programming4us
           
 
 
Windows

Windows 7 : Encrypting Wireless Signals with WPA

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
12/27/2010 11:49:03 AM
Wardrivers usually look for leaking wireless signals so that they can piggyback on the Internet access. They may just be freeloading on your connection, but they may also have darker aims, such as using your Internet connection to send spam or download pornography.

However, some wardriving hackers are interested more in your data. They come equipped with packet sniffers that can pick up and read your network packets. Typically, these crackers are looking for sensitive data such as passwords and credit card numbers.

Therefore, it’s absolutely crucial that you enable encryption for wireless data so that an outside user who picks up your network packets can’t decipher them. Older wireless networks use a security protocol called Wired Equivalent Privacy, or WEP, that protects wireless communications with (usually) a 26-character security key. That sounds impregnable, but unfortunately there were serious weaknesses in the WEP encryption scheme, and now software exists that can crack any WEP key in minutes, if not seconds.

In newer wireless networks, WEP has been superseded by Wi-Fi Protected Access, or WPA, which is vastly more secure than WEP. WPA uses most of the IEEE 802.11i wireless security standard, and WPA2 implements the full standard. WPA2 Personal requires a simple pass phrase for access (so it’s suitable for homes and small offices), and WPA2 Enterprise requires a dedicated authentication server.

Access your router’s setup pages, as described earlier in this chapter, locate the wireless security section (see Figure 1), and then set up the encryption protocol and security key. Be sure to use the strongest encryption that your equipment supports.

Figure 1. Access the wireless security settings on your router’s setup pages to choose an encryption protocol and enter a security key.


Caution

Unfortunately, encryption is a “lowest common denominator” game. That is, if you want to use a strong encryption standard such as WPA2, all your wireless devices must support WPA2. If you have a device that only supports WEP, you either need to drop your encryption standard down to WEP, or you need to replace that device with one that supports the stronger standard. (You might also be able to upgrade the existing device; check with the manufacturer.) Note that some APs come with a setting that enables you to support both WPA and WPA2 devices.


Note

If you see the abbreviation PSK in the setup pages, it’s short for pre-shared key, which refers in general to the sharing of some secret information with a person so that person can use the information later on (which is why this system is also sometimes called shared secret). In the case of WPA, the shared secret is the password or pass phrase that you give to your users so that they can connect to the wireless AP.


Changing the Wireless Connection Security Properties

If you change your wireless AP encryption method as described in the previous section, you also need to update each wireless Windows 7 computer to use the same form of encryption. Here are the steps to follow to modify the security properties for a wireless connection:

1.
Click the Network icon in the taskbar’s notification area, and then click Open Network and Sharing Center.

2.
In the Network and Sharing Center’s tasks list, click Manage Wireless Networks. Windows 7 displays the Manage Wireless Networks window.

3.
Double-click the network for which you modified the encryption. Windows 7 opens the network’s Wireless Network Properties dialog box.

4.
Select the Security tab, shown in Figure 2.

Figure 2. Use the Security tab to match the network connection’s security properties with the new encryption settings on the wireless AP.


5.
Change the following three settings, as needed:

  • Security Type— Select the encryption standard you’re now using on the wireless AP.

  • Encryption Type— Select the type of encryption used by the AP.

  • Network Security Key— Type your security key.

6.
Click OK.
Other -----------------
- Windows 7 : Positioning the Access Point for Maximum Security
- SOA with .NET and Windows Azure : WCF Extensions - WCF Security
- Windows 7 : Specifying a New Administrative Password
- Windows 7 : Displaying the Router’s Setup Pages
- Windows 7 : Preventing Users from Logging On at Certain Times
- Windows 7 : Removing Stored Remote Desktop Credentials
- Windows 7 : Disabling the Hidden Administrative Shares
- Windows 7 : Hiding Your Shared Folders
- Windows 7 : Setting Security Permissions on Shared Folders
- Windows 7 : Setting Sharing Permissions on Shared Folders
- Configuring Windows 7 for Secure Networking
- Windows 7 : Setting Up User Security - Determining Who Is Logged On
- Windows 7 : Setting Up User Security - Using the Guest Account to Give Folks Temporary Access
- Windows 7 : Setting Up User Security - Renaming Built-In Accounts for Better Security
- Windows 7 : Setting Up User Security - Hiding Usernames in the Logon Screen
- Windows 7 : Setting Up User Security - Closing Off Your Computer by Disabling All Other Users
- Windows 7 : Setting Up User Security - Preventing Elevation for All Standard Users
- Windows 7 : Using Parental Controls to Restrict Computer Usage (part 2) - Setting Up Parental Controls for Games
- Windows 7 : Using Parental Controls to Restrict Computer Usage (part 1) - Activating Parental Controls
- Windows 7 : Working with Users and Groups from the Command Line
 
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
- First look: Apple Watch

- 3 Tips for Maintaining Your Cell Phone Battery (part 1)

- 3 Tips for Maintaining Your Cell Phone Battery (part 2)
programming4us programming4us