Preview

Nt1330 Unit 3 Assignment 1 Reaction Paper

Good Essays
Open Document
Open Document
367 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1330 Unit 3 Assignment 1 Reaction Paper
Tips for
Everyone wants privacy in their life and they often secure their things from others but what about your WIFI connection?
You don’t want your neighbors or street boys use your internet connection as you are paying yourself and if they get access to the network they might have access to your browsing history and data you stored locally.
So how do you secure your connection and block unwelcome visitors and stay away? It doesn’t require you to become IT professionals but simple things will secure your system.
Keep changing your passwords:
The very first thing you should need to do with your connection is to change the password and it was quite easy as you just need to login the router settings page and change the password that is impossible
…show more content…
Check your router settings:
You should also need to analyze the settings of your router connection as this page provides you detail information about your router and will check different connections connected to your network and changing the password of router also worthy for people.
You are also able to perform detective work with the help of router and will identify the devices and if you want you are able to find the settings of ‘Hide a network’ and your neighbors are unable to scan your connection and every time you connect the device you should need to enter the SSID manually.
Other security tips:
If you are unable to learn the router settings as different models in the market have different settings then you should install the apps on your desktop to learn about the network that are free for use.
You can also add the VPN settings to your connection that provides another encryption layer to your network as if anyone remain able to join the network needs hard time to gain access to

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Before beginning the labs, set up the wireless network just as you did last week. Remember: You will need to configure the routers for every lab period for every lab meeting. Use the same settings you used last week (if they differ from the worksheet) and the same router/network you assigned to each student. Remind…

    • 411 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    To set it up you will need to use the program that is provided which will immediately run when the router is first hooked up to your computer. You may need to give your router a password; if you already have a password you will type it in. You can leave everything set on default if you want and your router will work properly. However if you need to, you can configure the router by opening a browser and typing in 192.68.1.1 or whatever your routers host IP is set to, my router is set to default which is the…

    • 747 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1210 LAb6.1

    • 401 Words
    • 2 Pages

    WLAN is used in home because there easier to maintain and to take care of it I could be private.…

    • 401 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 3253 Words
    • 14 Pages

    By applying ipaddress, broadcast, subnet mask and default gateway. So when all settings applied then we get…

    • 3253 Words
    • 14 Pages
    Powerful Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    Keeping our LAN under lock and key prevent tampering of with the networks hardware. Access to the LAN devices is the easiest way to compromise a network. By also applying strict monitoring controls and current security updates are excellent security measures to implement.…

    • 634 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Limit unauthorized use of network resources by allowing access during businiess hours only. Do not allow remote access permitions to anyone, except those that…

    • 563 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Apply email server and attachment antivirus/malware and email quadrating for unknown file types. Disable for ping, probing, and port scanning on all exterior IP devices. Denying of outbound traffic using source IP addresses. Apply file transfer monitoring, scanning and alarming for unknown file types. Web Surfing should be monitored by filtering out any unknown IP address with trusted cites. Apply domain-name content filtering at the internet entry/access point as well.…

    • 313 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    IT-241 Appendix G

    • 369 Words
    • 2 Pages

    Only allows access to a device if its MAC address matches that of a pre-approved list on the router.…

    • 369 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Any public wireless hotspots, such as at restaurants, hotels, parks are not a good place to use any website that requires personal or financial information. When using an unsecure network, a hacker can easily get access to any webpage you access. They can access documents, pictures, bank information, your phone number, address, credit card information and passwords. Once the hacker has your username and password for one website they can try to log in as you on multiple other websites. This is why it is best to never use the same username and password on different websites. When you are connecting to a wireless network, if it does not ask you for a WEP, WPA, or WPA2 password, then your connection is not secure, meaning none of the data you access with be encrypted.…

    • 356 Words
    • 2 Pages
    Good Essays
  • Good Essays

    A VPN works well for industries in which the interception of data could give a competitor an unfair advantage. For example, a VPN would be necessary for telecommuting employees who send proprietary data from their home computer to the network at the office,. Perhaps a good place for a VPN would be in a health-care environment, where it is essential that small amounts of data gets point to point without being intercepted and understood by a hacker. There could be many uses where data needs to get point to point with its integrity intact and viewed only by authorized personnel. Law-enforcement agencies, credit card companies, and the military may have numerous applications for VPNs.…

    • 11068 Words
    • 45 Pages
    Good Essays
  • Satisfactory Essays

    quiz 2

    • 651 Words
    • 3 Pages

    1. A null session is basically a pseudoaccount that has no username or password, but can used to access information on ___.…

    • 651 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Audience Memo

    • 747 Words
    • 3 Pages

    This memo’s purpose is to inform you on my instruction manual on how to disable the Service Set Identifier (SSID) on a Fios Router. All field technicians and network technicians should be able to walk a customer through disabling the SSID on their router. This manual will provide the customer with step by step instructions on disabling the SSID without the help of a field or network technician. By having the customer complete this we are helping the customer increase the security of their wireless network. This will save the technician time and the company money.…

    • 747 Words
    • 3 Pages
    Good Essays
  • Good Essays

    if you are planning to use some sort of wireless router make sure you have enough…

    • 366 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    NTM Review

    • 454 Words
    • 4 Pages

    Logical virus – Logic bomb – when logical conditions exist, for example at a certain date or time for virus to initiate.…

    • 454 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Internet Privacy

    • 293 Words
    • 1 Page

    Using the Internet always comes with security and privacy issues. With being an online college student, I am constantly on the Internet using my school’s website. I have used this on my own personal computer with my private Wi-Fi at home and also on a public Wi-Fi connection. I keep my home Internet locked so no one else can access my Wi-Fi without knowing the password. I try not to use a public Wi-Fi unless necessary or if I am only going to be browsing the web because I never share private information online unless I am on my secured network at home. If I am ever using the Internet at work, I only use this for work information on our own Intranet. Employees are allowed to use specific computers on breaks for personal use but I still never share personal information because all computers at work are on a monitoring system. A lot of personal information is given over the Internet in society today, such as banking and credit card information when ordering items from a store online. Public Wi-Fi gives everyone access to that network, which has the threat of hackers. I do not think it is ethical to use a neighbor’s wireless Internet signal without having their permission. Even though they may not have a password set to keep their network secure, this is not an open invitation for others to use it. It should not be legal without their permission or having a terms and conditions that the user must agree too. In any case, all Internet users should be careful with the information they share online at all times and pay close attention to the type of wireless network they are…

    • 293 Words
    • 1 Page
    Satisfactory Essays