How to Make a Wireless Network Secure


Is someone stealing network? As the owner of a wireless network you want to protect it from the hackers and freeloaders. read this post and go ahead. In this short paper, we're going to go through 5 steps to secure a home wireless network.
who is on my wifi

1.   Login to your wireless router
a)  If you've never logged into your wireless router, look up the make and model of the router, and find the     default IP Address, username, and password, then login.

b)  For example, if your wireless router has a default IP Address of, default username of admin, and default password of blank. Login by doing the following:

  1. Open Internet Explorer and type in the address
  2. When prompted, the username would be admin, and the password would be blank.

c)   If the router's password is still set to the default password, it is important to change this password to something else to keep an intruder from effectively kicking you off of your own network.

2.   Enable MAC Filtering
This is probably the easiest way to keep intruders off of your wireless network although the least secure. You can enable a White-list of MAC Addresses and then only the MAC Addresses that you specifically put into this list will be able to use your Wireless. You'll have to remember this if a friend comes over
and tries to use your wireless network.

3.   Enable Encryption
It's important to use encryption on your wireless network.  Not only does it keep intruders off of the network, it also keeps eavesdroppers from listening in on your network traffic. The two major types of wireless encryption are listed below.  Please also note that any encryption enabled on the wireless router must also be enabled on each Wireless Device that needs to connect to the internet.

a)   WEP – This is still the most common type of encryption enabled on most wireless routers.  Please note that this can be broken by serious hackers in about 2 minutes, but will keep out most neighbors and passerby's.

b)   WPA2 – This is becoming the most common type of encryption and is enabled on most new wireless routers.  WPA2 is much more secure than WEP and has not been compromised yet, but is not available on some older types of Wireless Devices.

Deciding between WPA2, WEP, or MAC Filtering

WPA2 Encryption is the most secure method for keeping intruders off your network. If you have older devices that will not support WPA2, WEP is encouraged.
If you are unsure how to setup encryption, MAC filtering is least secure, but easiest to setup.

4.   Disable SSID Broadcasting
This option decides whether people can or can not see your wireless signal. This is not necessarily recommended because although this will keep your network invisible to the common nosy neighbor, it will not protect your network from any serious hackers. It can also make setting up your own devices on your wireless network more difficult.  So, it's good to know how this works, but always use encryption
and don't rely on just disabling SSID broadcasts to keep your network secure.

5.   Install Who's On My WiFi
Download and Install Who Is On My Wifi Software onto a desktop computer that is always on at your home or office. Who's On My Wifi acts as a detection engine by scanning your network every few minutes to see if anyone has gotten onto your network.  People could get in by breaking WEP encryption, faking through a MAC Filter, somehow breaking WPA2, or by good old fashioned hard line plugging into your router directly instead of connecting through the wireless.  Monitoring for intruders is the final step in securing a Wireless Network.

Download link:
Who Is On My Wifi is available for download at

The original article can be found at here.



2015,1,AdBlock,1,Android,25,Anti-Virus,6,Apps,1,Avast,1,AVg,1,Avira,1,Avira Browser Safety,1,BD Govt.,3,Best,3,Codes,10,Command prompt,1,Computer,13,Cricket,1,Customization,1,Download,48,e-Book,7,Education,3,Extensions,1,Facebook,17,Firefox,4,Free,8,Free Call,3,Free SMS,4,Full Movie,2,FVD Downloader,1,Games,1,Google Chrome,1,Google Tricks,9,Hacking,33,How to,7,How to.,5,ICC,1,Internet,8,iPhone,1,Keylogger,1,Launcher,1,LockScreen,1,Lollipop,1,Mobile Phone,21,Modules,1,Movie Download,11,Nova Launcher,1,Online Recharge,2,PC,1,PC Game,4,PC software,13,PC Suits,4,PDF,1,Playstation,1,Protection,1,Ranking,1,Release date,1,Smart Launcher,1,Software,27,Special Post,1,T20 World Cup,1,The Camelizer,1,Tips Tricks,32,Top,2,Turn Off the Lights,1,Tutorials,16,USB Boot,3,Video Games,1,Viruses,1,Weather,1,Widget,1,WiFi Hacking,22,Windows,26,Windows 8,5,Xbox,1,Xposed Framework,1,
Top One: How to Make a Wireless Network Secure
How to Make a Wireless Network Secure
Top One
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS CONTENT IS PREMIUM Please share to unlock Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy