Article Side

Online Article Directory!

Hello Guest! Login or Register to submit articles!

Beginners Guide to Keep Wireless Connection Safe

By Elissa Joyce Subscribe to RSS | March 5th 2012 | Views:

Computers have become integral part of modern lifestyle. It has become a basic necessity and a life without computer is unimaginable. Computers have invaded into every section of life and have made lives simpler and better. You do not need to stand in long queues for appointments as communication has become lightning fast. On one click of mouse you can perform tasks that took considerable time and efforts a couple of decades ago. People world-wide are connected with each other and can communicate directly using internet.

This connectivity can be by means of cables or by wireless connections. In wireless connection the service provider gives you access to internet without using cables. You have freedom to move freely and use internet in a limited area. But this type of connection is prone to hackers who can get access to your personal information by invading your wireless connection space. Here are some steps to ensure wireless security.

• Change The System ID: Wireless equipment comes with a default system ID called SSID (Service Set Identifier) which is easily traceable by hackers. Change this ID and give it a secure and peculiar name. Your new password should not be obvious like your name or last name. Some digits and symbols should be used to ensure safety.

• Encrypt Your Data: At times you have to send some confidential data to someone and you do not want anyone else to get access to this information. This is where encryption comes into play. WPA (Wi-Fi protected access) and WEP (Wired Equivalent Privacy) encrypt your data and only your intended recipient can open it. Although there are still chances that wireless hackers invade your network, encryption can keep your data safe from casual wireless hacking.

• Disable Identifier Broadcasting: Disable identifier broadcasting from your device. It sends an open invitation to hackers and they can invade your personal information easily. Look up in your device manual for the procedure to disable broadcasting.

• Change Administrator Password: All hardware and software come with default passwords which are easily cracked by hackers. Change the default password with a not so easily guessable password. A lot of people do not take this simple step and fall prey to hackers.

• Manage Traffic: give access to only desired people who you want to connect to. You can configure your router with the help of hardware manual. It provides an extra shield to your data as it restricts unwanted people to get access.

• Anti-virus Software: A large variety of anti-virus software’s are available in the market. Subscribe to any good one and keep it updated. Updated software’s are important because new viruses are discovered every now and then and software companies upgrade their antivirus software to counter them.

Hackers are always looking for a chance to get access to your private information. While some of them do it for fun others may use it to rob you of your money. Keep yourself updated with new advances in the field of network security to counter the moves of hackers.

Elissa Joyce - About Author:
Hackers can do serious damage if you do not take proper Wireless security measures. For further assistance you can visit

Share on Facebook Tweet It Stumbleupon this post This post is delicious !

Article Source:

Related Computer Articles Subscribe to RSS

CCTV Security Cameras for your security
Published by John Smith on March 13th 2012 | Computer
Home CCTV cameras prevent any scoundrel to enter the home as it comes with the alarm system that blo...
Does your network security work hard enough for you?
Published by Bgiles on July 26th 2012 | Computer

Make sure your network security is up to scratch by investing in the latest software.
Focus on function and security when choosing Kindle Fire Covers
Published by Jack on April 1st 2012 | Computer
Taking E-book experience to a whole new level, Amazon recently introduced the Kindle Fire as its tab...
Best network security support for your business
Published by Chris Mills on January 25th 2012 | Computer
Whether its public, private, corporate or governmental issue, network security support plays a great...
Social Media Contributes Maximum Effort for Startup Businesses
Published by Truon001 on August 24th 2012 | Computer
The dynamic pattern of online marketing is now evolved into an improved user platform so-called Soci...
Social Media Contributes Maximum Effort for Startup Businesses
Published by Truon001 on August 24th 2012 | Computer
The dynamic pattern of online marketing is now evolved into an improved user platform so-called Soci...
Looking for Branded Hard Drives – Check Dell Hard Drives
Published by Julia Roger on August 22nd 2012 | Computer
The servers which are discarded by the users for new ones will be refurbished and sold as used serve...
Buy Warcraft Gold need to pay attention
Published by Iloveoon on August 22nd 2012 | Computer
Before you buy Warcraft Gold it is best to some lawful record examine of the suggested gold shops. S...
Benefits of employee timesheet and payroll software
Published by Merlinraj on August 22nd 2012 | Computer
Time Attendance Systems-Attendance Tracking System-Employee Timeclock-Labor Time Tracker gives you t...
Role of ERP Software in Small Business
Published by James Blee on August 22nd 2012 | Computer
When it comes to small business and relatively smaller organizations then the information technology...