-->

Welcome!

I am IT Solutions IT Services Photographer

View Work Hire Me!

About Me

Computer Services
Corporate IT Services Provider
Laptop Service Center
Know About IT Solutions

IT Solutions.

What We Do

As solution providers, we analyse the client’s current setup, understand their requirement from the IT setup, try to address the current and future requirement issues and accordingly offer solutions. The areas where we provide these solutions are: Hardware Solutions Servers/ Desktops/ Laptops Infrastructure Software High availability and Load balancing solutions Messaging and collaboration solutions Database solutions E- Security Solutions Virus protection Firewalls Intrusion prevention Spam prevention solution Virtual Private Networks Encryption Email monitoring and control Web surfing management Storage and Backup Management Solutions NAS/SAN solutions Automated backup Disaster recovery Network Solutions Network Performance management Wireless LAN Network monitoring.

Services

Web Design

Nulla metus metus ullamcorper vel tincidunt sed euismod nibh Quisque volutpat

Customer Support

Nulla metus metus ullamcorper vel tincidunt sed euismod nibh Quisque volutpat

Branding

Nulla metus metus ullamcorper vel tincidunt sed euismod nibh Quisque volutpat

Marketing

Nulla metus metus ullamcorper vel tincidunt sed euismod nibh Quisque volutpat

Our Blog

Step-1: Creating Address object for SSLVPN IPV4 Address Range
Step-2: SSLVPN Configuration

Step-3: Adding User to SSLVPN Service Group
Step-4: Checking Access rule Information for SSLVPN Zone
Step-5: Enabling HTTPS user login in WAN Interface


Step-1: Creating Address object for SSLVPN IPV4 Address Range


Login to the SonicWALL UTM appliance,
1)     Go to Network -> Address Object, Click on Custom Address object radio button at the top
2)     Click on Add button under Address Object, to get Add address object Window. Create address object for SSLVPN lease Range

  • Name: SSL VPN Range (Any Friendly Name as you wish but need to select that while configuring SSLVPN )
  • Zone : SSLVPN
  • Type : Range
  • Starting IP Address: 192.168.168.100
  • Ending IP Address : 192.168.168.110 




Step-2: SSLVPN Configuration

>> Server Settings

Login to the SonicWALL UTM appliance,
1) Go to SSL-VPN > Server Settings page allows the administrator to enable SSL VPN access on zones, from SonicOS Enhanced 5.6.x.x onwards the SSL-VPN feature on UTM devices uses port 4433.
Please Note:
  • In older firmware versions the SSL-VPN Zones settings are available under SSL-VPN > Client Settings page.
  • SSL-VPN can only be connected using interface IP addresses. By default SSL-VPN is enabled on the WAN zone and users can connect to it using the WAN interface IP address. Likewise for other zones and, if enabled, can only be connected using the interface IP address.
  • From 5.9.x Firmware , the User Domain for SSLVPN will be in the Server settings tab. By default it will be LocalDomain, user can customize it to any name but need to use the same name while connecting (Note: User Domain is case sensitive)
 
  • From 6.2.x Firmware , the Cipher options will be removed from the Server settings tab. ​

>> Client Settings

The SSL VPN -> Client Settings page allows the administrator to configure the client address range information and NetExtender client settings.

The most important being where the SSL-VPN will terminate (eg on the LAN in this case) and which IPs will be given to connecting clients. Finally, select from where users should be able to login (probably, this will be the WAN, so just click on the WAN entry):

Note (New for SonicOS Enhanced 5.5 and above): NetExtender cannot be terminated on an interface that is paired to another interface using L2 Bridge Mode. This includes interfaces bridged with a WLAN interface. Interfaces that are configured with L2 Bridge Mode are not listed in the "SSLVPN Client Address Range" Interface drop-down menu. For NetExtender termination, an interface should be configured with as a LAN, DMZ, WLAN, or a custom Trusted, Public, or Wireless zone, and also configured with the IP Assignment of "Static".

Click on the configure button for configuring SSL VPN client settings in the client settings page to get a new window as shown below

  • From 6.2.x Firmware , the SonicPoint L3 Management Default Device Profile option will be added under Client settings tab.


