Sure start with this:
Change the System ID: Devices come with a default system ID called the SSID (Service Set Identifier) or ESSID (Extended Service Set Identifier). It is easy for a hacker to find out what the default identifier is for each manufacturer of wireless equipment so you need to change this to something else. Use something unique- not your name or something easily guessed.
Turn on (Compatible) Encryption: All Wi-Fi equipment supports some form of "encryption." Encryption technology scrambles messages sent over wireless networks so that they cannot be easily read by humans. Several encryption technologies exist for Wi-Fi today. Naturally you will want to pick the strongest form of encryption that works with your wireless network. To function, though, all Wi-Fi devices on your LAN must share the identical encryption settings. Therefore you may need to find a "lowest common demominator" setting.
Disable Identifier Broadcasting: Announcing that you have a wireless connection to the world is an invitation for hackers. You already know you have one so you don’t need to broadcast it. Check the manual for your hardware and figure out how to disable broadcasting.
Enable MAC Address Filtering: Each piece of Wi-Fi gear possesses a unique identifier called the "physical address" or "MAC address." Access points and routers keep track of the MAC addresses of all devices that connect to them. Many such products offer the owner an option to key in the MAC addresses of their home equipment that restricts the network to only allow connections from those devices. Do this, but also know that the feature is not so powerful as it may seem. Hacker software programs can fake MAC addresses easily.
Restrict Unnecessary Traffic: Many wired and wireless routers have built-in firewalls. They are not the most technically advanced firewalls, but they help create one more line of defense. Read the manual for your hardware and learn how to configure your router to only allow incoming or outgoing traffic that you have approved.
Patch and Protect Your PC’s: As a last line of defense you should have personal firewall software and anti-virus software installed on your computer. As important as installing the anti-virus software, you must keep it up to date. New viruses are discovered daily and anti-virus software vendors generally release updates at least once a week. You also must keep up to date with patches for known security vulnerabilities. For Microsoft operating systems you can use Windows Update to try and help keep you current with patches.
Next get a good software firewall like zone alarm and a good anti virus like avg.
Good Luck
2007-10-21 03:33:11
·
answer #1
·
answered by usa2dav 3
·
0⤊
0⤋
If all you wish to do is share the internet connection and not be connected to your sister and brother-in-law's computers via the network, then no, she couldn't look at your files or anything else. All you need to do is keep your network sharing turned Off. If you use Vista all you need to do is go into the Network and Sharing Center and ensure all Sharing is Off. Now, she cannot find out where you have been on the internet unless she installs a keylogger or some type of parental control software on your computer. Sometimes a router manufacturer offers parental control software and service inside the router itself which then blocks certain activities for all computers that use the connection either wired or wireless. However, you would know this was occurring because you would receive notifications that you are blocked. If you are of age, and not in your sister's custody then she has no right to block your system. Now, she may try to make the argument that because your system uses her network any malware you receive through your browsing and download habits would also infect her computers. That is correct IF sharing is turned On and you have communication between her computers and your computer. To counter such an argument all you need to do is tell her that you do not wish to Network with her computers and that as long as you do not that would not occur. In order for a piece of malware to "jump" from your system to her networked computers your computer needs to have an open communication line. As I said, as long as you turn off all networking/sharing features there will not be an open line of communication. In addition, she can use her firewall to block your IP address from accessing her systems. All she needs to do is utilize the feature in her systems firewalls. She would need to do this in each one unless she uses a server in her network and has a domain. If you do share files back and forth with your sister she could place a keylogger on your machine without your knowledge. If you think she would stoop to such under handed measures you should not use her network connection or even live with her because that would be a violation of trust. But, that is your decision and prerogative. You know your sister and so can make the decision on whether or not you trust her to keep your privacy respected. Good luck and please have a nice day.
2016-05-24 00:20:17
·
answer #2
·
answered by aline 3
·
0⤊
0⤋
You will want to use WPA encryption. It should be explained in the manual that came with your router. If not, go to Google and type "WPA encryption" into the search box. WPA will usually require a 26 character alpa numeric key.
2007-10-21 03:33:24
·
answer #3
·
answered by Ron M 7
·
0⤊
0⤋