Wifi hack pc and android. Secure your WiFi network!

Today, each of us has in his house a small wi-fi. Unfortunately, as you might think these networks without appropriate safeguards are not secure because anyone can hack into our wi-fi network. Intruders use applications such as wifi or wifi hack hacker and hacking our network. I guess none of us wants and that its network has used an unauthorized person. So what can you do in this case? First, do not panic and think the security of your web. In this tutorial you will find the method by which your network will become much more secure.

1. Encrypt using WPA2

After you set up your wireless network appears , the option of encryption. In the case of a home network of users , the encryption to be incorporated (in contrast to the so-called . Open network ) , and as a select WPA2 encryption method . WEP is not secure , and some of the advanced methods are generally beyond the reach of most home users. Even if encryption using WPA2 has not been included in the first configuration , the router management software should allow for the inclusion of this option at any time.

When you select WPA2 , should be asked to create a key for users who want to connect to the network . An important issue – although not the most important – is to ensure that the password is unique and complex , so that people outside the network could not break him brute-force attack , or just guessing them to gain access to the network. The password should be fairly long and contain a combination of letters and numbers. In the case of a weak password , the attacker will still be able to hack into the network.

Do not turn the WPS ( WiFi Protected Setup ) . This mechanism does not always work in a coherent way, and nine-digit PIN is susceptible to attempts guessing . Once the attacker gets the PIN for WPS , there is nothing to stop him from access to all shared resources on a network.

2. Change the standard password

Many routers come with a default password for the software which provides administrative panel . This could be eg “admin” , or even no password. It often happens that the password is stored somewhere in the documentation and made ‚Äč‚Äčavailable online . Users in the network configuration should immediately change the password for the admin to protect against unauthorized access to change the configuration of the router. Burglar after getting to the admin has full control over the router – the owner of the equipment is then a serious problem.

In addition to changing your password , you should check whether the router is pre-configured SSIDs. The SSID is the network name for the wireless router set . You should change the password for the default SSID even when we do not use these networks. Just in case.

3. Clear the list of SSIDs

Speaking of SSID – suppliers often use very general identifiers such as ” linksys ” or ” netgear -wireless ” . Should be changed from the default to something more unique . Attackers often carry out attacks man-in- the-middle attack using the most commonly used SSID set to their malicious routers , which makes the devices connect to the network hacker. Having a unique SSID and password makes it a potential attacker is more difficult to break .

It is best to just remove all the SSID , which is not using ( located mostly in the ” wireless” ) . Why increase the potential space of the possibility of attack ? After clearing the list , it is to hide the name . Some vendors call this ” cloaking ” . The idea is not to spread the name of the network to all devices. The network can only connect by manually entering the SSID name. Unauthorised persons will not even know that the area has some WiFi .

4. Find out who is connected to the network

Administration panel generally has a section called “Device List” ( ” Device List “) that displays the IDs of all devices connected to the wireless network. It is good practice to periodically review this list to ensure that all devices are known to us . To prevent connecting to unknown devices , you can use Mac Address Filtering ( MAC address filtering ) . This requires knowledge and entry hardware addresses (MAC Address) devices to the administration panel . Perhaps it is a bit tedious and time consuming , but it ensures that no one will be able to quietly get on to the network .

Routers are also some advanced options such as “guest networking” ( ” guest access ” ) , which must be removed or firewall that should run . If you are not using any software firewall , enable this feature on the router is a necessity , but a good idea to have two parallel security . In addition, it is worth to update the firmware of the router at every opportunity – in this way you can enjoy pretty well secured wireless network . Certainly worth spending some time on the correct configuration of the closed network. This will avoid many problems in the future.