Jason  Oh offers the following royalty-free article for you to publish online 
or in print.
Feel free to use this article in your newsletter, website, ezine, blog, or 
forum.
-----------
PUBLICATION GUIDELINES
- You have permission to publish this article for free providing the "About the 
Author" box is included in its entirety.
- Do not post/reprint this article in any site or publication that contains 
hate, violence, porn, warez, or supports illegal activity.
- Do not use this article in violation of the US CAN-SPAM Act. If sent by 
email, this article must be delivered to opt-in subscribers only.
- If you publish this article in a format that supports linking, please ensure 
that all URLs and email addresses are active links.
- Please send a copy of the publication, or an email indicating the URL to 
[email protected]
- Article Marketer (www.ArticleMarketer.com) has distributed this article on 
behalf of the author. Article Marketer does not own this article, please 
respect the author's copyright and publication guidelines. If you do not agree 
to these terms, please do not use this article.
-----------
Article Title: Securing Wireless Networks - Keep Everything Private
Author: Jason  Oh
Category: Computers
Word Count: 400
Keywords: secure wireless network
Author's Email Address: [email protected]
Article Source: http://www.articlemarketer.com
------------------ ARTICLE START ------------------

Securing wireless networks in your home or office is very important in order to 
keep all your personal information safe. No one wants to risk having their 
financial or personal information floating around in cyberspace for anyone to 
snatch and use for their own nefarious purposes. While technology has made it 
easy to set up your own wireless networks, it has also made it easy to set up 
the safeguards you need to keep everything private and safe from identity 
thieves. With just a few tips you can ensure that your wireless network is safe 
from prying eyes. 

When you purchase a wireless system you will most likely have to log on with a 
very generic password set up by the manufacturer, this is where you should take 
the first step in securing wireless networks by changing that password 
immediately. Leaving the manufacturers password will give thieves who know and 
understand different wireless systems more of an opportunity to break into a 
specific wireless network. That password is your first defense against bad 
people trying to break into your network and possibly your hard drive. 

Some other things you can that help in securing wireless networks include not 
broadcasting your SSID number. It is easy to keep that from showing up on other 
people's wireless networks. In other words, your network will be invisible to 
those with wireless cards. At the very least, you should engage your WEP 
encryption along with not broadcasting your SSID, using WPA would be even 
better. Your manufacturer's instructions will show you how to do all this.  It 
is very simple in most cases and really should be done in order to best protect 
your network. It can really be a mess if someone gets into your hard drive.

Another good tool for securing wireless networks is to keep your broadcasting 
settings low. The higher output of broadcasting the more you network system 
will show up on other people's wireless systems. The lower power is always the 
best way to go. Just figure out what is sufficient for your work area and where 
you need your wireless to work and go with that setting. You will find that 
this is also an easy way to prevent any kind of cyber thievery of your hard 
drive. One other thing to do to maintain your wireless network safety is to 
disable any remote administration functions as well.

Jason Oh has an interest in computers and technology. His blog 
http://refurbishedcomputerexplained.com provides detailed information on 
refurbished desktop computers. The website also offers useful tips of what to 
look for before purchasing refurbished desktop computers.
------------------ ARTICLE END ------------------



[Non-text portions of this message have been removed]

Reply via email to