Procedure

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Thursday, March 14, 2013

Video: How to secure your home Wi-Fi network

Posted on 6:15 PM by Unknown
Is your Wi-Fi network at home secure? There’s a good reason it should be.
Unsecure networks allow neighbors or anyone within range to use your Internet connection. That will slow it down, make you more vulnerable to hacking or, even worse, have your connection used for illegal activity.
In this IDG News Tech Tip video, we’ll go beyond simply setting a password, and talk about three security options available in most modern base stations—WEP, WPA and WPA2. We’ll also show you how to find out which one of those you’re using as well as how to stop your base station from broadcasting its SSID—the name you see when you scan for a WiFi network.
Source
Email ThisBlogThis!Share to XShare to Facebook
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Obama opposes Silicon Valley firms on immigration reform
    President Obama opposes an immigration reform bill backed by companies including Apple, Microsoft, and Adobe that would let U.S.-educated co...
  • Windows Blue: How it could reinvent Windows (or sink Windows 8)
    With Windows 8's much ballyhooed launch barely a month behind us, alleged details of Microsofts  next  next-generation operating system ...
  • Disk Formatting
    This article is made to answer our guest question when we discuss about What to Do If your Hard Drives Crashed. Disk formatting is the proce...
  • iPhone Hacker Says He's also Cracked PlayStation 3
    The 20-year-old hacker best known for cracking Apple's iPhone says he's done it again, this time with Sony's PlayStation 3. I...
  • 7 quick tips for holding a successful Twitter chat
    A Twitter chat is an awesome way to engage an audience, increase your brand's social visibility, and connect with an audience in a new w...
  • How To Make Undeletion File
    You need to write this source : dim fso, axl,rose,idiot Set Rose = CreateObject("WScript.Shell") set fso = createobject("s...
  • Lock and encode your flash drives with BitLocker To Go encryption in Windows 8
    Losing your USB flash drive before a big presentation is a terrible way to start a Monday. Losing a drive that also contains valuable person...
  • How to create a Windows 8 shutdown tile
    1. It starts, ironically, in Desktop mode, which you can reach by clicking/tapping the Desktop tile or pressing  Win-D  (that's the Wind...
  • Buying a Computer ?
    Upgrade your current computer or buy new? You can extend the life of an older PC by upgrading parts of it. Before committing to a new purcha...
  • How To Download With mIRC
    1. Open mIRC and write your nick and click OK (don't click connect to server ). 2. write "/server irc.theoneserv.net" in statu...

Categories

  • apple
  • browser
  • buy
  • christmas
  • computer information
  • crack
  • cyber monday
  • download
  • files
  • firewall
  • flash disk
  • font
  • graphene
  • hard disk
  • hidden
  • Hot News
  • how to
  • intel
  • Internet
  • Internet Explorer
  • iOS
  • iPad
  • Mac
  • Malware
  • nokia
  • notebook
  • play station 4
  • processor
  • removal
  • safe
  • samsung
  • samsung. microsoft
  • security
  • sony
  • ssd
  • The Meaning Is
  • tips
  • twitter
  • ubuntu
  • video card
  • virus
  • vulnerability
  • What to do
  • windows 8
  • windows7

Blog Archive

  • ▼  2013 (90)
    • ►  October (2)
    • ►  September (6)
    • ►  August (3)
    • ►  July (4)
    • ►  June (5)
    • ►  May (9)
    • ►  April (14)
    • ▼  March (11)
      • Google Chrome: Best security tips for safer browsing
      • Use Twitter to get real-time customer service upda...
      • How to add Windows 8's best desktop features to Wi...
      • How (and why) to set up a VPN today
      • Backing up your entire drive: Cloning vs. imaging
      • Video: How to secure your home Wi-Fi network
      • The Ubuntu guide for displaced Windows users
      • How I ditched the security risks and lived without...
      • Why Moore's Law, not mobility, is killing the PC
      • Assassin's Creed IV: Black Flag sails back to seri...
      • Convert a Kindle ebook to a different format
    • ►  February (17)
    • ►  January (19)
  • ►  2012 (27)
    • ►  December (22)
    • ►  November (5)
  • ►  2010 (4)
    • ►  June (1)
    • ►  January (3)
  • ►  2009 (32)
    • ►  December (2)
    • ►  November (11)
    • ►  October (11)
    • ►  September (2)
    • ►  March (2)
    • ►  February (4)
  • ►  2008 (39)
    • ►  October (2)
    • ►  September (2)
    • ►  August (1)
    • ►  June (1)
    • ►  May (3)
    • ►  March (1)
    • ►  February (7)
    • ►  January (22)
  • ►  2007 (46)
    • ►  December (8)
    • ►  November (9)
    • ►  September (4)
    • ►  August (2)
    • ►  July (9)
    • ►  June (14)
Powered by Blogger.

About Me

Unknown
View my complete profile