Home WiFi & Networking: Best Practices
|
|
|
- Anissa Rogers
- 10 years ago
- Views:
Transcription
1
2 2 1. Change Default Administrator Passwords (and Usernames) When you install your wireless router, also known as an access point, the absolute first thing to do is change the default password. (Just Google WiFi default passwords and see what pops up!) Once you have done that, be sure to record it in your Password Vault or an encrypted file where you store other passwords or credentials. (Have you backed up this, and your other files, lately?) 2. Turn on WPA / WEP Encryption Home WiFi & Networking: Best Practices With so many people using WiFi and creating wireless networks in their homes, it is important that we learn how to do so securely! These 10 tips should help keep your home networks shielded from the 'bad guys.' It is now more common than not for homes to have their own internal computer networks. A few short years ago, most of us used dial-up or DSL with much slower speeds than we enjoy today. Our home networks, connected to high speed cable or fiber providers, get between mbits/sec download speeds. We can download huge files, stream audio/video and use videoconferencing services such as Skype, all at the same time. Huge numbers of us also have one or more wireless networks or WiFi at home. So now, in addition to just our computers, modern standards allow us to distribute our multi-media entertainment around the house, add in a baby monitor, and even build a pretty decent WiFi based, interior and exterior, home security camera network to monitor and protect the family and property while we are home or away. Awesome. But you know what's next, right? What about security? First, we will say this. Wired networks offer the best speeds and are the most secure/securable types of networks. But for convenience and flexibility within your home, and for personal use in general, WiFi is most people s choice. Now, again we ask what about security? Shouldn t we be securing that network to which we are connecting our computers, ipads, smartphones, security cameras and monitors? The answer is, yes, of course! Hardening (securing a system by reducing its vulnerabilities) your home WiFi network is actually not difficult at all. It just takes a few minutes and it makes you largely safe and secure from interlopers and eavesdroppers. Here s our Top 10 Home WiFi security tips. WiFi routers, and most computers, support encryption. The goal is to scramble the WiFi data so that it cannot be read by humans. This prevents interception of your private s, surfing, and everything else you do online. WiFi encryption secures the so-called last yard or that short distance between you, your computer and your wireless router. Eavesdroppers with large antennas can read WiFi network traffic from long distances, the record being some 125 miles. In practice, though, assume that your unprotected home WiFi signal can be read from more than half a mile away; invisible to you. Thus, the need for encryption. Your first choice should be WPA or WPA2 Personal at home. If your computer is older, though, you might have to fall back to WEP, the first generation of wireless encryption, which is fairly easily cracked these days. But, some encryption is better than none.
3 3 3. Change the Default SSID During your WiFi router set up, you will want to change the name of the router. Access points and routers use SSID (Service Set Identifier) to name the network. Manufacturers normally ship their products with the same default SSID set, such as Linksys. You should change the SSID and set it to a unique name, but not My Private Stuff. That s asking for trouble. Naming the SSID something innocuous will bring less attention to your network: WLAN, LAN4, NETWORK211, and so on. 4. Enable MAC Address Filtering Every computer with a network connection has a unique identifier called the physical address or MAC address. Since access points and routers keep track of the MAC addresses of all devices that connect to them, you can easily restrict which computers can connect to your wireless network. This is a great additional layer of security for your home network. Depending upon the type of access point, you might have to give Guests your WPA encryption code and/or enter their MAC address into the router. Some routers, however, permit Hot Spot connection to the internet and not your internal network. Read the specs carefully! The command ipconfig /all will give you the physical MAC address on your Windows computer. In OS X, Preferences>Network>Advanced will give you the MAC address. 6. Disable SSID Broadcast In a home WiFi network, automatic network roaming between different access points is pretty irrelevant. In your router set up, disable SSID Broadcast. You don t need it unless you have several wireless networks at home. 7. Consider Using A Static IP Most home routers and access points use a networking technology called DHCP or Dynamic Host Configuration Protocol. The network IP address of your computer can change on the fly as computers and additional equipment are connected to it. This makes networking very easy. Nothing to touch or configure. The IP address of many home wireless routers is (called an octet) and then each computer (or network enabled device) will be assigned a number greater than one for the final digit of the octet. For small home networks this is automatic and invisible. That s the good news. Unfortunately, attackers can easily obtain valid IP addresses from your network's available DHCP numbers. For extra layers of security, you may want to turn off DHCP and set a static (fixed) IP address on your router or access point. This way you can configure each connected device to match. Using a private IP address range prevents computers from being directly reached by the bad guys from the internet. There are three IP address ranges you can use for your private static IP network: through through through Don't Auto-Connect to Open WiFi Networks Be very careful not to accidentally connect to the wrong wireless network! Your neighbors may not be as security aware as you, and their WiFi network may be wide open. Some computers are set to automatically recognize and connect to any available network, and that is not good for you! Connecting to an open Wi-Fi network such as a free wireless hotspot or your neighbor's router exposes your computer and all of your communications to interception and potential data leakage. Unless you have a very specific reason to do so, do not enable auto-connect. On your computers, find and know how to use and disable this feature. There is no security advantage with any specific IP address or range. Every router is slightly different in menus and configuration, so please read carefully, check the manual and Google it if you are confused. (Routers always have a reset button so if you make a mistake, you can always start over using the default settings.)
4 4 Up at (they are The Good Guys!). You will want to test all of the ports to your network. The best result you can get is PASSED and all ports would show up in Stealth Mode. Many home networks, however, are configured to connect to outside services, servers and clouds. For this reason, you may notice that PORT 113 (IDENT) may be closed and not in Stealth Mode. Generally this is not a problem. If you want to take the extra step, refer to your router s manual so you can put IDENT into Stealth Mode by using a technique called port forwarding, which is available in most wireless routers. Now, at home, you trust everyone on your network. Right? That s all up to you, but you should also know what additional steps you can take to protect your confidential data on your networked computers. 1. Do you have software firewalls turned on? Perhaps, parents want to keep curious kids out of their affairs. One option is to configure a firewall to restrict access to a specific computer. Software firewalls are built-in to Windows and OS X. 2. Another option is to not use the computer s built-in firewall. Instead, you can configure sharing to give full or partial access to your computer s files. 3. Configuring the personal firewall on your laptops is recommended when away from home or on travel. This effectively makes your computer invisible to bad guys. 9. Position the Router or Access Point Safely Remember that if you have access to your neighbor s WiFi, then he could also have access to yours. If possible, put your WiFi router in the middle of your house. This simple step will help minimize the amount of signal leakage to potential eavesdroppers. Remember, your WiFi network can be heard for over half a mile. Some homes require repeaters to make sure the WiFi signal reaches everywhere it is needed. Being aware of your network and its weaknesses is critical to achieving the highest level of home wireless security. 10. Turn OFF the Network During Extended Periods of Non-Use The ultimate in security is to simply turn off the computer. In the case of your wireless network: same thing. Shutting down your network will certainly prevent most outsiders from breaking in! But it s also impractical to turn it off and on frequently. In addition, if your network Sharing and Firewall controls in OS X. disappears (is not shown in a list Preferences>Sharing and Preferences>Security. when your neighbors search for Windows 7 security and sharing is a vast available networks), that could be improvement over prior versions. a clue that you are, in fact, away from home for some period of time. Perhaps you could turn off the computers and printers and 8. Firewalls and Sharing On Each Computer and the Router such, but leave the network on especially Modern network routers contain built-in firewalls. During set up, make sure the router if you have a WiFi video surveillance and firewall is not disabled. security system that you can monitor from To test what your home network looks like to bad guys on the internet, visit Shields anywhere you happen to be! So now you re secure on your home wireless network. Right? Maybe. New vulnerabilities are discovered regularly, and we never know if one is going to affect our particular equipment. What should you do? Perform periodic network scans (GRC/ Shields Up), check your sharing rights (things can change mysteriously ), and check your router and computer settings. Good practice. Regularly check for router firmware updates from the administration panel. Don t ignore those security alerts. Pay attention and make an informed decision as to whether or not they affect you. When in doubt, ask for help! Search the internet, ask more technical friends or colleagues, and don t forget the kids. They have this stuff down!
5 5 Who's the Boss on Your Home Computers? So, we have been talking about home networks, multiple computers, multiple users, etc. Many of us share computers at home and that s not a security problem. Unless, you aren t managing them correctly. Here are a few tips to help you manage your multi-user computers. There should only be 1 person with administrator access, per computer. One big boss. That account should only be used when there are changes being made to the computer. A backup administrator is also a good idea. Each user should have his/her own user account, with individual login credentials. Set up as many as you want! Sharing between accounts and files should be set by the admin (Mom? Dad?) based upon your family s policies about who is allowed to do what. Learn how to set parental controls for each operating system. Configure browsers for each user to filter content as you deem appropriate. Consider adding additional parental control software, if you choose. Engage the entire family. These are security issues not an invasion of privacy or lack of trust. VPNs: Make Connections SECURELY at Home and Away Virtual private networks, or VPNs, tend to get a bad rap as being difficult to set up, erratic in performance, and a questionable deterrent against possible security breaches. Not true anymore. Products such as HMA achieve high levels of security and privacy, and are no more difficult to use than . In fact, many experts argue that personal VPNs are no longer optional, but are absolutely necessary. With endless travel, wireless hotspots, and other public internet access, the risk of bad guys grabbing your data and credentials must be dealt with by each user. Think of a VPN as an insurance policy; sure, most of time no one will be listening. Most of the time, you don t crash your car, either. It's just that one incident that one car crash, that one electronic eavesdropper when you desperately need the insurance afforded by a VPN to avoid a huge loss in confidential and valuable data. A VPN encrypts all of the internet traffic in and out of a computer, and also hides the true location of the computer. Personal VPN services cost between $40-$100 per year and are worth every penny for the peace of mind. You will be able to choose which VPN server you want to connect through. Some services offer hundreds of options, so your computer might appear to be in France or Japan or Australia while you are actually at an airport in Houston or London. The Bad News: Some VPN services will slow down your internet experience. Read the reviews ( do some research, and if you don t like it within the first 30 days, most reputable companies will refund your money.
6 6 Mac Infection? They said it never could happen. Headlines are screaming, Mac Botnet Grows and that at least 600,000 Macs are infected as part of a growing botnet, with some experts now claiming that Mac OS X is no longer free of malware. 76% of the infected Macs are located in the U.S. and Canada, with another 13% in the UK. But almost 300 of the infected machines are in Cupertino, Apple s home. The facts: The Flashback Trojan first appeared disguised as a Flash installer in September It disables Mac OS X s built-in malware protections. The Trojan makes its way into Macs through a Java vulnerability, and is loaded onto unpatched Macs, without interaction from the user. Is this a Mac problem or, as many experts claim, just a typical Java and browser hole? Since the weakness is in Java itself, OS X is still clean as far as most people can tell. If you want to check if your Mac is infected, visit trojan-downloader_osx_flashback_i. shtml. A small percentage of Windows machines may have been infected, as well. Make sure your Windows software has been updated and patched. No matter the result, and no matter if you are on OS X or Windows, if you are using Java, update your software immediately with Software Update! And as always, follow company policy concerning any computers that are for work use or any personal machines that you are allowed to use for work or on company networks. Lost and Found Symantec s recent study of what happens to lost smartphones provides some fascinating and perhaps not so surprising insight to the human character and what you should expect if you do lose your iphone, ipad or Android device. A number of mobile devices were accidentally lost in several cities in the U.S., Canada and UK, then tracked to see what happened when they were found. 96% 89% 50% of lost smartphones were accessed by the finders of the devices. We are an inquisitive species. of devices were accessed for personal related apps and information. 70% 83% of devices were accessed for both business and personal related apps. A file titled HR Salaries was accessed on of devices were accessed for corporate related apps and information. 53% of the phones. of the smartphone finders contacted the owner because the contact info was loud and clear on each 'lost' device. The other 50% are assumed to now be the property of their new owners. This finding demonstrates the high risks posed by an unmanaged, lost smartphone to sensitive corporate information. It demonstrates the need for proper security policies and device/data management. This is especially true in the age of the consumerization of IT and Bring Your Own Device (BYOD), when mobile devices are flowing into and out of corporate infrastructures at previously unheard of rates. If an unmanaged employee-owned device is used for corporate access unbeknownst to the organization and then that device is lost, the consequences of having no control over that device for example, to remotely lock or wipe it can be devastating. Coming Next Month: Identify Yourself! Biometrics Passwords Single Sign On User Authentication and more!
9 Simple steps to secure your Wi-Fi Network.
9 Simple steps to secure your Wi-Fi Network. Step 1: Change the Default Password of Modem / Router After opening modem page click on management - access control password. Select username, confirm old password
Connecting to Wireless networks and hotspots
Connecting to Wireless networks and hotspots How to connect to a wireless network on the ipad and troubleshoot problems The ipad is ultimately a device that allows you to consume content in an easy and
Security Awareness. Wireless Network Security
Security Awareness Wireless Network Security Attacks on Wireless Networks Three-step process Discovering the wireless network Connecting to the network Launching assaults Security Awareness, 3 rd Edition
Configuring Routers and Their Settings
Configuring Routers and Their Settings When installing a router on your home network the routers settings are usually defaulted to automatically protect your home, and simplify setup. This is done because
SwannEye HD Security Camera Wi-Fi Connections Quick Setup Guide. Welcome! Lets get started.
EN SwannEye HD Security Camera Wi-Fi Connections Quick Setup Guide Welcome! Lets get started. 1 1 Introduction 1 2 3 4 Congratulations on your purchase of this SwannEye HD Wi-Fi Security Camera from Swann!
AC750 WiFi Range Extender
Model EX6100 User Manual April 2014 202-11307-03 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products. After installing your device, locate the serial number
RingCentral Router Configuration. Basic Start Guide for Administrators
RingCentral Router Configuration Basic Start Guide for Administrators RingCentral Router Configuration Basic Start Guide for Administrators Contents 3 Getting Started 4 Quality of Service 4 Test Your Connection
Frequently Asked Questions
FAQs Frequently Asked Questions Connecting your Linksys router to the Internet 1 What computer operating systems does my Linksys router support? 1 Why can t I connect my computer or device to my router?
Configuring the wireless security of your Linksys Wireless-N router through the web-based setup page
Contents Configuring the wireless security of your Linksys Wireless-N router through the web-based setup page.. 2 Checking the Linksys router s wireless settings through the web-based setup page and adding
Top 10 Security Checklist for SOHO Wireless LANs
Expert Reference Series of White Papers Top 10 Security Checklist for SOHO Wireless LANs 1-800-COURSES www.globalknowledge.com Top 10 Security Checklist for SOHO Wireless LANs David Coleman, AirSpy Networks
Wireless Network Best Practices for General User
Wireless Network Best Practices for General User I n Hong Kong, the number of Wi-Fi access points (hotspots) has reached 31,000 in 2015 1. Unfortunately, not all of them are well-protected. In fact, wireless
USER GUIDE AC2400. DUAL BAND GIGABIT Wi Fi ROUTER. Model# E8350
USER GUIDE AC2400 DUAL BAND GIGABIT Wi Fi ROUTER Model# E8350 Table of Contents Product overview E8350..................................... 1 Setting Up Your E-Series Router Where to find more help.........................
Fibe Internet Connection Hub Reference Guide
Fibe Internet Connection Hub Reference Guide FibeInternet_ConnectionHub_ReferenceGuide_Eng_V7 1 Bell Internet Service Agreement Use of the Bell Internet service is subject to the terms and conditions of
This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
Quick Installation Guide
V2.01 IP Wired / Wireless Camera Quick Installation Guide (For Windows OS) Model: FI8602/FI8602W ShenZhen Foscam Intelligent Technology Co., Ltd Packing List Quick Installation Guide 1) IP CAMERA X 1 2)
User Guide. E-Series Routers
User Guide E-Series Routers Table of Contents Table of Contents Product overview E900/E1200/E1500/E2500/E3200 1 Back view 1 Bottom view 1 E4200 2 Top view 2 Back view 2 Setting Up Your E-Series Router
DATA PROJECTOR XJ-A147/XJ-A247/XJ-A257 XJ-M146/XJ-M156 XJ-M246/XJ-M256. XJ-A Series. XJ-M Series. Network Function Guide
DATA PROJECTOR EN XJ-A Series XJ-A147/XJ-A247/XJ-A257 XJ-M Series XJ-M146/XJ-M156 XJ-M246/XJ-M256 Network Function Guide In this manual, XJ-A Series and XJ-M Series refer only to the specific models listed
FI8910W Quick Installation Guide. Indoor MJPEG Pan/Tilt Wireless IP Camera
Model: FI8910W Quick Installation Guide (For Windows OS) (For MAC OS please go to page 17) Indoor MJPEG Pan/Tilt Wireless IP Camera Black White Package Contents IP Camera FI8910W with IR-Cut.x 1 DC Power
INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008
INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG What is wireless technology? ITMC TECH TIP ROB COONCE, MARCH 2008 In our world today, this may mean sitting down at a coffee
Securing your Linksys WRT54G
Securing your Linksys WRT54G Abstract Current implementations of the 802.11b and 802.11g wireless LAN standards have several potential pitfalls for security. However, built in security mechanisms in these
If security were all that mattered, computers would never be turned on, let alone hooked into a network with literally millions of potential intruders. Dan Farmer, System Administrators Guide to Cracking
National Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
8 Steps for Network Security Protection
8 Steps for Network Security Protection cognoscape.com 8 Steps for Network Security Protection Many small and medium sized businesses make the mistake of thinking they won t be the target of hackers because
8 Steps For Network Security Protection
8 Steps For Network Security Protection 8 Steps For Network Security Protection Many small and medium sized businesses make the mistake of thinking they won t be the target of hackers because of their
Top 10 Security Checklist for SOHO Wireless LANs
Introduction Corporations, government agencies, the military, and enterprises in fact all medium to large scale wireless LANs have a different set of security requirements compared to the wireless LAN
Senaca Shield Presents 10 Top Tip For Small Business Cyber Security
Senaca Shield Presents 10 Top Tip For Small Business Cyber Security Presented by Liam O Connor www.senacashield.com [email protected] #Senacashield Small businesses need cyber security too. This slide
N300 WiFi Range Extender
Model EX2700 User Manual July 2014 202-11395-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products. After installing your device, locate the serial number on
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
Quick Start. Nighthawk X8 AC5300 Tri-Band WiFi Router Model R8500. Package Contents. NETGEAR, Inc. 350 East Plumeria Drive San Jose, CA 95134 USA
Support Thank you for purchasing this NETGEAR product. You can visit www.netgear.com/support to register your product, get help, access the latest downloads and user manuals, and join our community. We
Basic Computer Security Part 2
Basic Computer Security Part 2 Presenter David Schaefer, MBA OCC Manager of Desktop Support Adjunct Security Instructor: Walsh College, Oakland Community College, Lawrence Technology University Welcome
MN-700 Base Station Configuration Guide
MN-700 Base Station Configuration Guide Contents pen the Base Station Management Tool...3 Log ff the Base Station Management Tool...3 Navigate the Base Station Management Tool...4 Current Base Station
This guide is intended to help you troubleshoot problems connecting a wireless device to the Gogo Biz network.
This guide is intended to help you troubleshoot problems connecting a wireless device to the Gogo Biz network. TABLE OF CONTENTS Windows Operating System... 3 Blackberry... 5 Android... 6 Apple Macbook...
Quick Installation Guide
V2.01 Model: FI9821W Quick Installation Guide Indoor HD Pan/Tilt Wireless IP Camera Black White For Windows OS ------- Page 1 For MAC OS ------- Page 16 ShenZhen Foscam Intelligent Technology Co., Ltd
Quick Installation Guide For Mac users
Quick Installation Guide For Mac users Packing List 1) IP CAMERA X 1 2) Wi-Fi Antenna (only available for wireless model) 3) DC Power Supply X 1 4) Network Cable X 1 5) Mounting bracket 1 6) CD X 1 (Include
VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong
VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY AUTHOR: Raúl Siles Founder and Security Analyst at Taddong Hello and welcome to Intypedia. Today we will talk about the exciting world of security
NEW! CLOUD APPS ReadyCLOUD & genie remote access
Performance & Use AC1900 1900 DUAL BAND 600+1300 RANGE AC1900 WiFi 600+1300 Mbps speeds 1GHz Dual Core Processor Advanced features for lag-free gaming Prioritized bandwidth for streaming videos or music
High Speed Internet - User Guide. Welcome to. your world.
High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a
Quick Start Guide. Business Wireless Gateway. WiFi Devices. Model Number: DPC3939B. Business Wireless Gateway
Business Wireless Gateway Model Number: DPC3939B Quick Start Guide WiFi Devices Business Wireless Gateway Set up your Private and Public WiFi networks About the Business Wireless Gateway Model Number:
BT Business Total Broadband User Guide
BT Business Total Broadband User Guide Contents To install your BT Business Hub, follow your handy Quick Start guide. This User Guide contains more detailed set-up and service information, including troubleshooting.
Chapter 3 Safeguarding Your Network
Chapter 3 Safeguarding Your Network The RangeMax NEXT Wireless Router WNR834B provides highly effective security features which are covered in detail in this chapter. This chapter includes: Choosing Appropriate
Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper
Securing Patient Data in Today s Mobilized Healthcare Industry Securing Patient Data in Today s Mobilized Healthcare Industry 866-7-BE-GOOD good.com 2 Contents Executive Summary The Role of Smartphones
BT Business Total Broadband Fibre User Guide
BT Business Total Broadband Fibre User Guide Fibre Contents Learn about 4 Your Fibre Hub and BT Business Total Broadband Fibre service. Extra features 7 Setting up extra features once you re online security,
Linksys WAP300N. User Guide
User Guide Contents Contents Overview Package contents 1 Back view 1 Bottom view 2 How to expand your home network 3 What is a network? 3 How to expand your home network 3 Where to find more help 3 Operating
User s manual for Android Application
Motorised IP Video surveillance camera for smartphones, tablets and PC / MAC. Protect your home and family remotely! User s manual for Android Application Thanks We thank you for choosing Aquila Vizion.
BYOD: BRING YOUR OWN DEVICE.
white paper BYOD: BRING YOUR OWN DEVICE. On-boarding and Securing Devices in Your Corporate Network Preparing Your Network to Meet Device Demand The proliferation of smartphones and tablets brings increased
Quick Start Guide. WRV210 Wireless-G VPN Router with RangeBooster. Cisco Small Business
Quick Start Guide Cisco Small Business WRV210 Wireless-G VPN Router with RangeBooster Package Contents WRV210 Router Ethernet Cable Power Adapter Product CD-ROM Quick Start Guide Welcome Thank you for
Quick Installation Guide
V46.01 Model: FI8918W Quick Installation Guide Indoor Pan/Tilt Wireless IP Camera Black White For Windows OS ------- Page 1 For MAC OS ------- Page 11 ShenZhen Foscam Intelligent Technology Co., Ltd Quick
Quick Installation Guide
V48.01 Model: FI8919W Quick Installation Guide Outdoor Pan/Tilt Wireless IP Camera For Windows OS ------- Page 1 For MAC OS ------- Page 15 ShenZhen Foscam Intelligent Technology Co., Ltd Quick Installation
A quick Guide to your Super Hub 2ac
A quick Guide to your Super Hub 2ac HELLO. W el c o m e t o t h i s h a n d y g u i d e t o y o u r n ew v i r g i n m e d i a b u s i n e s s b r o a d b a n d. What s inside Getting to know your Super
Software and Settings Instructions
SoelTech Automation Inc. Software and Settings Instructions Select the blue disclosure button that is associated with the network name you want to connect the Mobile GDO to (Blue >). It would normally
Linksys E-Series Routers. User Guide
Routers User Guide E900 E1200 E1500 E2500 E3200 E4200 E900 Contents E900 Contents Product overview E900...................................... 1 Package contents 1 Features 1 Back view 2 Bottom view 2 Setting
Internet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
Movie Cube. User s Guide to Wireless Function
Movie Cube User s Guide to Wireless Function Table of Contents 1. WLAN USB Adapter Connection...3 2. Wireless Setup...4 2.1 Infrastructure (AP)...5 2.2 Peer to Peer (Ad Hoc)...7 2.3 Settings for PC...8
Designing AirPort Extreme Networks
Designing AirPort Extreme Networks Contents 1 Getting Started 5 About AirPort 5 How AirPort Works 6 How Wireless Internet Access Is Provided 6 Configuring AirPort Extreme Base Station Internet Access
Internet and Email Help. Table of Contents:
Internet and Email Help The following tips are provided to assist you in troubleshooting and managing your Plex Internet and email services. For additional issues or concerns, you may also call our Product
Quick Installation Guide
Quick Installation Guide (For Windows & Mac OS) Outdoor Wireless IP Camera Package Contents V1.1 IP Camera Power Adapter Resource CD Ethernet Cable Mounting Bracket(except FI8919) Wi-Fi Antenna Quick Installation
Daylite Server Admin Guide (Dec 09, 2011)
Daylite Server Admin Guide (Dec 09, 2011) Table of contents Objective 3 Audience 3 Overview 4 Setting up the Daylite Server Admin 5 Database Security 16 Further reading 19 Help and other resources 21 2
Chapter 2 Configuring Your Wireless Network and Security Settings
Chapter 2 Configuring Your Wireless Network and Security Settings This chapter describes how to configure the wireless features of your DG834N RangeMax TM NEXT Wireless ADSL2+ Modem Router. For a wireless
Lutron Home Control Remote Access FAQ
Lutron Home Control Remote Access FAQ What software versions of RadioRA 2 / HomeWorks QS / Lutron Home Control App does remote access work with? RadioRA 2 version 6.0.0 and up HomeWorks QS version 5.0.0
NOTICE. All brand and product names are the trademarks of their respective owners. Copyright 2011 All rights reserved.
X7N USER MANUAL NOTICE This document contains proprietary information protected by copyright, and this Manual and all the accompanying hardware, software, and documentation are copyrighted. No part of
Remote Access Securing Your Employees Out of the Office
Remote Access Securing Your Employees Out of the Office HSTE-NB0011-RV 1.0 Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond BC V7C 4V4 Canada 1 (855) 497-3700 www.hypersecu.com Introduction
10 Quick Tips to Mobile Security
10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22
Section 12 MUST BE COMPLETED BY: 4/22
Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege
Configuration Manual English version
Configuration Manual English version Frama F-Link Configuration Manual (EN) All rights reserved. Frama Group. The right to make changes in this Installation Guide is reserved. Frama Ltd also reserves the
Linksys E-Series Routers. User Guide
Routers User Guide E1200 E1500 E2500 E3200 E4200 E1200/E1500 Contents E1200/E1500 Contents Product overview E1200/E1500 1 Package contents 1 Features 1 Back view 2 Bottom view 2 Setting Up: Basics How
Quick Installation Guide-For MAC users
Quick Installation Guide-For MAC users Packing List 1) IP CAMERA X 1 2) Wi-Fi Antenna (only available for wireless model) 3) DC Power Supply X 1 4) Network Cable X 1 5) Mounting bracket 1 6) CD X 1 (Include
Lutron Home Control Remote Access FAQ
Lutron Home Control Remote Access FAQ What software versions of RadioRA 2 / HomeWorks QS / Lutron Home Control App does remote access work with? RadioRA 2 version 6.1.0 and up HomeWorks QS version 5.0.3
Malware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
Lutron Home Control Remote Access FAQ
Lutron Home Control Remote Access FAQ What software versions of RadioRA 2 / HomeWorks QS / Lutron Home Control App does remote access work with? RadioRA 2 version 6.0.0 and up HomeWorks QS version 5.0.0
Beginner s SETUP GUIDE for NANOSTATION-M2 as receiver and other Ubiquity airmax devices using AirOS firmware v5 (Windows/MacOS)
Beginner s SETUP GUIDE for NANOSTATION-M2 as receiver and other Ubiquity airmax devices using AirOS firmware v5 (Windows/MacOS) This guide is primarily intended for mobile users (boaters, campers and truckers)
High-Speed Internet Quick Start Guide
High-Speed Internet Quick Start Guide Connect Your World. NEED HELP? Call 1.800.239.4430 or visit Frontier.com/HelpCenter Contents PART #1: Wi-Fi Router Setup... 4 PART #2: Configure Wi-Fi Router... 8
