HOW TO SETUP AND CONFIGURE WIRELESS NETWORK IN SECURE MANNER

Evette

Evette

Passionate Information Technology Customer Support Specialist Student at Milwaukee Area Technical College
Motivated and determined Information Technology Customer Support student with an anticipated graduation date of Spring 2018.
Evette
Wireless networks are setup based on the administrator or end user’s goals, which includes:  speed, range, and security.  Deploying secure wireless networking is an ongoing practice.  Employing encryption to protect wireless network is one of the best manner to protect your wireless network from attacks and interceptions.  Encryption is the process of preventing unauthorize access by changing information or data into a code.  Wireless network users have an option of choosing between three common forms of secure encryption.  These options are: WEP, WPA. And WPA2.  Details regarding these protocols can be accessed through Wireless Encryption Basics.  Passwords are simply one level of security.  Encryption and selecting the right wireless broadband router are also essential when setting up your wireless network.  Another facet of setup of routers that should be considered is location.  Placement of the wireless router near a window means that your wireless signal range reach too far outside the house where it can be easily interception by cybercriminals.  Place your router in the middle of you house so all rooms have the same internet access.  When you leave on vacation, make sure to disable your wireless network, prevent an opportunity for malicious hackers to attempt to gain unauthorized access to your network. Here are great points about securing your wireless network: New technology on routers has wi-fi protected setup which has a WPS button to lock the device during setup. As with any software, check the manufacturer’s website for updates to your firmware. Disable SSID in your wireless setting which will prevent your device showing up is a list of nearby network. Each device on the network...

Best free online training courses for IT Computer Support Professional

While in the process of finding out if wanted to go to school in any field of IT I looked into Coursera.  Coursera is a online certification website that offer classes in various parts of technology. They have classes that range from hours to week long that is taught by known professionals in the field. They also have other students that will attend the class online with you to allow a more interactive learning experience. Some courses also offer certificates that are acknowledged in the technology industry and beneficial to enhancing your career. Most courses are free and open to the public from beginners in the industry to expert professionals. Once you begin your first class, you have the option to sign up for the signature track that allows to take courses and receive a grade to track your process as you take learn more skills . Another free online training class for IT professionals is the Introduction to Linux website. This class is about a week long and includes the course and course materials for free. Once you finish the entire course you will receive a certificate of completion similar to the one offered at Coursera. The class is taught to engage IT professionals and administrators and gives resources and tools that will benefit them throughout their career. MIT has a program called edX that gives users free access to actual courses taught at MIT and Harvard University. It engages the user with self paced learning and online discussion groups. Upon completion of the program they also give out certificates to the student but it will not be...

How to train users after new system was implemented at work

The most difficult part of implementing a new software is employee participation. Many employees will not want to get used to the change of workflow caused by the new software. It’s best to make a plan to determine if you will introduce the software to the entire organization as a whole or if you will break it down by department. I recommend introducing it to the organization then engaging with the software by department to tailor it to the needs of the staff. Once you develop an approach to implement the new software, you will need to set training goals. The training goals should include a deadline to prevent loss in productivity and work flow processes. During the planning process you should also complete a needs assessment to avoid training on parts of the software that are not relevant to your company or team. Overloading the trainees with information they won’t use for work can cause confusion and slow down productivity during the transition. Implementing the New Software Once you have a solid plan that includes training, realistic time frames and deadlines and training goals you can begin to implement the new software to staff. You will first want to remind them why the need for new software because most of the staff will be resistant to the change. Many people usually fine with the way things are at work and don’t want to feel like they have more work to do. Once you give them the why you will need to explain the what. What part of my job will this new software affect? They will need an...

How to protect data on Mobile devices?

  Here are useful security features for your mobile device. Use whichever feature your device offers that provide the best security for your needs: 1.  Password, pass code, or Pin: If you set a password, pass code, or Pin to access your device is simple and effective. Try using a code that is four digits or longer so that you can keep it a secret, like you do for any of your other passwords. 2. Unlock pattern:  Many mobile devices let you set unlock patterns that function like passwords in a way. Use a pattern that is complex and keep it a secret to protect it from observers. Also be careful of smudges on the front of your device may reveal your pattern to unauthorized users. 3. Device lockout: Most mobile devices provide a lockout option that locks the device if someone makes several unsuccessful attempts to enter the password, Pin, or pattern. If you set the lockout setting to a limit of 10 attempts is usually enough....

How to find disassembly and reassembly instructions for laptop, Ultrabook and mobile device repair?

I hate to make a long story short so lets expand on this a little. I grew up with highly pixelated images, The Number Munchers game, and well before Google. If you need answers you went to go get them. As in physically leaving the house to go get them.  Number Munchers circa 1991 ish Since we have all of resources at our fingertips i’ll highlight some of the best sources that may come up during your google search. The best way to find disassembly and reassembly instructions are to first search by the model and brand of mobile device, laptop or ultrabook that you own. If you have a Dell Ultrabook it’s best to do a search using both dell and ultrabook disassembly and reassembly as keywords. This will give you a more narrowed down search that is specific to your kind of device.  If you do a generic search it will give you instructions for their device which may not apply to yours. If you are a visual person you can even watch YouTube tutorials to see how others have disassembled and reassembled thier device or even follow along with them. Here’s a screenshot of a video on YouTube that shows the disassembly of a Dell Ultrabook: To complete the process with less errors, I recommend using YouTube because it is easier to follow the instructions.   https://www.ifixit.com/Teardown/Dell+XPS+13+Teardown/36157 Ifixit gives detailed step by step instructions on disassembling a Dell Ultrabook along with pictures like the one seen above from their website. Ifixit and other similar websites are excellent ways to find disassembly and reassembly instructions for laptop, Ultrabook and...