Friday, March 15, 2013

Wireless Network Security - it safe?

Wireless networks are a little less than some wired networks, due to the fact that you can easily access the network when it is in the coverage area of ​​the access point. Of course, there are various obstacles in a wireless network. Called basic security, where people from accidentally entering a foreign network and can stop located in the area of ​​coverage but comes with a trained hacker who wants to access the network, the main defenses they will not have too many heads.
- SSID
- WEP
- Media Access Control
SSID is a code that belongs to a certain access point refers to a wireless network. All wireless devices attempting to communicate over a network of their own SSID, which will have the same value as the setting of access POINTS can be found to establish a valid connection. Usually access point sends a broadcast SSID every few seconds. This type of operation can be set to see someone with bad intentions do not automatically enable the SSID and the access point. But because the SSID is included in each wireless beacon order, it is quite easy to see when someone monitoring device that allows him to see his value and connect to the network.
This is accomplished by creating a common password. The access point sends a request to the wireless client to send encrypted client will be returned. If the access point can decrypt the client's response, was to prove that wireless customers have the right key and go right to the network. WEP encryption has two options: a key with 64 bit or 128 bits. Of course, the WEP is not the real guarantee of safety. A hacker can receive fitted above mentioned monitoring devices and the first register and then request an encrypted response and from here it determine the network key.
MAC checks will also increase the security of your network administrator if MAC address filtering to access the network. This means that the access of beer on the MAC address of the client, which allows to penetrate the network is configured. If someone else starts with an address and used it to enter the network, each access point or router configuration, where you can see the number of connections from a specific address, so you can determine if someone else is connected to your network or not.