---->> Settings tab
-> Select zone IPV4 as SSLVPN
-> Select Network Address IPV4 as (SSL VPN Range) address object created for SSLVPN 



----->> Client Routes tab

Client Routes page allows the administrator to control the network access allowed for SSL VPN users. The NetExtender client routes are passed to all NetExtender clients and are used to govern which private networks and resources remote user can access via the SSL VPN connection.

Note: All clients can see these routes. Also, here you may enable/disable “Tunnel All Mode” (this is the equivalent of “This gateway only” option while configuring GroupVPN).




---->> Client settings tab

Enable the option Create Client Connection Profile - The NetExtender client will create a connection profile recording the SSL VPN Server name, the Domain name and optionally the username and password.




​>> Portal Settings
The SSL VPN > Portal Settings page is used to configure the appearance and functionality of the SSL VPN Virtual Office web portal. The Virtual Office portal is the website that uses log in to launch NetExtender.



Step-3: Adding Users to SSLVPN Services Group

Under Users > Local users, ensure that the relevant user or user group is a member of the “SSLVPN Services” group:

Groups Tab: To setup membership for individual user

Members Tab: 

To setup membership for local or LDAP user group, edit theSSLVPN Services user group and add the user group under the Members ta





VPN Access Tab:

On the VPN Access Tab allows users to access networks using a VPN tunnel, select one or more networks from the Networks list and click the arrow button -> to move them to the Access List. To remove the user’s access to a network, select the network from the Access List, and click the left arrow button <-
Step-4: Checking Access rule Information for SSLVPN Zone
Under Firewall > Access Rules, note the new SSLVPN zone:

Firewall access rules are auto-created from and to SSLVPN zone from other zones. Optionally you could modify the auto-created SSLVPN to LAN rule to allow access only to those users that are configured (recommended to use single rule with groups rather than multiple rules with individual users). Ignore any warning that login needs to be enabled from SSLVPN zone

Please note: Prior to SonicOS Enhanced 5.6, the “VPN access list” that we normally use for GVC VPNs has no effect. You can control access using the firewall rules.
Step-5: Enabling HTTPS user login in WAN Interface
 Goto WAN interface and ensure HTTPS user login is enabled:


How to Test this Scenario:
1. Users can now go to the public IP of the sonicwall. Notice the new “click here for SSL login” hyper link:

2. Users can then login and start NetExtender:
NetExtender provides remote users with full access to your protected internal network. The experience is virtually identical to that of using a traditional IPSec VPN client, but NetExtender does not require any manual client installation. Instead, the NetExtender Windows client is automatically installed on a remote user’s PC by an ActiveX control when using the Internet Explorer browser, or with the XPCOM plugin when using Firefox.
On MacOS systems, supported browsers use Java controls to automatically install NetExtender from the Virtual Office portal. Linux systems can also install and use the NetExtender client.
After installation, NetExtender automatically launches and connects a virtual adapter for secure
SSL-VPN point-to-point access to permitted hosts and subnets on the internal network.




Windows 7 Tips, Tricks and Shortcuts to Increase Productivity

Windows 7 is not a new operating system, but it is new to many users. Windows 7 has several interesting new features that make this OS better than previous Windows versions. These tips for Windows 7 may not make you an expert, but they should make your experience with Windows 7 much more fun and productive.

Shake it up 

Windows Aero Shake in 7
Windows 7's "shake" feature allows you to minimize all the windows on your desktop in only one step, leaving only the window you are working in. This is great if you often run multiple programs at once.
To use this feature, click and hold the title bar of the window you want to keep maximized. At the same time, use your mouse to shake it back and forth quickly. All the other windows will then minimize to the taskbar. If you want to get those windows back, just click on the tile bar and shake it again.

You don’t have to "shake" to do this. If you want to make this feature less fun, you can press the Windows Key and Home Key simultaneously.
 
Customize your taskbar

You can rearrange your taskbar buttons quite easily. You just drag an icon to where you want it to be. You can drag in icons from applications, the start menu, the desktop and pretty much anywhere else you can find them and “pin” them to the taskbar. If you get sick of an icon you can right click on them and “unpin” them.

Windows 7 taskbar tips

Use XP mode

There are lots of folks with old, yet important, software that isn’t compatible with this newer operating system. Thankfully, Windows 7 comes with “XP Mode,” which is essentially a virtual copy of this old OS that you can run on your desktop. This won’t work for all Windows 7 users however; only those with hardware virtualization built-in to their systems (and turned on) can use this feature.

Windows 7 XP Mode Tips

Shortcuts!!!!
This is probably one of the most exciting new features for power users. If you are not a power user, you could turn into one soon with shortcuts. These are just some of the new shortcuts that can make your experience better and more productive with Windows 7:

- In Windows Explorer, you can bring up a preview pane on the right side of a window with ALT + P
- You can automatically open a new Explorer menu to show your libraries folder with Windows + E
- You can cycle through all open programs with the Taskbar’s peek menu by using Windows + T
- The Magnifier lets you zoom in or out on your entire desktop or even just a part of your screen. This feature only works when Aero desktop is enabled. You can activate the Magnifier by pressing Windows + (plus key) orWindows + (minus key)
- If a window is not maximized, you can fill your screen with it by pressing Windows + UP
- You can minimize an active window by pressing Windows + Down

Windows 7 shortcuts

Conclusion
These are just some tips for Windows 7. There are plenty more new features and shortcuts to explore. Hopefully these tips will make you more productive and let you have more fun with Microsoft’s most current operating 

Recover Deleted files in Windows with Free Tools

Have you ever deleted a file that you did not wish to and wanted to recover it but did not find it in the recycle bin? You probably deleted it permanently with Shift+Delete or emptied the Recycle Bin. Now what? Don't worry, you may still have a chance to get it back. This article lists some free software that can recover deleted files from your hard drive or any other storage device instantly.

But how do the software mentioned below undelete deleted files?
recover deleted files
When files are deleted, Windows does not delete them from your hard disk. It marks the storage space as empty for new data to be written and deletes the index entry that tells the location of those files. Unless, new files are written on that space, the deleted files are still recoverable. That's what allows these software to recover deleted files.

There are many free software that allow users to do this. Some of them are given below:-

1) Pandora Recovery
recover deleted files in Windows
Pandora Recovery is a free software that offers a wizard based interface for recovering files. It allows you to browse a drive's individual folders to look for deleted files. It also allows you search for a deleted file based on its name, file size, creation date and last access time. Its deep scan allows you to recover files that other software might have missed. Although deep scan does not return a file's original name and location, it still is effective to recover data from drives with corrupted file tables and drives that were recently formatted. It can even recover data from CDs and DVDs.

2) TOKIWA DataRecovery
undelete files in Windows
At just over 200KB, TOKIWA DataRecovery is the smallest file recovery program in the market. It supports undeletion from FAT 12, FAT16, FAT32 and NTFS file systems. It also supports recovering NTFS compressed and EFS encrypted files. This software supports Windows and is portable as well. It also has a file shredder that allows you to wipe out files in a manner that they cannot be recovered again.

3) Recuva
undelete files
Another great freeware, Recuva offers a wizard based interface to unerase files. Recuva offers scanning deleted files based on their type (music, pictures, videos etc.). It also allows deep scanning in case a file you deleted is unrecoverable via normal search. Like TOKIWA DataRecovery, Recuva also offers securely deleting files. Recuva also has a portable version that you can keep in your flash drive.

All of these recovery software support recovery from memory sticks, digital camera cards and MP3 players. They support undeleting all types of pictures, software, movies and documents from both FAT and NTFS formatted drives. They work on Windows 8.1Windows 8Windows 7, Windows Vista and Windows XP.

Free File Recovery Software
Some important tips to increase the chances of getting your deleted files back:-

1) When a file is deleted accidentally on a storage device, make sure that you don't do anything on it as doing that would increase the chances of new data being written over your deleted files; which would make file recovery impossible.

2) If you have deleted files on your main computer (the one you are using right now), do not browse the internet, download new software or shut it down. Keep it running and go to another computer, download one of the software mentioned above that is portable and save it on a flash drive. Then plugin the flash drive in your current system and perform file recovery. Regardless of whether you accidentally delete files a lot or not, make sure to always have that software in your flash drive in case you accidentally delete important files.

3) If one software fails to recover your deleted file, it does not mean that another one wouldn't recover it too.

How to Edit PDF Files: Free Online & Offline Tools

PDF, or the Portable Document Format is one of the most popular format for document sharing. Its popularity is mainly because PDF files are multi-platform (can be run on most devices without any change in formatting), smaller in size, can be opened on most devices with free software and are difficult to edit as they are "read only".

Edit PDF files

Despite PDF files being "read only" by default, there are certain tools and software you can use to change the contents of a PDF file for free without resorting to paid software like Adobe Acrobat.

Free Tools To Edit PDF files

Edit PDF Files Online
If you are looking for basic PDF editing (changing bits of text to hide your personal information or simply filling a form), you can try PDFEscape to edit PDF files right in your browser. It allows you to modify text, images and add annotations with the help of custom shapes and arrows. One of PDF Escape's great feature is its ability to password protect PDF files. It also allows you to hide text with its white out tool (this is different from deleting it). It even lets you edit password protected PDF files and add hyperlinks to web addresses. To use PDF Escape, all you need is a JavaScript enabled web browser.

2 step PDF Editing
This basically involves converting PDF files into another format and then editing the converted PDF file. After editing, you can use a PDF writer to reconvert the edited file back to PDF.

Editing PDF files

If your PDF file can be suitably edited as a Word document, you can use a PDF to Word converter for instant conversion. Edit the converted file and then, you can use any free PDF writer to recreate a PDF file. If you haveOpen Office, you can use its export as PDF feature to create a PDF file from almost any printable document.

Multivalent Browser: Multivalent browser offers minimal PDF editing in the form of allowing to add annotations. It also contains several command line tools which allow for merging and compressing PDF files.

Edit Meta data of PDF files
Meta Data is the information that is associated with a PDF file. If you wish to change this information, you can use the free PDFMetaEdit to edit information like title, author name, bookmarks and other creation data of a PDF document. PDFMetaEdit can also be used to remove and add passwords (encrypt) to PDF files.

Edit PDF files on Android based phones
Xodo PDF Reader & Editor is a free application that you can download on your Android based mobiles and tablets to write on, underline text and annotate PDF files and forms.

Advanced PDF Editors (editing text, images etc.)

Edit PDF
The freeware tools mentioned above will be useful for most users with basic PDF editing requirements. However, if you have advanced PDF editing needs, the above tools will not be that useful. There are some advanced PDF editing tools available that are as good as most paid products.

Open Office Draw
Edit PDF Files Free
The open source alternative to Microsoft Office can also be used as an alternative to Adobe Acrobat. All you need is the PDF Import extension (older version here). Then you can use Open Office Draw to easily and quickly edit PDF files. With Open Office Draw's inline editing features, you can edit any PDF document as easily as you can edit a Word document. It also supports adding and replacing images, changing font size and color, replacing default font-family, adding annotations, charts, shapes, tables all through an easy to use interface.

To load the PDF Import extension in Open Office, just open Extension Manager from the Tools Menu, click on Add and then select the location of the downloaded extension. For those of you who want a PDF Editor without any initial setup, LibreOffice, an Office suite descended from Open Office, has this extension included by default. If you don't mind the download size, Open Office Draw is simply the best free PDF editor available.

Inkscape: Inkscape is a vector graphics editor that allows you import and export PDF files. You can use Inkscape to select text, image or any other object on a PDF file and then change its position or even delete it. It also lets you do free hand drawing on PDF files and add annotations. While Inkscape offers some really good features, its complex interface makes it difficult for users to use it. Moreover, it only allows you to edit only a single page at a time. You can, however, convert these to a single PDF file using a PDF combiner.

PDFTools: PDFTools is a PDF management application that supports encrypting, decrypting (remove password), joining and splitting PDF files. Its Stamp feature can be used to add text and images over a PDF file. You can stamp to the location of your choice using the X and Y co-ordinates. It includes a PDF creator which can be used to create a PDF file from any XML document. It also supports re-arranging pages in a PDF file.

GIMP: GIMP or the GNU Image Manipulation Program can also be used as a PDF editor. Just import any PDF file as an image or a layer, then edit it, and then use its export function to get a PDF file. The only downside is that like Inkscape, GIMP also allows you to edit only a single page at a time. You can, however, easily combine these to get a single PDF file using free software like the above mentioned PDFTools.

PDF-XChange Viewer: The free version of PDF-XChange viewer can be used to directly type text on PDF files. This makes this software a good PDF form filler. Its image stamp feature can be used to insert images directly on any PDF document.

PDFEdit: PDFEdit is a full fledged PDF editor for Unix-Like operating systems. Its downside is that it does not support editing protected or encrypted PDF files. PDFEdit has a beta version for Windows, but it didn't work for me.

                                          IT Solution

                                 www.onlysolution4it.blogspot.com

onvert FAT32 to NTFS Without Formatting or Losing Data

You have a flash drive or probably an external hard drive that currently has FAT32 file system and you want to change it to NTFS, because FAT32 does not support handling large files (over 4GB) or it is just simply old for your taste but there is just one problem, you don't want to lose your saved data. This article is for you then as it explains exactly how you can achieve seamless transition from FAT to NTFS without involving any data loss.

FAT32 to NTFS

While it is generally recommended to use the NTFS file system because of its stability, security and lesser defragmentation time, most of us end up using FAT32 because that is what most disks are preformatted with. Unless, we notice the “Not enough disk space error” despite disk space being available, we don't bother to change the file system. Moreover, most of us don't change it because of the risk of losing important data and lack of time (read laziness). As Microsoft was aware of this scenario, they added a capability in the command prompt to overcome this by executing a simple command. There are many software that support this too but the Convert command is one of the easiest ways to do so. Follow the steps below to know how:-

Important: While this method works perfectly, I would still advise you to backup your data in case anything goes wrong.

FAT 32 to NTFS Conversion Steps

1) Go to Computer, and note the name of the drive whose file system you wish to convert.
2) Click on Start.
3) Type cmd in the search bar if you use Windows 7, Windows 8, Windows 8.1 or Windows Vista. If you use Windows XP, click on Run and then execute cmd.
4) Execute "chkdsk h: /f " (without quotes) where H is the letter of the drive to undergo conversion. This checks the drive for errors and fixes them automatically.
5) Execute "Convert H: /FS:NTFS" (without quotes). H is again the letter of the drive to be converted.
6) The command prompt will start the conversion process and after a few minutes, CMD will say that conversion was successful.
7) You can check it in the properties of the drive through right click<Properties.

Convert FAT to NTFS

This command can also be used to convert FAT16 disks and works on Windows 8, Windows 8.1,Windows 7, Windows XP and Windows Vista. I converted my flash drive's file system using these steps and it worked flawlessly. It is interesting to note that this method cannot be used to reconvert NTFS file system back to FAT32. To reconvert back to FAT32, you will need to format the entire drive which will definitely cause data loss.

SonicWALL Out of the Box Setup (SonicOS 5.9) (SW13622)

Return
Was this article helpful?
 
     [Select Rating]
  • Title

    SonicWALL Out of the Box Setup (SonicOS 5.9)
  • Resolution

    How to setup Dell SonicWALL for first time with Setup Wizard and register/create MySonicWALL account from the License Management page.

    SonicWALL Out of the Box Setup (SonicOS 5.9) video


    Cabling the Dell SonicWALL as a Network Gateway
    • Locate the Dell SonicWALL ports X0 and X1, port X0 is also label as LAN and port X1 is also label as WAN.
    • Connect your Internet access device such as a cable or DSL modem to Dell SonicWALL WAN (X1) port
    • Connect Dell SonicWALL LAN (X0) port to your laptop or PC or to a Network Switch
       
    Setup the Dell SonicWALL as an Network Gateway to provide secure access for wired and wireless users.
    • By providing secure network access to private networks such as LAN or DMZ.
    • Access to the Internet through a Cable modem, DSL modem or a 3G/4G modem.
    •  


    Access the Dell SonicWALL Admin User Interface
    • Connect a PC to the Dell SonicWALL LAN (X0) interface or a network switch connected to the LAN interface. You will automatically receive an IP address from the Dell SonicWALL appliance.
    • Open a browser to https://192.168.168.168 for access to the Dell SonicWALL.
    • For the first time access as the Admin user, you will be offered a choice to use a Setup Wizard or go directly to the Dell SonicWall management interface.
    • At the Dell SonicWall management login page the default Admin username and password is: admin/password

     
    Use the Dell SonicWALL startup wizard for the first time setup of a Dell SonicWALL

    At Dell SonicWALL launch page, to run the Setup Wizard, 
    click here link.
     


    Click Next at the Welcome to the SonicOS Setup Wizard page.

    For 
    Dell SonicWALL appliances with built-in wireless, such as NSA250MW, you will get a the Deployment Scenario page.

    Select the "No Wireless" option and click Next.

    If you need to setup a Access Point, you can run the Wireless Wizard after the Setup Wizard.


    At Change Administrator Password page

    You can change the Administrator password (Recommended)

    The default Administrator username is: admin
    The default 
    Administrator password is: password


     

    At Change Time Zone page

    Select a time zone from the time zone drop down and click Next


     


    At Configure Modular Device Type page

    Click Next


     


    At WAN Network Mode page

    Select the option Cable/Mode-based Connections for DHCP assigned IP addresses (Recommended setting)
    Select the option Router-based Connections for Static IP address and netmask

     

    At WAN Network Mode page: NAT with DHCP Client

    click Next


     


    At LAN Setting page

    accept the LAN setting defaults (Recommended)
    or enter your IP address and netmask
    click Next


     


    At LAN DHCP Setting page

    accept the LAN DHCP setting defaults (Recommended)
    or enter your own LAN DHCP range
    click Next


     


    At Port Assignment page

    accept the Port Assignment defaults (Recommended)
    click Next


     


    At Dell SonicWALL Configuration Summary page

    review the configuration summary
    click Apply


     


    At Setup Wizard Complete page

    click Close

     


    Registering Dell SonicWALL

    In the  SonicOS System>Status

     To register, click one of the Register links takes you to the License Management Page


     


    To register your Dell SonicWALL from the License Management page.

    Enter your MySonicWALL
     username, password at the 
    License Management page 
    Click Submit.

    If you don’t have an existing MySonicWALL account

    Create one by clicking on 
    Create MySonicWALL account.

     


    At the Create Account popup
    Enter the requested information
    Click the Register button to register.


     
    onlysolution4it.blogspot.com

onlysolution4it.blogspot.com How to Secure a Wi-Fi Network from Hackers

With the world going wireless in every sphere of technology, the question of security has often been raised. The same is true for wireless internet networks with hackers and Wi-Fi intruders always looking for ways to gain access to unsecured networks.

Security aside, there are several reasons why you might want to protect your Wi-Fi network. A secured wireless network will not only mean reduced bills but also faster internet speeds. This post contains few simple techniques you can use to make sure that your wireless network is as secure as it possible can be.

Protect your Wireless Internet Network

1) Encrypt your Wi-Fi Network: When you use a Wi-Fi network for accessing the internet, every piece of data you send and receive over the air can be easily snooped by anyone with the right set of tools. Packet sniffers can be used by even the most novice of users to sniff your data. This means that a hacker can not only see which websites are you accessing but also get the login details of your personal and professional accounts.

Encryption basically involves scrambling the data that is transmitted and received by you while using a wireless network. This means that even if a hacker intercepts your data transmission, (s)he will not be able to exploit the information contained within it.
Protect WiFi Internet Network

There are two encryption standards available that you can use: WEP (Wired Equivalent Privacy) and WPA (Wireless Protected Access). WEP is the older standard of encryption and can now be bypassed in a matter of minutes. WPA is relatively newer but it still has security holes. AirCrack and coWPAtty are two free tools that allow anyone to easily crack WEP and WPA encryption using bruteforce technique.WPA2 is the latest standard and is what you must use if you want the highest level of protection for your wireless network. The encryption keys used change each time a device accesses the network making WPA more difficult to hack.

The encryption used by all devices in the network must be the same for the network to work properly. Your network will only be as secure as its least secure device. Make sure all devices you use support WPA2 encryption. Use a strong encryption key. Make sure that it is longer than 10 characters and contains a mixture of capital and small letters, numbers and symbols. Do not use common words and stuff that people can guess about you as your password.

2) Replace default passwords on your router with strong passwords: The biggest mistake most wireless internet users make is not changing default passwords on their routers. Hackers utilize public databases that contain default passwords and usernames from virtually every manufacturer. This enables them to change the security settings of your router according to their needs. Using a strong password for your router ensures that hackers and miscreants cannot change your network's security settings. To change the password on your router, visit Administration settings on your router's settings page. Also, do not store passwords in browsers as they can be easily made visible.

3) Change default SSID
Your network's SSID or Service Set Identifier is the name of your wireless network. Usually, the SSID is the name of the router's manufacturer along with the model number of the router. Changing it to not display this information prevents you from giving additional information about your router to prospective hackers.

4) Do not broadcast your SSID
Hiding SSID prevents unsophisticated and inexperienced hackers and wifi intruders from determining that your network exists. Hiding your SSID is relatively easy and the option to do so is usually under basic wireless settings on your router's settings page. However, it is important to note that some devices, including those running newer versions of Windows, will show every network even if they cannot identify its name. Moreover, your network will still contain the SSID in data packets making unmasking ridiculously easy with tools like inSSIDerKismet andCommview for WiFi.

5) Use scary names to discourage Wi-Fi theft: If your wireless network has a name like C:\virus.exe, most people who might otherwise access your network will not for the fear of getting their devices infected. You can use your creativity to find more dangerous names for your wireless network.

6) See Connected Devices List: Almost every new router will have a page which displays the list of every device that is connected to the network. You should check this page at regular intervals to see that unknown devices are not leeching your network. When you see an unknown device, you can be certain that someone has breached your network. You can try AirSnare, a free utility which scans your network for unexpected MAC addresses and also looks into DHCP requests.
Secure Wireless Network

7) Turn off Guest networking: While most routers will have guest networking disabled by default, it always pays to see that you may not have accidentally enabled it. Guest networking allows others to access your network.

8) Enable MAC address based filtering: Media Access Control or MAC address identifies each device connected to your network. MAC address is an alphanumeric key separated by colons. Enabling MAC address based filtering allows only devices having particular MAC addresses to access your network. You need to enter the MAC address of every device you wish to allow to connect to your network on your router's settings page. This prevents unknown devices from connecting to your network even if they know your password. To find the MAC address of your computer, open command prompt and execute “ipconfig /all” without quotes in Windows based computers.

While it may prevent inexperienced users from getting access to your network, experienced hackers and advanced users can use a wireless network analyzer like Nmap and then change the MAC address of their computer.

9) Keep your firmware up to date: Router vendors regularly release firmware updates and post them on their websites. You should occasionally check the manufacturer's website to see if a new firmware update has been released. Newer routers will automatically inform you when new firmware is available.

10) Reduce wireless signal range: If you reduce the range of your wireless network, common sense tells that it will prevent hackers located at a distance from detecting your network. This has the advantage that if hackers do not know that a wireless network exists, they will not try to break into it. You can place your router at places which would block the Wi-Fi signals. While this technique is advantageous, a hacker keen on hacking into your network will just have to use a larger antenna to pick up your router's signals. Moreover, reducing the range of your wireless network might cause troubles for genuine users.

11) When not using your internet network, turn it off: This is self explanatory. If you are not using your network, turning it off saves you from giving extra time to hackers to try and hack into your wireless network. While it may be impractical to turn off your network every time you are not using it, it still is advisable to do so during extended periods of non use.

If you follow all these techniques, your Wi-Fi network will be a lot more protected and hackers will have a tough time breaking into it.



Reader Comments

Anonymous said...
Do not broadcast your SSID

I've heard this means your mobile devices will all broadcast the SSID when they start. Can anyone verify this or if there is malware in the wild that leverage that to pose as your home router?
Sumit said...
@Anonymous: SSID is not broadcasted by connected devices. It is broadcasted by your wireless access point.

About the malware: These days, anything is possible. With malware coders getting more and more advanced, you just don't know what kind of malware you might encounter in the "wild."

Post a Comment

Make your opinion count by posting a comment.
Author About
Sumit Raj maintains and writes Tweak And Trick. He is a technology enthusiast and a science student.
You can contact him at onlysolution4it.blogpot.com

read more >>



Contact Us

Phone :

+91-9971348171

Address :

H-21, Sai Garden ,
GHAZIABAD

Email :

iter.sumitraj@gmail.com

onlysolution4it. Powered by Blogger.

Using SoftPerfect Network Scanner to Scan Network

Using SoftPerfect Network Scanner to Scan Network Let’s talk about SoftPerfect network scanner , a simple network tool that you can use...

Search This Blog