Your Blog

Included page "clone:ginfortiect" does not exist (create it now)

Wireless Network Cards - 30 Jun 2019 13:27


Home wireless networks can be installed with wireless local area network (WLN) equipment. Wireless LANs have wireless interfaces that are part of LAN which allow wireless communications between computers and peripherals. Funny WiFi Names WiFi has a limited range and is used for use in local environments such as buildings, office premises or houses. The main advantage is the flexibility and mobility given by WLN.

Wireless router can be installed on the home wireless network easily by connecting it over the network. The router should be located in the middle of the house. The router will get a good network speed in or near the router in the computer room. Most wireless routers support broadband modems while supporting other telephone connections. A computer connected to each wireless LAN should have a wireless LAN card installed.

It is mandatory to name the wireless network and make sure that the network name of all the computers in WLAN is the same. Although the wireless router includes built-in access points, but the expansion of existing home ethernet networks may require wireless LAN access points. Access point switches must be wired on the hub or LAN router.

Unlike fixed-frequency mobile networks, users should share frequencies in WLAN, which sometimes results in confrontation, depending on frequency selection whether microwave, spectrum or infrared communication is used.

Primary WLN standards include IEEE 802.11 series and hyperlinks. IEEE 802.11 (Wi-Fi) standard supports 1 MB and data databases and various physical media such as spread spectrum and infrared. This standard additional feature for passive or passive wireless users is battery protection. Now 802.11A (5 GHz) and 802.11G (2.4 GHz) 54 MBSP standard are fast. New standards have been developed which are beyond 802.11 specifications, such as: B 802.16 (WiMAX), and many such improvements offer. B more range and faster transmission speed.

Network cards are the backbone of any network. NIC or NIC hardware devices that connect to networks over networks and other computers and devices. It has been installed in a computer's free PCI slots (Peripheral Connect interface) and connector in which the network cable is plugged in. There is a separate network card for different networks even when there is a computer. For example, if a computer is connected to Ethernet LAN, then it should be equipped with an Ethernet network card and if it is necessary to connect to wireless LAN, then installing a wireless network card is necessary.

With the wireless network card, you can bypass traditional network cable. Funny WiFi Names It is becoming more popular because Wi-Fi hotspots are visible all over the world. Most of the new laptops are now available with a preinstalled wireless card, which is an integral part of the hardware. Wireless network cards fit in PCMCIA slots are available for older laptops and the same card is available for regular desktop computers.

Wireless cards can communicate only with wireless router or wireless LAN access point. It is important that a wireless card or wireless adapter works on the border in the same speed and wireless router. In addition to the communication software included in the NIC (Network Interface Card) ROM, network software must be installed on the computer to work for the network. Both the software and the network card must comply with the network's communication protocol on which the computer is connected.

Wireless NIC has increased mobility for people to work from a WiFi enabled location, and they have also helped to overcome problems related to establishing a traditional wired network.

The hyperlane standard can be used to support the channel rate of 23.5 Mbps. However, this only allows the use of physical expansion spectrum and is not very popular.
Setting up a wireless router or access point To configure a wireless network and to install a wireless adapter on a network computer. The wireless router should be located in the central location because the computer router or access point will quickly get the speed of the network. Wireless router must connect to power sources and Internet connection sources so that the internet can be used in all the computers of the network.

Wireless router is not required to set up WLAN. Almost every computer can be used as a access point with WiFi adapter and a cable connection from the Internet. After this, the name of the wireless network has to be given. This is usually called an SSID. All WLAN computers have the same SSID.

Each computer connected to Wi-Fi should have a Wi-Fi card (also known as Wi-Fi Adapter). After installing a TCP / IP-based network, the Wi-Fi adapter can be configured on each computer. On computers running Microsoft Windows operating systems, adapters usually have their graphical user interface, which can be accessed from the taskbar after installing wireless networking hardware. Funny WiFi Names This allows the user to enter SSID and enable WEP. To work properly for WLAN, all adapters should use the same parameter settings.

