HOW TO SETUP AND CONFIGURE WIRELESS NETWORK IN SECURE MANNER

Evette

Evette

Passionate Information Technology Customer Support Specialist Student at Milwaukee Area Technical College
Motivated and determined Information Technology Customer Support student with an anticipated graduation date of Spring 2018.
Evette
Wireless networks are setup based on the administrator or end user’s goals, which includes:  speed, range, and security.  Deploying secure wireless networking is an ongoing practice.  Employing encryption to protect wireless network is one of the best manner to protect your wireless network from attacks and interceptions.  Encryption is the process of preventing unauthorize access by changing information or data into a code.  Wireless network users have an option of choosing between three common forms of secure encryption.  These options are: WEP, WPA. And WPA2.  Details regarding these protocols can be accessed through Wireless Encryption Basics.  Passwords are simply one level of security.  Encryption and selecting the right wireless broadband router are also essential when setting up your wireless network.  Another facet of setup of routers that should be considered is location.  Placement of the wireless router near a window means that your wireless signal range reach too far outside the house where it can be easily interception by cybercriminals.  Place your router in the middle of you house so all rooms have the same internet access.  When you leave on vacation, make sure to disable your wireless network, prevent an opportunity for malicious hackers to attempt to gain unauthorized access to your network. Here are great points about securing your wireless network: New technology on routers has wi-fi protected setup which has a WPS button to lock the device during setup. As with any software, check the manufacturer’s website for updates to your firmware. Disable SSID in your wireless setting which will prevent your device showing up is a list of nearby network. Each device on the network...

How to remember only one password and maintain high levels of security with LastPass?

Evette

Evette

Passionate Information Technology Customer Support Specialist Student at Milwaukee Area Technical College
Motivated and determined Information Technology Customer Support student with an anticipated graduation date of Spring 2018.
Evette
A long time ago, computer hackers were considered geeks who sat in their basement or garages and became expert programmers… that is the movie’s version.  In real life, hackers have no single descriptive factor.  Today’s hackers are defined as a person or persons who gain unauthorized access to users’ information for the intent of personal gains or malicious activities… it could be a friend next door, a family member in your home, or a complete stranger thousand miles away in a foreign country.  Years ago, hacking required hours of sitting in front of a computer trying various methods to gain unauthorized access through different levels of security on a computer system or network.  Now, is it as simple as running a program or utilizing a hacker tools which exploit weak points and vulnerabilities and penetrate private information.  Sometimes, hackers take only a passive role and observe network activity, while others take on a more active role and simulate attacks and use confidential information for malicious gains.  Whatever the case, it is an invasion of privacy and breach of security … we are now in the new era of cybersecurity.  With all the worms, viruses, malware, spyware, how can users maintain and secure password credentials and personal information? If you are like me, all passwords are conveniently “remembered” on your personal laptop or computer.  But, if you need to logon to a site using a different computer away from home, you either:  a) reset your password after successfully advancing through a two-factor authentication (for example:  email address associated with account or “what was the name of your first pet?”) or b)...

Differences between Windows 7 and Windows 10 for Enterprise Support users

Iris Barreto

Iris Barreto

My name is Iris Barreto (aka Sister Iris Marie). I am a Schoenstatt Sister of Mary getting updated and learning about the world of IT. I began my studies at MATC in the Fall of 2016. Studying the IT Support Specialist program, I hope to be a great asset to my community and to the Schoenstatt Movement.
Iris Barreto
I have put together information on the web in a more condensed form. The following is a short documentation of differences between Microsoft Windows 7 and 10. Click here to Download differences between Win 7 & 10...
What are the advantages of wiring workplace vs wireless?

What are the advantages of wiring workplace vs wireless?

In computing technology, the term “wired” is used to differentiate between wireless connections and those that involve cable. A wired setup uses physical cables to transfer data between connected PCs. In a small wired network, a single router may be used to connect all the computers. Larger networks often involve multiple routers or switches that connect to each other. On of these devices typically connects to a cable modem such as T1 line or other type of Internet connection that provides Internet access to all devices connected to the network. Nowadays, most of big enterprises choose wire connection over the wireless. There are many reasons why these corporations decide to implement a wire internet. Below we will be studying some of the main advantages of the wire connection. Cost: Since companies are always trying to save money and generate more revenue, cost is one of the main reasons wire connection is an option. Cables, switches are not expensive. Wire connection is cheaper than the wireless. In another hand, Ethernet consume less power . Using Ethernet improve laptops battery life.  Reliability: Wire connection is known to be very reliable. Therefore, reliability is one of the reason why some companies choose to implement the wire Internet. Ethernet, cables, switches are reliable because manufacturers have improved their technology over several decades. Speed and Bandwidth is very high with the wire connection.  We are talking about up to 100 Mbps. Nowadays most IT professionals choose fiber optic cables for less attenuation and electromagnetic interference (EMI) Security: Wire connection is very handy if you have sensitive data that you want to secure using some software...

What are the differences between Adware, Virus, Worms, Spyware, Trojan, Rootkits, Backdoors, Logic bomb and Botnets?

There are many different issues that can affect your computer and network. Some of the things that can cause harm to your computer might be done on purpose. These threats are known as malware. There are different forms of malware that can harm your computer; Adware, Virus, Worms, Spyware, Trojan, Rootkits, Backdoors, Logic bomb and Botnets. Adware is a form of malware that helps online advertisers make sales by placing banners on webpages. This software gathers information from you based off your browsing habits. A third party company usually makes a deal with a business to help advertise. The third party company places tracking software on your computer, this allows them to monitor what you search. A Virus will affect your entire computer. A virus can be spread to other computers via file sharing or email. “All computer viruses are man-made. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems.” (Quinstreet Enterprise). Worms are like viruses, but they are self-replicating. Worms take advantage of holes in the security features of an applications or other software. Worms are usually spread through email and instant messaging. Worms can use up a computers resources, which could cause the computer to shut down or crash. Spyware is a form of tracking software. Spyware is installed usually without your knowledge. Spyware collects; passwords,...