programming4us
           
 
 
Windows

Windows 7 : Enabling MAC Address Filtering

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
12/28/2010 9:19:28 AM
The MAC (Media Access Control) address is the physical address of a network adapter. This is unique to each adapter, so you can enhance security by setting up your AP to use MAC address filtering. This feature means that the AP only accepts connections from a list of MAC addresses that you specify. If a hacker tries to connect to your network using a NIC that has a MAC address not on the list, the AP denies the connection.

Unfortunately, MAC address filtering isn’t a particularly robust form of security. The problem is that wireless network packets use a nonencrypted header that includes the MAC address of the device sending the packet! So any reasonably sophisticated cracker can sniff your network packets, determine the MAC address of one of your wireless devices, and then use special software to spoof that address so that the AP thinks the hacker’s packets are coming from an authorized device.

Does this mean you shouldn’t bother configuring a MAC address filter? Not at all. For one thing, even if a savvy wardriver can fool your wireless AP into thinking his device is authorized, the hacker still has to get past your other security layers. For another, not every cracker out there uses sophisticated tools, such as packet sniffers and MAC address spoofing software, so your filter will at least thwart those would-be intruders.

Access your router’s setup pages,  locate the Mac address filtering section (see Figure 1), turn on Mac address filtering, and then specify the MAC addresses that you want to allow on your network.

Figure 1. Access the MAC address filtering settings on your router’s setup pages, and then activate and configure MAC address filtering.


Getting the MAC Address of Your Wireless NIC

The good news about MAC address filtering is that most modern APs come with a feature that displays a list of the devices currently connected to the AP and enables you to quickly add the MAC addresses of those devices to the AP’s MAC address filter. Just in case your AP doesn’t come with this feature, here are the steps to follow in Windows 7 to determine the MAC address of your wireless NIC:

1.
Click the Network icon in the taskbar’s notification area, and then click Open Network and Sharing Center.

2.
In the Network and Sharing Center’s tasks list, click Change Adapter Settings. Windows 7 displays the Network Connections window.

3.
Double-click the wireless connection to open the Status dialog box.

4.
Click Details to open the Network Connection Details dialog box.

5.
Make a note of the Physical Address value (see Figure 2), which is the same as the MAC address.

Figure 2. In the Network Connection Details dialog box, the wireless NIC’s MAC address is given by the Physical Address value.


6.
Click Close.

Note

Another way to find out the MAC address of your wireless network adapter is to select Start, type command, and then select Command Prompt to open a Command Prompt session. Type the following command and press Enter:

ipconfig /all

Find the data for the wireless adapter and look for the Physical Address value.


Tip

While we’re on the subject of wireless NICs, this is as good a place as any to talk about security updates. Wireless NIC vendors occasionally find security vulnerabilities in their NIC device drivers, and they issue patches and driver upgrades to fix those security holes. You should check the manufacturer’s website from time to time to see whether any updates are available for your NIC.

Other -----------------
- Windows 7 : Changing the Default SSID
- Windows 7 : Disabling Network SSID Broadcasting
- Windows 7 : Encrypting Wireless Signals with WPA
- Windows 7 : Positioning the Access Point for Maximum Security
- SOA with .NET and Windows Azure : WCF Extensions - WCF Security
- Windows 7 : Specifying a New Administrative Password
- Windows 7 : Displaying the Router’s Setup Pages
- Windows 7 : Preventing Users from Logging On at Certain Times
- Windows 7 : Removing Stored Remote Desktop Credentials
- Windows 7 : Disabling the Hidden Administrative Shares
- Windows 7 : Hiding Your Shared Folders
- Windows 7 : Setting Security Permissions on Shared Folders
- Windows 7 : Setting Sharing Permissions on Shared Folders
- Configuring Windows 7 for Secure Networking
- Windows 7 : Setting Up User Security - Determining Who Is Logged On
- Windows 7 : Setting Up User Security - Using the Guest Account to Give Folks Temporary Access
- Windows 7 : Setting Up User Security - Renaming Built-In Accounts for Better Security
- Windows 7 : Setting Up User Security - Hiding Usernames in the Logon Screen
- Windows 7 : Setting Up User Security - Closing Off Your Computer by Disabling All Other Users
- Windows 7 : Setting Up User Security - Preventing Elevation for All Standard Users
 
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
- First look: Apple Watch

- 3 Tips for Maintaining Your Cell Phone Battery (part 1)

- 3 Tips for Maintaining Your Cell Phone Battery (part 2)
programming4us programming4us