Wireless - How To Protect Yourself - Security and You: dgoslings Place

Wireless - How To Protect Yourself

Published Wed, Feb 1 2006 20:54

This security list assumes that your wireless network is already set up and needs to be secured. The types of encryption listed here also have several sub-types that you may be able to use depending on what type of network you are securing. I have listed only the basic types as they will work in most wireless home networks.

  1. Determine what kind of encryption and authentication that your wireless device(s), access point and software can use. If it is WEP only, then an upgrade of the firmware for your adapter, may allow you to use the much more secure WPA. WPA provides more security features for your network. If you can afford to replace all hardware, eg the access point, wireless network adapter, router or hub, with ones that will support the latest encryption standards, then doing so would be a wise choice.
    Use WPA with a pre-shared Keys, called WPA-PSK for the most secure encryption on a home network.
  2. Make sure if you can only use WEP  for security, that you choose 128 bit encryption rather than 40 bit encryption, both on your router and for your network card. This setting is chosen during setup of WEP. 
  3. Choose an alphanumeric (1-9,A-Z) or hexadecimal (1-9, A-F) string of at least 20 characters to use as your Network Key. Make sure it is not a familiar name that could be guessed such as "p@ssw0rd".
  4. Make certain that your router has a long alphanumeric password that is different from the Network Key.
  5. Change your Network Key frequently if your WEP setup doesn’t do it automatically. Please remember all devices on your network must share the same Network Key so you will have to change the Key on every device on the network. WPA changes the Network Key automatically and frequently.
  6. Each network card whether wired or wireless will have a MAC address (physical address), which identifies the card. MAC address filtering can be used to limit the devices that can connect to your PC and/or your network. You can determine the MAC address of each device and enter them in the router’s settings. This will prevent any other MAC address from connecting to your network. However, hackers have tools to find and change the MAC addresses so they can log on to your network, so setting the MAC address filter is not 100% secure.
  7. Each wireless network adapter and router comes with a Network Name called an SSID. For example the LinkSys routers Network Name (SSID) is "LinkSys". Always change these as the default names are well known. This provides a minimal increase in security unless you turn off broadcast of the name, because the SSID is included in the header of all data being exchanged by your network.
  8. Turn off DHCP in the Network settings, and assign an IP address range to every device on the network using the Private IP address ranges. Private IP rangers are -; -; -, then assign a specific IP address within the range you choose (or the router chooses), to each device on the network. When choosing an IP range make sure the range is limited to the number of devices in the network. For Example if you have 2 laptops, a desktop computer and a router, you might choose the range to In this way it leaves no open IP addresses for a hacker to use.
  9. Remove any unrecognized networks from the list of "Preferred Networks"
  10. Turn off the setting for "connect automatically to non-preferred networks". This will prevent your PC from making automatic unwanted connections to any network or PC with a signal in your area.
  11. Change the name of the Administrator account to something else, if you are able. This is to prevent access to your computer using the built-in Administrator account that everyone has on their Windows PC.
  12. Change the default Administrator password to a long alphanumeric string, because the default passwords are well known by hackers.
  13. Disable remote access to your PC or network if you do not need it.
  14. Use Remote Desktop (if using XP sp2) to connect to a computer at home, when away.
  15. Disable Simple File Sharing in Folder Options > View Tab, unless you need it.
  16. Disable Microsoft File and Printer Sharing in the properties of the wireless Network connection if you don’t need it.
  17. Enable "Virtual Private Networking" in Windows for secure transactions and to connect to a business network. VPN acts like a tunnel for your communications, protecting them from anyone trying to eavesdrop. However, VPN does slow performance so you may not want to use it all the time.
  18. Always use secure websites that use SSL encryption for any private transactions
  19. Configure Outlook Express to use SSL security for all email both sending and receiving.
  20. If you use the Windows Firewall in XP sp2, make sure there is nothing checked on the ‘exceptions’ tab.
  21. Position your router or access point in the middle of your house away from windows. This will minimize the distance that you’re your devices have a strong signal outside of your home, and within your neighbourhood. A small adjustment that with all other settings can increase your security.
  22. If using a public network such as a library, be aware that the data you exchange with them is not encrypted so your security needs to be at it’s highest while connected to them.
  23. Sometimes when only WEP is available with your wireless network adapter, you will find that a wireless gaming adapter supports WPA and you can use it instead.
  24. Minimize the amount of important information you keep on a wireless laptop, such as banking account numbers, passwords or credit card numbers.
  25. Turn off the router when you are not using the wireless devices. Doing this will minimize the amount of time when anyone can get into your network when you are not using it.

Continued: http://msmvps.com/blogs/dgosling/articles/Bluetooth_Device_Security.aspx

Leave a Comment

If you can't read this number refresh your screen
Enter the numbers above:  


This Blog

Email Notifications


Microsoft - Offers You:

Protect Yourself:

Security Info

Free Anti-Virus Products

Free Firewalls

Free Anti-Spyware Products

Free Rootkit Scanners & Trojan Scanners

Free Security Tools

Online Scanners AV, AS, Firewall

Anti-Trojan Products

Security MVP's Speak: