In this practical introduction to the basics of securing your home wireless network, you will learn how to secure a network of game consoles, phones, and PCs. Following are totally useless security measurements specified in arstechnica's guide:
=> MAC filtering
=> Disable DHCP
=> Disable SSID
You need to enable WPA / WPA2 to protect network (don't use wep). I also recommend disabling Universal Plug and Play (UPnP) support. The UPnP protocol does not implement any authentication, so UPnP device implementations must implement their own authentication mechanisms, or implement the Device Security Service. Unfortunately, many UPnP device implementations lack authentication mechanisms, and by default assume local systems and their users are completely trustworthy. Most notably, Routers and firewalls running the UPnP IGD protocol are vulnerable to attack since the framers of the protocol omitted to add any standard authentication method.
- Always use WPA / WPA2 with TKIP or AES encrypting with a strong paraphrase
- Change paraphrase every month
- Disable UPnP
- Disable wireless router remote (public IP based) management and ssh / telnet port features. Only use your local PC for telnet / ssh or router management.
- Turn on firewall, port scan and DoS protection (which is a default for many routers)
- Turn on email notification when DoS or port scan attack detected
- You may find our WPA / WPA2 Linux configuration guide useful
- Additional tips for Windows user - Use an anti virus, firewall / internet secruity suite. Most important don't use bloated Norton product. My personal recommendation is NOD32 or kaspersky anti-Virus. Both are extremely light on system resources and detecting viruses. Either is an excellent anti-virus solution. Keep your operating system and virus databases always up to date.
If you have more security tips, please add them in the comments.TwitterFacebookGoogle+PDF versionFound an error/typo on this page? Help us!
- 30 Cool Open Source Software I Discovered in 2013
- 30 Handy Bash Shell Aliases For Linux / Unix / Mac OS X
- Top 30 Nmap Command Examples For Sys/Network Admins
- 25 PHP Security Best Practices For Sys Admins
- 20 Linux System Monitoring Tools Every SysAdmin Should Know
- 20 Linux Server Hardening Security Tips
- Linux: 20 Iptables Examples For New SysAdmins
- Top 20 OpenSSH Server Best Security Practices
- Top 20 Nginx WebServer Best Security Practices
- 20 Examples: Make Sure Unix / Linux Configuration Files Are Free From Syntax Errors
- 15 Greatest Open Source Terminal Applications Of 2012
- My 10 UNIX Command Line Mistakes
- Top 10 Open Source Web-Based Project Management Software
- Top 5 Email Client For Linux, Mac OS X, and Windows Users
- The Novice Guide To Buying A Linux Laptop