{"id":23373,"date":"2023-03-31T03:45:16","date_gmt":"2023-03-31T03:45:16","guid":{"rendered":"https:\/\/www.booksofall.com\/?post_type=product&#038;p=23373"},"modified":"2023-03-31T03:45:16","modified_gmt":"2023-03-31T03:45:16","slug":"securing-wireless-networks","status":"publish","type":"product","link":"https:\/\/www.booksofall.com\/fr\/securing-wireless-networks\/","title":{"rendered":"Securing Wireless Networks"},"content":{"rendered":"<h2>Router<\/h2>\n<p>The starting point is the <a href=\"https:\/\/www.cloudflare.com\/learning\/network-layer\/what-is-a-router\/\">Router<\/a>. Most modern home routers are actually 3 devices in 1 for convenience. Usually they consist of a &#8220;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Modem\">Modem<\/a> + Router + <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wireless_access_point\">Wireless Access Point<\/a>, but for simplicity, I will call it router throughout this guide. A router is the gateway between our local network and the internet which is considered an external bigger network and most of them (almost all) comes with preconfigured firewall settings to <a href=\"https:\/\/www.techtarget.com\/searchsecurity\/tip\/10-common-types-of-malware-attacks-and-how-to-prevent-them\">block malicious attacks<\/a> or unauthorized connections from the internet (the bigger, external network) from passing through this gateway and most of these settings do an OK job of filtering all unwanted access from the internet, but we are focusing in this guide on the the other settings that might allow someone to gain access to your local network by connecting to your <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wi-Fi\">WiFi<\/a> network (which means they have to be in the proximity of your wireless network) or by connecting to your router from the internet (the outside network) through a misconfigured settings in the router. If you are in the market for a new router, then you should invest some time in reading reviews about the device you are going to buy and search for known issues or vulnerabilities with a simple search phrase like &#8220;TD-W8970 Vulnerability&#8221; and that should be enough to know if there are any issues with the device. Known Issues that is. If you already have a router, then it&#8217;s also an important step to search for any related issues or vulnerability and also update the firmware if there are any updates from the manufacture. There are 2 main ways to connect to your router&#8217;s settings and they are:<\/p>\n<ul>\n<li>Local Access<\/li>\n<li>Remote Access<\/li>\n<\/ul>\n<h3>Local Access<\/h3>\n<p>Local Access means connecting to your router from your local network. In other words, from any of the devices that are connected to your WiFi network or from any device connected to your router via a LAN cable. This is the default way you should use and the more secured than Remote Access method. There are sub methods under Local Access to connect to the router, but the best and simple way for a home user is to connect to the router via the web interface meaning you connect to the router using your internet browser (such as <a href=\"https:\/\/www.google.com\/intl\/en\/chrome\/\">Chrome<\/a>, <a href=\"https:\/\/www.mozilla.org\/en-US\/firefox\/new\/\">Firefox<\/a>, <a href=\"https:\/\/www.apple.com\/safari\/\">Safari<\/a>, and..ehm..<a href=\"https:\/\/support.microsoft.com\/en-us\/windows\/internet-explorer-downloads-d49e1f0d-571c-9a7b-d97e-be248806ca70\">Internet explorer<\/a> or <a href=\"https:\/\/www.microsoft.com\/en-us\/edge?exp=e534&amp;form=MA13FJ\">Microsoft Edge<\/a>) and you do so by typing the Local Internet Protocol Address (<a href=\"https:\/\/router-network.com\/tools\/what-is-my-local-ip\">Local IP<\/a> for short) in the address bar of the browser and most routers use the IP &#8220;192.168.1.1&#8221; or &#8220;192.168.1.254&#8221; out of the box, but if you don&#8217;t get to a page using those 2 addresses, then review your router&#8217;s manual.<\/p>\n<p>Some devices will have the option to only allow devices connected to the router via the LAN cable to get to the router settings and most routers will come with a short cable that you can use for this purpose. You should enable this option if it exists to limit the access to the router&#8217;s settings page and use the cable whenever you need to access it.<\/p>\n<h3 id=\"access control\">Access Control<\/h3>\n<p>After connecting to the router&#8217;s settings page, You will be asked for a user-name and a password and if the device is new or You&#8217;ve never changed them, they will be &#8220;admin&#8221; and &#8220;admin&#8221; for both. You can review the device&#8217;s manual or search the internet for your router&#8217;s model and &#8220;Default password&#8221;. The first thing you should do after logging in, is change the default user-name and password to something else, because as you guessed, everyone would know and try them if could reach the router&#8217;s page. You would be amazed by how many routers are still using the same default credentials and accessible from the internet through the remote access option which are even periodically cataloged by search engines such as\u00a0<a href=\"https:\/\/www.shodan.io\/search?query=router\" target=\"_blank\" rel=\"noopener\">Shodan<\/a>. You should use a strong, unique password that have no meaning to you or in the language such as &#8220;bwpFW93F#fm20BN&#8221; or &#8220;HeLuWK2038Be30&#8221; and if Your router allows You to change the user-name, You should change it from &#8220;admin&#8221; to anything else and preferably not your name or a name that has any connection with you, if possible. You should also make sure that if Your router comes with hard-coded users such as &#8220;user&#8221; and &#8220;support&#8221;, that You change the password for those as well.<\/p>\n<p>The layout and the naming of sections could be different from router to router, but you should be able to figure out what you are looking for in a little time with the help of this guide and your router&#8217;s manual or of course, the internet. Under this section (Access Control) You will also find the remote access option and should disable it. All the sub option under remote access should be disabled and enabled only when needed for a short amount of time.<\/p>\n","protected":false},"excerpt":{"rendered":"<p><iframe style=\"width: 100%; height: 750px; border: none;\" src=\"https:\/\/online.visual-paradigm.com\/share\/book\/the-attribution-noncommercial-sharealike-4-0-international-license-mohamedation-tk-securing-wirless-networks-guide-1b0ho3jx9c?p=1\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n","protected":false},"featured_media":23377,"template":"","meta":{"_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"We use networks everyday. However, we may not notice the security problem behind this. Learn more about it with the guide provided by Mohamed Adel here!"},"product_brand":[],"product_cat":[279],"product_tag":[],"class_list":{"0":"post-23373","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-networking","8":"first","9":"instock","10":"shipping-taxable","11":"product-type-simple"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Securing Wireless Networks - BooksOfAll French<\/title>\n<meta name=\"description\" content=\"We use networks everyday. However, we may not notice the security problem behind this. Learn more about it with the guide provided by Mohamed Adel here!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.booksofall.com\/fr\/securing-wireless-networks\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing Wireless Networks - BooksOfAll French\" \/>\n<meta property=\"og:description\" content=\"We use networks everyday. However, we may not notice the security problem behind this. Learn more about it with the guide provided by Mohamed Adel here!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.booksofall.com\/fr\/securing-wireless-networks\/\" \/>\n<meta property=\"og:site_name\" content=\"BooksOfAll French\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.booksofall.com\/fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Securing-Wireless-Networks.jpg\" \/><meta property=\"og:image\" content=\"https:\/\/www.booksofall.com\/fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Securing-Wireless-Networks.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"827\" \/>\n\t<meta property=\"og:image:height\" content=\"1169\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.booksofall.com\/fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Securing-Wireless-Networks.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.booksofall.com\/fr\/securing-wireless-networks\/\",\"url\":\"https:\/\/www.booksofall.com\/fr\/securing-wireless-networks\/\",\"name\":\"Securing Wireless Networks - BooksOfAll French\",\"isPartOf\":{\"@id\":\"https:\/\/www.booksofall.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.booksofall.com\/fr\/securing-wireless-networks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.booksofall.com\/fr\/securing-wireless-networks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.booksofall.com\/fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Securing-Wireless-Networks.jpg\",\"datePublished\":\"2023-03-31T03:45:16+00:00\",\"description\":\"We use networks everyday. However, we may not notice the security problem behind this. Learn more about it with the guide provided by Mohamed Adel here!\",\"breadcrumb\":{\"@id\":\"https:\/\/www.booksofall.com\/fr\/securing-wireless-networks\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.booksofall.com\/fr\/securing-wireless-networks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.booksofall.com\/fr\/securing-wireless-networks\/#primaryimage\",\"url\":\"https:\/\/www.booksofall.com\/fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Securing-Wireless-Networks.jpg\",\"contentUrl\":\"https:\/\/www.booksofall.com\/fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Securing-Wireless-Networks.jpg\",\"width\":\"827\",\"height\":\"1169\",\"caption\":\"Securing Wireless Networks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.booksofall.com\/fr\/securing-wireless-networks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.booksofall.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Categories\",\"item\":\"https:\/\/www.booksofall.com\/fr\/categories\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Securing Wireless Networks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.booksofall.com\/fr\/#website\",\"url\":\"https:\/\/www.booksofall.com\/fr\/\",\"name\":\"BooksOfAll French\",\"description\":\"Biggest IT eBooks library and learning resources - Free eBooks for programming, computing, artificial intelligence and more.\",\"publisher\":{\"@id\":\"https:\/\/www.booksofall.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.booksofall.