You can also choose an automatic wireless configuration that supports the IEEE 802.11 standard for wireless networks. This reduces the configuration needed to access the wireless network. Once you enable wireless network alignment automatically on your computer, you can switch between different networks without reconfiguring network connection settings. As soon as you move from one place to another, the automatic wireless network locates the network and notifies you. You can select the network you want to connect to, and the Network Configuration Wizard updates your wireless adapter to match the settings of the new network's access point. - Comments: 0

Tips for Wifi Security In Your Home Wireless Network - 17 Dec 2018 14:16


If your network is wireless, then consider these wireless security tips. Your wireless network offers many potential attacks against wired networks. Do not worry, I will suggest you to protect your Clever wireless network names

Security is a "system". For this reason, instead of selecting the implementation you should link the tips specified in this article.

Let's start with three simple "brains", you first need to turn on your wireless router:

1.) Change the default username and password for the administrator

The main tool in your network is your access point or router. This device provides a local web page where you can log in and configure the device. All manufacturers have the same username and password. Hackers know this and try these basic usernames and passwords on their router. Some common username: admin and admin. Some passwords: (blank password), password and administrator

2.) Change your SSID

SSID is the name of the wireless network of access point or router. Most manufacturers carry these devices with the same SSID. The name of this network is visible to anyone under the range and points to the router's brand. If you change the SSID, do not change whatever you pass on to your neighbors. Do not use your last name like "Smiths Network"

3.) Use Strong Encryption

Do not use WEP! You can download any simple program and can crack a WEP encryption key in minutes. Use WPA or WPA2 instead. This kind of encryption protects your wireless network from WEP. Once strong encryption methods are available, you should switch to this standard.

After these 3 basic tips, I recommend the following tips for your wireless security …

4.) Do not transfer your SSID

This means that you prioritize your wireless devices with SSID and network keys, and then configure settings on your router. If a wireless network tries to search within reach, then your network will not be visible. Clever wireless network names Your SSID network name will be in stealth mode. Some modern hackers can still find hidden SSIDs. But in this tip, I will definitely add to the full Wi-Fi security with other people mentioned in this article.

5.) Enable MAC address filtering

With this feature in any router, you can configure the MAC addresses of devices that you want to allow access to your network. Keeping this feature in mind, you are not looking for a simple challenge to hacker hobbyists. The thief steals the car, which reduces the car to the bottom of the reverse door instead of the car. The thief does not know that the door is unlocked, he only sees the possibility of reducing the window.

6.) Do not share your WiFi too much

More laptops and desktops connect to your Wi-Fi access point, which keeps your internet speed low. Your internet connection speed is shared between all computers.

7.) Change your passwords regularly.

Change your WPA passphrase and your computer certificates every three months. It makes it difficult to try a malicious attack on your network and on your computer. If a hacker already has access to your network or your computer, then your new credentials will be blocked.

8.) Always run antivirus and firewall programs.

Your computer's antivirus can identify and block malicious malware and viruses, which can give remote hackers access to hackers. These programs can serve as backdoors and rootkits that permit hackers to access remotely without your knowledge. Windows XP, Vista and 7 all have their own firewall. Also, enable your router's built-in firewall feature to block intruders before reaching your computer.

9.) Close DHCP.

Your router uses DHCP to assign dynamically IP settings to all devices on your network. If you are in a hurry, then this is a good feature, which can save you a lot of time.

10.) Check your router's DHPP lease pool.

If DHCP is open, you can test a table in the router interface, which recognizes which devices are currently connected. This table usually shows the computer's name, IP address, and MAC address of the connected device. Clever wireless network names You can quickly identify unauthorized access devices and by changing them, you can process your security settings and encryption methods.

Try to remember this important concept of "security is a system", there are many different tasks to create a safe system. This wireless security article helps protect your wireless network. - Comments: 0

Unless otherwise stated, the content of this page is licensed under Creative Commons Attribution-ShareAlike 3.0 License