all types of work of the wire, which varies depending on the type of the cable and the use of the network installation. It is therefore advisable to be careful not to exceed the allowable limit for a project of the cable network. It may rather drawing on paper, but there is a need to take a look after the installation is complete. Network cable testing ensures that the cable is at the desired height.

In most cases, the installation of network cables, there is always the degradation of signals transmitted along the cable lines. This condition is known as mitigation. With an increase of a network connection, the signals may be lost. This is very common in faster networks. Cable Testing with a good tester for the detection of this defect may, whenever it happened.

It is important to test all network cables after installation to ensure that all cables are correctly installed and the installation is completed and able, can provide the level of data rate and quality. All cables, regardless of how small to attempt the task. It makes no sense to leave the problems with the wiring and do not try to return calls. It gives your company a professional reputation.

The tests mentioned above and many others are required in a cable network test tool is to check the installation. There are other tools outside of the control unit, but the cable tester is the most important. The investment in a cable tester, you save time and money in the long run. The satisfaction of your customers and increase the reputation of your company to the next level.

» Read More...

About Me

Hi, I’m Yani and my Syszoom blog is to share everything about the latest information around the technology field. I started Syszoom blog in 2011 to help other people solve their problem about computer, software, etc. I spent over five years as a teacher, and Syszoom blog is implementation of my knowledge in information technology field. To contact me, please email me at ditsucces@gmail.com.
Powered by Blogger.