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.booksofall.com\/fr\/#organization\",\"name\":\"BooksOfAll French\",\"url\":\"https:\/\/www.booksofall.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.booksofall.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.booksofall.com\/fr\/wp-content\/uploads\/sites\/6\/2022\/06\/booksofall-logo-2.png\",\"contentUrl\":\"https:\/\/www.booksofall.com\/fr\/wp-content\/uploads\/sites\/6\/2022\/06\/booksofall-logo-2.png\",\"width\":166,\"height\":30,\"caption\":\"BooksOfAll French\"},\"image\":{\"@id\":\"https:\/\/www.booksofall.com\/fr\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Securing Wireless Networks - BooksOfAll French","description":"We use networks everyday. However, we may not notice the security problem behind this. Learn more about it with the guide provided by Mohamed Adel here!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.booksofall.com\/fr\/securing-wireless-networks\/","og_locale":"fr_FR","og_type":"article","og_title":"Securing Wireless Networks - BooksOfAll French","og_description":"We use networks everyday. However, we may not notice the security problem behind this. Learn more about it with the guide provided by Mohamed Adel here!","og_url":"https:\/\/www.booksofall.com\/fr\/securing-wireless-networks\/","og_site_name":"BooksOfAll French","og_image":[{"url":"https:\/\/www.booksofall.com\/fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Securing-Wireless-Networks.jpg","type":"","width":"","height":""},{"width":827,"height":1169,"url":"https:\/\/www.booksofall.com\/fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Securing-Wireless-Networks.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_image":"https:\/\/www.booksofall.com\/fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Securing-Wireless-Networks.jpg","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.booksofall.com\/fr\/securing-wireless-networks\/","url":"https:\/\/www.booksofall.com\/fr\/securing-wireless-networks\/","name":"Securing Wireless Networks - BooksOfAll French","isPartOf":{"@id":"https:\/\/www.booksofall.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.booksofall.com\/fr\/securing-wireless-networks\/#primaryimage"},"image":{"@id":"https:\/\/www.booksofall.com\/fr\/securing-wireless-networks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.booksofall.com\/fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Securing-Wireless-Networks.jpg","datePublished":"2023-03-31T03:45:16+00:00","description":"We use networks everyday. However, we may not notice the security problem behind this. Learn more about it with the guide provided by Mohamed Adel here!","breadcrumb":{"@id":"https:\/\/www.booksofall.com\/fr\/securing-wireless-networks\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.booksofall.com\/fr\/securing-wireless-networks\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.booksofall.com\/fr\/securing-wireless-networks\/#primaryimage","url":"https:\/\/www.booksofall.com\/fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Securing-Wireless-Networks.jpg","contentUrl":"https:\/\/www.booksofall.com\/fr\/wp-content\/uploads\/sites\/6\/2023\/03\/Securing-Wireless-Networks.jpg","width":"827","height":"1169","caption":"Securing Wireless Networks"},{"@type":"BreadcrumbList","@id":"https:\/\/www.booksofall.com\/fr\/securing-wireless-networks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.booksofall.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Categories","item":"https:\/\/www.booksofall.com\/fr\/categories\/"},{"@type":"ListItem","position":3,"name":"Securing Wireless Networks"}]},{"@type":"WebSite","@id":"https:\/\/www.booksofall.com\/fr\/#website","url":"https:\/\/www.booksofall.com\/fr\/","name":"BooksOfAll French","description":"Biggest IT eBooks library and learning resources - Free eBooks for programming, computing, artificial intelligence and more.","publisher":{"@id":"https:\/\/www.booksofall.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.booksofall.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.booksofall.com\/fr\/#organization","name":"BooksOfAll French","url":"https:\/\/www.booksofall.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.booksofall.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.booksofall.com\/fr\/wp-content\/uploads\/sites\/6\/2022\/06\/booksofall-logo-2.png","contentUrl":"https:\/\/www.booksofall.com\/fr\/wp-content\/uploads\/sites\/6\/2022\/06\/booksofall-logo-2.png","width":166,"height":30,"caption":"BooksOfAll French"},"image":{"@id":"https:\/\/www.booksofall.com\/fr\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.booksofall.com\/fr\/wp-json\/wp\/v2\/product\/23373","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.booksofall.com\/fr\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/www.booksofall.com\/fr\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.booksofall.com\/fr\/wp-json\/wp\/v2\/media\/23377"}],"wp:attachment":[{"href":"https:\/\/www.booksofall.com\/fr\/wp-json\/wp\/v2\/media?parent=23373"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/www.booksofall.com\/fr\/wp-json\/wp\/v2\/product_brand?post=23373"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/www.booksofall.com\/fr\/wp-json\/wp\/v2\/product_cat?post=23373"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/www.booksofall.com\/fr\/wp-json\/wp\/v2\/product_tag?post=23373"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}