-
This kind of rubbing the net is the most annoying! Nowadays, everyone is used to wireless Internet access. The reporter learned yesterday from three digital markets in the urban area that the sales of wireless routers in February increased by three percent compared with January, but then the number of "rubbing the net" is also increasing.
"Rubbing the Internet" is to crack the password of other people's wireless routers, and then attach your own computer to other people's wireless routers to achieve "free wireless Internet access". There are generally two situations when the network is rubbed: the wireless router uses the initial login password; There is no network share password set.
There are many disadvantages of being "rubbed on the net": first, the network speed has slowed down; Second, network security is threatened. Professionals believe that there are actually many ways to prevent "rubbing the net".
In fact, as long as certain security measures are set for the wireless network at home, the probability of being "rubbed off the network" will be greatly reduced.
How to prevent being rubbed into the net.
Enter the username and password in the pop-up window (if it is the initial password, please go to the user management interface to modify it), and enter the wireless router management interface (see the figure, take the ASUS RT-N15 wireless router management interface as an example).
Click "Wireless" on the left side of the screen to select the steps under the subdirectory accordingly to set up, and choose one or more of the following security policies to greatly reduce the probability of being rubbed off the network.
Security Policy 1: Change the SSID
When you look for a wireless network at home, you can see that there are many wireless network names, and these names are SSIDs (network flags). Generally, the default SSID is related to the router brand. You can change the SSID to your preferred name, such as "sheep", on the management interface of your wireless router.
Security Policy 2: Hide the SSID
Some wireless router management interfaces provide the "hide SSID" function, select "yes", it is not easy to be searched by "rubbing the network".
Security Policy 3: Select WPA encryption.
Wireless routers offer a variety of encryption standards, the most commonly used being Wireless Peer-to-Peer Protocol (WEP) and Wi-Fi Protected Access (WPA). WEP is older than WPA, but not as secure as WPA. Therefore, it is best to choose the WPA authentication method and set the WPA pre-shared key, such as "19781213".
This method is the most commonly used).
Each network device has a unique ID called a MAC address, and many routers allow you to set multiple MAC addresses to access the Internet, such as "001F3C699055". In the Mac Access Mode column, select Accept. In this way, MAC addresses other than "001f3c699055" will be rejected.
-
The WPA pre-shared key is a Unicode string used to authenticate L2TP IPsec connections, and Routing and Remote Access can be configured to verify connections that support the pre-shared key.
Pre-shared keys don't require a public key infrastructure (PKI) to be deployed, but they are relatively weak authentication methods. The security of the pre-shared key deployment can be increased by encrypting the pre-shared key using a pseudo-code only personal identification number (PIN), which the user must enter before the profile can be installed. Pre-shared key authentication does not require hardware configuration on the PKI side, and is only required for L2TP IPSec authentication using computer certificates.
It's simple to configure a pre-shared key on a remote access server, and it's relatively easy to configure it on a remote access client. If the pre-shared key is issued in a backup configuration file for the Connection Manager, it is transparent to the user. If you are establishing a PKI or are managing an Active Directory domain, you can configure Routing and Remote Access to accept L2TP IPsec connections using a computer certificate or pre-shared key.
So far, as of 2019, Apple has produced a total of 13 generations of Apple phones. >>>More
The dust and mist all cleared, and the sky and the mountains showed the same clear color. Let the boat float with the river, let it go east or west. From Fuyang to Tonglu, a hundred miles of waterways, strange peaks and strange flowing water, unique in the world. >>>More
First of all, make sure that you are in the same network segment, that is, if your IP is, then his IP is. >>>More
Hello: This problem can be solved by arithmetic method and equation method: >>>More
Power supplies with different voltages can be co-grounded, but grounding needs to consider distribution parameters, especially at high power and high frequencies. >>>More