HOW TO SETUP AND CONFIGURE WIRELESS NETWORK IN SECURE MANNER

Evette

Evette

Passionate Information Technology Customer Support Specialist Student at Milwaukee Area Technical College
Motivated and determined Information Technology Customer Support student with an anticipated graduation date of Spring 2018.
Evette
Wireless networks are setup based on the administrator or end user’s goals, which includes:  speed, range, and security.  Deploying secure wireless networking is an ongoing practice.  Employing encryption to protect wireless network is one of the best manner to protect your wireless network from attacks and interceptions.  Encryption is the process of preventing unauthorize access by changing information or data into a code.  Wireless network users have an option of choosing between three common forms of secure encryption.  These options are: WEP, WPA. And WPA2.  Details regarding these protocols can be accessed through Wireless Encryption Basics.  Passwords are simply one level of security.  Encryption and selecting the right wireless broadband router are also essential when setting up your wireless network.  Another facet of setup of routers that should be considered is location.  Placement of the wireless router near a window means that your wireless signal range reach too far outside the house where it can be easily interception by cybercriminals.  Place your router in the middle of you house so all rooms have the same internet access.  When you leave on vacation, make sure to disable your wireless network, prevent an opportunity for malicious hackers to attempt to gain unauthorized access to your network. Here are great points about securing your wireless network: New technology on routers has wi-fi protected setup which has a WPS button to lock the device during setup. As with any software, check the manufacturer’s website for updates to your firmware. Disable SSID in your wireless setting which will prevent your device showing up is a list of nearby network. Each device on the network...

How to protect data on Mobile devices?

  Here are useful security features for your mobile device. Use whichever feature your device offers that provide the best security for your needs: 1.  Password, pass code, or Pin: If you set a password, pass code, or Pin to access your device is simple and effective. Try using a code that is four digits or longer so that you can keep it a secret, like you do for any of your other passwords. 2. Unlock pattern:  Many mobile devices let you set unlock patterns that function like passwords in a way. Use a pattern that is complex and keep it a secret to protect it from observers. Also be careful of smudges on the front of your device may reveal your pattern to unauthorized users. 3. Device lockout: Most mobile devices provide a lockout option that locks the device if someone makes several unsuccessful attempts to enter the password, Pin, or pattern. If you set the lockout setting to a limit of 10 attempts is usually enough....

How to remember only one password and maintain high levels of security with LastPass?

Evette

Evette

Passionate Information Technology Customer Support Specialist Student at Milwaukee Area Technical College
Motivated and determined Information Technology Customer Support student with an anticipated graduation date of Spring 2018.
Evette
A long time ago, computer hackers were considered geeks who sat in their basement or garages and became expert programmers… that is the movie’s version.  In real life, hackers have no single descriptive factor.  Today’s hackers are defined as a person or persons who gain unauthorized access to users’ information for the intent of personal gains or malicious activities… it could be a friend next door, a family member in your home, or a complete stranger thousand miles away in a foreign country.  Years ago, hacking required hours of sitting in front of a computer trying various methods to gain unauthorized access through different levels of security on a computer system or network.  Now, is it as simple as running a program or utilizing a hacker tools which exploit weak points and vulnerabilities and penetrate private information.  Sometimes, hackers take only a passive role and observe network activity, while others take on a more active role and simulate attacks and use confidential information for malicious gains.  Whatever the case, it is an invasion of privacy and breach of security … we are now in the new era of cybersecurity.  With all the worms, viruses, malware, spyware, how can users maintain and secure password credentials and personal information? If you are like me, all passwords are conveniently “remembered” on your personal laptop or computer.  But, if you need to logon to a site using a different computer away from home, you either:  a) reset your password after successfully advancing through a two-factor authentication (for example:  email address associated with account or “what was the name of your first pet?”) or b)...

Most important features of Samsung Galaxy Note 4

  1. Link preview enables you to view the URL link received via SMS or messengers in advance using the S pen with opening a web browser. To activate that you will need to go to settings, then to S pen, and last Air view. Then you need to move the S pen close to the URL link and you will now be able to see the major contents provided by the URL in a pop up window. 2. Caller information display features –  When you get a call from someone, sometimes you want to know what the person has been up to lately or about the last conversation was made between you and the person. You can check information about the person when you are receiving a call from, or making a call to. If you want to show caller id you will need to go to the dial app and check to settings, then calls, and last show caller information. It will then show all the person’s activities uploaded to his or her contact history. 3. Wi-Fi Sharing – This feature allows your device to connect to another device that is connected to Wi-Fi without having to type in the password. To get to to this feature you will need to make sure your connect to Wi-Fi. Once that opens go to Quick Connect by swiping down the Notification panel from the top edge of the screen, then finds device that needs to be sharing the Wi-Fi with, and last select Share Wi-Fi to share your Wi-Fi network. 4. One Handed Operation – This feature is awesome out of the...

How to share files using Google Drive

You can share files and folders that you store in Google Drive with anyone. The people you share with always see the most updated file and you can control whether they can edit, comment on, or only view the file. Here is a step by step on how you can share files with others. 1.  First you start by going to your Google account and click in the right upper corner that has a little square. Next, there will be a drop menu and you will need to click on the app that says Drive it looks like a colored triangle. Just like the screen print below. 2. Second step is you should see the Google Drive page. Just like the screen print below. Once the page shows up you will then need to click in the upper left corner and click New if your trying to add a new file or you can see if your file shows up on the home scree of Google Drive. 3. The third step is you will need to find the file you want to share. By doing that you can click on the file and right click; then wait for a menu to drop down and click share. 4. The last step is after you click share you should see the screen as shown below in screen print and once you see that. Then under “People” type the email address or Google Group you want to share with. To choose what someone can do with your file, click  the Down arrow. After that you can finally click send and an email...

How to recover user files as part of mobile device repair?

  If you have a phone that is not functioning because of damage or other issues, you might be worried about your data. Not having the access to your contacts, calendar, email, and apps, it is impossible to get your work done or to simply communicate. I have two cool apps that you can use to get all your data back to your new phone. 1. The first app is called Smart Switch and you can download this app at Google Play. This app helps you transfer all your contacts, messages, photos, videos, music, calendar events, apps, etc. Smart Switch gives you  three options to transfer your information. The first option is you have to make sure both phones have the Smart switch app on both screens and then it will ask you to select how to transfer and you will need to tap wireless and follow the steps on the app. The second option is USB cable, you need to make sure you have both phones connected to the same USB cable and select the USB Cable option on the app and follow the steps. 2. The second app is called Samsung cloud and is usually a built in app on your Samsung device. This app helps you keep all your data in one place just in case you lost, have stolen, or a broken device. You can easily backup, sync, restore, and have all your information to your new phone. There is a way to setup and manage your preferences from one screen, sync and view your photos from any galaxy device, and backup and restore on...