Showing posts with label wifi. Show all posts
Showing posts with label wifi. Show all posts

Tuesday, 5 April 2016

How To Protect Wifi Network From Hackers

How To Protect Wifi Network From Hackers  2016 Tricks And Tips 

Today we are here to share you about wifi hacking protection,But many people claims that their wifi network speed get slows suddenly or their wifi being hacked. There can be many reason behind it that i will discuss in this post.Many of people think that only a just simple password is sufficient to secure their wifi networks,but actually this is totally wrong because today a neginner hacker can easily hack your wifi password.So there must be some extra security to secure your wifi networks. So below are the methods to Protect Wifi Network From HackersJust implement these method and you will be all secure from wifi hacking attacks.

How To Protect Wifi Network From HackersHow To Protect Wifi Network From Hackers

The below method will works in your router settings page which you can open by enteringipconfig command in cmd of your computer and then checking the default gateway addressfor exp:-192.168.1.1 .Now open this address in your computer browser and enter the login id and password of your wifi modem.

Steps to Protect Wi-Fi Connection

  1. Set Strong Password-First of all open your router setting page by your default gatewayof your network and then create a unique or different password for your router so that nobody else can use your router setting and access your network.
  2. Change Network SSID-Now change your network SSID name as every router come with a defualt name i.e “default” this you can do by going in wirless basic setting page in yourrouters setting and then rename it.
  3. Network Encryption-Now the most important thing,enable network encryption as many of ours used to use no encryption this no good habbit , always set a network encryption to your router more secure and Wep is atleast minimum requirement to secure your network.
  4. Filter Mac Addresses-Now in this step you will filter your MAC address to do this first of all make a list of all hardware devices that you want to connect and get there mac address and add them to mac address filtering in your router administration page you can get the mac address of any devices under the settings of their network.
  5. Wifi Signal Range-If your wifi signal is very much strong and you use wifi only in short area then you should reduce your wifi signal range of your router. So to do so change the mode of your router to 802.11g inplace of 802.11n or 802.11b .
  6. Upgrade Firmware Of Router-To fully secure your wifi network this step is very much important. Upgrade the firmware of your router if available in the dashboard of router settings
  7. How To Create WiFi Hotspot 2015 Tricks And Tips

CONCLUSION

How To Protect Wifi Network From Hackers  2015 Tricks And Tips : Its all about you i hope you will like this tips ,So above are the best steps to Secure your personal wifi network from an unouthorised access. By applying all these you will get fullyprotected from wifi hacking attacks by the hackers and you can enjoy the full speed of your wifi network. Don’t forget to share this helpful post.Leave a comment below, if you face any problem at any step.share to your friends and share in social media too,

Thursday, 31 March 2016

home wi-fi network optimization - Controls / Setting

Among the trouble Wi-Fi groups will be the risk in regards to shedding your data transmission to unapproved clients. This part supports you to secure your circle notwithstanding help the thought for speed. Understand that it genuinely is somewhat more progressive notwithstanding may be overpowering to beginner clients. All things considered you will wind up a fledgling disregard on the off chance that you experience about it. This segment is energized for anybody enthused about figuring out additionally concerning system.

Rule: You ought to most likely back the genuine router's setup settings before making adjustments. This licenses you to restore the thought to going before settings in the occasion something moves definitely offbase.

Except for system stock originating from Apple organization, numerous, if not very nearly all, some different routers notwithstanding get access to focuses in the commercial center accompanies a Web programming. Unless you have got changed the thought, the real default IP location is typically created about the base of the router, and on it is client data, notwithstanding is as a rule in this specific organization: 192. 168. back catch. 1.

You can find your router's IP location; recorded here are the basic routines to get to very nearly any family unit organize's router's Web programming:

The main venture: From your related machine (running Glass windows Vis and in addition 7), click on Start off catch, sort "cmd" inside the exploration place, consequently press Get into. (In the event that you utilize Or windows 7, you'll have the capacity to get around the beginning Selection notwithstanding run the real Demand Quick piece. )

You will watch a lot of information showed inside the window.

This client name is basically typically overseer; for the security watchword, take a gander at the real router's manual and appeal the individual who essential form the genuine circle to suit your needs.

The web programming supplies a bother free notwithstanding impressive system to deal with another router's and additionally get access to point's settings.

Multilevel brand notwithstanding security secret word: Most if not practically all routers offer a default Wi-Fi circle brand (or SSID) notwithstanding security watchword; you won't longing to use those individuals. It is normally predominantly in light of which reveals to condition of-the-workmanship clients that router you have which, well, you don't perceive a considerable measure concerning system. Altering the genuine SSID notwithstanding security watchword in your inclination what's more aids you to review these obviously better.

Truly the main downside is normally you have to by and by sort the thought inside when you wish to fitting the most recent purchaser going without running shoes. You will discover there's method for this: turn the real SSID on quickly when you wish to fitting the most recent purchaser, after that is unquestionably finished, spread the thought once more. Understand that covering your system's image isn't going to support a ton versus condition of-the-workmanship digital terrorist, then again, on the grounds that you will find assets of which help you easily keep this particular.

Utilize WPA 2: Using the WPA 2 encryption strategy encourages each one help the insurance and the speed of the Wi-Fi sign. Truly the main get is normally of which WPA 2 won't be best with more develop clients. Most new customers discharged amid the recent years help WPA 2, then again. You can test making utilization of WPA 2 essential obviously, if a large portion of your clients can't connect, change the thought coming back to WPA.

In addition, after you have taken a gander at the real router's Web programming, there are various some different settings you could take a gander at. Concerning, also there are MACINTOSH PERSONAL COMPUTER address filtration framework, Net sifting, and so on. Understand that another router by and large generally takes concerning a moment to reboot to utilize shiny new settings.
home wi-fi network optimization -  Controls / Setting

home wi-fi network optimization - placement location

A wireless router (from beneath on this page, it will probably be determined since "router" for short) telecasts Wi-Fi driving forces from the thought in all bearings. Consider the real sign protection scope to be a planet with the router getting to be fitting inside the center. Well beyond this particular planet, clients won't have a sign. This planet, then again, is not precisely round; one of a few thought processes is on account of the real driving forces are liable to be wandered into head out all the more level contrasted with vertically, notwithstanding like just about all stereo motivations, that they have a tendency to spread side to side notwithstanding downhill the genuine more distant they may be through the telecaster. In any case, the best place to utilize your wireless router and in addition get access to point is for the most part amid your property notwithstanding hoisted.

To benefit as much as possible from this particular, utilize the phone jack port (or cajole digital television outlet) with and also in close vicinity to the inside of your home, preferably about the second floorboards whenever proper, to module your modem and your router. On the off chance that need be, contract an electrical builder to produce a just took the ribbon off new electric outlet inside the proper position. In the event that it is difficult to migrate the item jack port and additionally run cajole HQ television to where you need, begin utilizing a delayed circle high quality television to fitting the genuine router towards modem, bringing about the real modem where the jack port is typically and the router/access point with the middle of your home. (In my mastery, is in actuality somewhat simple to perform links over the real top, and additionally underneath the house).

Environment: A wireless sign is best outside the house inside the completely open setting. Because of the certainty it isn't generally feasible to claim of which inside your own particular home, you'll have the capacity to enhance the sign parcels by method for verifying the genuine fast zone of the router/modem are clear, particularly inside the data you require the real motivations to figure it out. This means you don't craving to leave the genuine router in the storeroom, and in addition place it among a vast TELEVISION alongside a divider structure. Indisputably the privilege spot to withdraw the genuine router is midair, despite the fact that in light of the fact that that is unquestionably somewhat hard to do, the second best thing is dependably to utilize it the counter of a table, and also mount the thought regarding the divider structure whenever fitting. Regularly, just about all physical articles, in the same way as divider space, challis doorway entryways, and so on, devastate Wi-Fi driving forces, more contrasted with individuals.

Despite the fact that this can simply be average, stashing your router/access point in the nearby up spot along  these  lines brings down it is combination parts.

In spite of the fact that this can simply be common, stashing your router/access point in the nearby up spot notwithstanding inside the middle in regards to some different devices along  these  lines brings down it is grouping parcels.

Reception apparatus situating: Having a router that accompanies outside radio wires, you'll have the capacity to a little change the genuine aforementioned planet in regards to protection scope. Regularly you require the genuine reception apparatuses to be vertical in the event that you require the real sign to visit huge (which is generally the most utilized utilization). In the event that would like the real evidence to visit genuine into your upper room or higher towards significant floorboards, set the real receiving wires to be flat. Understand that this particular singularly lives up to expectations sensibly, is really numerous routers, would likely not ability practically any change at all paying little mind to what implies you set it is reception apparatuses. At the point when the reception apparatuses are totally removable, it really is doubtlessly you could swap these alongside high-pick up radio wires (most just about day by day consequently considerably bigger ones), that generously encourages upgrade protection scope. (You may additionally figure out how to support the electric force of the reception apparatuses, thus kids, by method for joining going without running shoes some light weight aluminum foil nestled into allegorical condition. )

As to by having an inside reception apparatus example, nothing is you're ready to do. Contemporary routers, particularly N750, N900, notwithstanding 802. 11ac routers, then again, by and large gimmick unfathomably solid notwithstanding sensible radio wires of which fundamentally upgrade the electric force to the genuine bearing in regards to related clients consequently, by utilizing a building named beam forming.
home wi-fi network optimization - placement location

Sunday, 29 March 2015

Hacking Air-Gapped Computers Using Heat

hacking-hotel-wifi
There is no end to users problem when it comes to security. Everything is easily hackable — from home wireless routers to the large web servers that leak users' personal data into the world in one shot.
If you love to travel and move hotels to hotels, then you might be dependent on free Wi-Fi network to access the Internet. However, next time you need to be extra cautious before connecting to Hotel's Wi-Fi network, as it may expose you to hackers.
Security researchers have unearthed a critical flaw in routers that many hotel chains depend on for distributing Wi-Fi networks.
The security vulnerability could allow a hacker to infect guests with malware, steal or monitor personal data sent over the network, and even gain access to the hotel’s keycard systems and reservation.
HACKING GUEST WIFI ROUTER
Several models of InnGate routers manufactured by ANTlabs, a Singapore firm, have a security weakness in the authentication mechanism of the firmware.
The security vulnerability (CVE-2015-0932), discovered by the security firm Cylance, gives hackers direct access to the root file system of ANTlabs's InnGate devices.
With root access, hackers could be able to read or write any files from or to the devices’ file system respectively, including data that could be used to infect the devices of Wi-Fi users.
Researchers have found nearly 277 hotels, convention centers, and data centers across 29 countries that are affected by this security vulnerability. Although, the number could be much larger as the flaw has potential to impact Millions of users who gets on the hotel’s network for free Wi-Fi access.
However, the security researchers found more than 100 vulnerable devices located in the United States, 35 devices in Singapore, 16 in the UK, and 11 in the United Arab Emirates.
Justin W. Clarke, a senior security researcher of the Cylance SPEAR (Sophisticated Penetration Exploitation and Research) team, says the vulnerability also gives the attacker access to a computer owned by the operating organization.
THE VULNERABILITY GETS WORSE
In some cases, researchers found the InnGate devices were configured to communicate with a Property Management Systems (PMS). This could also be leveraged to gain deeper access into a hotel's business network, allowing a hacker to identify guests and upcoming guests at a hotel and their room number.
Moreover, PMS is often integrated with the phone system, POS (point-of-sale) system for processing credit card transactions, as well as electronic keycard system for accessing doors to guest rooms at hotels.
So, this vulnerability could also potentially allow an attacker to access and exploit these hotel's systems.
"In cases where an (ANTlabs) InnGate device stores credentials to the PMS, an attacker could potentially gain full access to the PMS (Property Management Systems) itself," the researchers wrote in a blog post published Thursday.
HOW THE VULNERABILITY WORKS?
The flaw lies in an unauthenticated Rsync daemon running on TCP 873 used by the ANTlabs devices. The Rsync daemon is an extraordinarily versatile file copying tool widely used to backup file systems as it can automatically copy files from one location to another.
The Rsync daemon can be password-protected, but the ANTlabs device that uses it requires no authentication.
Once hackers have connected to the Rsync daemon, they are then able to read and/or write to the file system of the Linux-based operating system without any restrictions.
Due the widespread nature of the vulnerability, ANTlabs has rolled out a patch addressing CVE-2015-0932 with an alert about the critical flaw being issued by US-CERT.
This isn't first time when researchers have discovered this kind of attack targeting guests at Hotels, late last year Kaspersky Labs uncovered a hacking campaign, dubbed DarkHotel, targeting guests at five-star hotels in Asia and the US by subverting their Wi-Fi system