Chapter 2 Wireless Settings and Security
Chapter 2 Wireless Settings and Security This chapter describes how to set up the wireless features of your WGT624 v4 wireless router. In planning your wireless network, select a location for the wireless
CONNECTING THE RASPBERRY PI TO A NETWORK
CLASSROOM CHALLENGE CONNECTING THE RASPBERRY PI TO A NETWORK In this lesson you will learn how to connect the Raspberry Pi computer to a network with both a wired and a wireless connection. To complete
Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD
STRATEGY ANALYTICS INSIGHT October 2012 Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD By Mark Levitt, Analyst/Director at Strategy Analytics BYOD
Quick Installation Guide
Packing List Quick Installation Guide Quick Installation Guide 1) IP CAMERA X 1 2) Wi-Fi Antenna (only available for wireless model) 3) DC Power Supply X 1 4) Network Cable X 1 5) Mounting bracket 1 6)
ShareLink 200 Setup Guide
ShareLink 00 Setup Guide This guide provides instructions for installing and connecting the Extron ShareLink 00. The ShareLink USB 00 Wireless Collaboration Gateway allows anyone to present content from
Brazosport College VPN Connection Installation and Setup Instructions. Draft 2 March 24, 2005
Brazosport College VPN Connection Installation and Setup Instructions Draft 2 March 24, 2005 Introduction This is an initial draft of these instructions. These instructions have been tested by the IT department
Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection.
Quick Start Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection. This document will help you understand your Mobile WiFi so you can start using
Beginner s SETUP GUIDE for NANOSTATION-2 as receiver and other Ubiquity devices using AirOS firmware V3.6 (Windows/MacOS)
Beginner s SETUP GUIDE for NANOSTATION-2 as receiver and other Ubiquity devices using AirOS firmware V3.6 (Windows/MacOS) This guide is primarily intended for mobile users (boaters, campers and truckers)
Connecting your Aiki phone to a network
Connecting your Aiki phone to a network Connect to mobile networks Depending on your carrier and service plan, your phone may connect automatically to your carrier s fastest available data network. Or
Network Security Best Practices
CEDIA WHITE PAPER Network Security Best Practices 2014 CEDIA TABLE OF CONTENTS 01 Document Scope 3 02 Introduction 3 03 Securing the Router from WAN (internet) Attack 3 04 Securing the LAN and Individual
Cyber Security: Beginners Guide to Firewalls
Cyber Security: Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers This appendix is a supplement to the Cyber Security: Getting Started
Nighthawk AC1900 WiF Range Extender
Nighthawk AC1900 WiF Range Extender Model EX7000 User Manual December 2014 202-11469-01 350 East Plumeria Drive San Jose, CA 95134 USA Nighthawk AC1900 WiF Range Extender Support Thank you for selecting
Apple s Time Capsule
FOREVERWARM CONSULTING INC Self-Help Series How to setup Apple s Time Capsule in your Microsoft Windows based Small Business or Home Office A step-by-step guide to installing Apple s Time Capsule in your
WiFi-SB-L3 300M WiFi Router WiFi Bridge WiFi Repeater. WiFi Router WiFi Repeater WiFi Bridge WiFi-SB-L3 Quick Setting Guide
300M WiFi Router WiFi Repeater WiFi Bridge WiFi-SB-L3 Quick Setting Guide 1 Chapter 1 Router Mode Quick Setup Guide 1. Let WiFi-SB-L3 be powered on. 2.Turn on wireless network connection, disabled local
Canvio Home FAQ. is designed to be very easy to install and use to back up, share, and remotely access the files from your computers.
What is a Canvio Home device? Canvio Home is a Network-Attached Storage device that is designed to be very easy to install and use to back up, share, and remotely access the files from your computers.
What is Bitdefender BOX?
Quick Setup Guide What is Bitdefender BOX? Think about Bitdefender BOX like an antivirus for your network. It s a hardware device that sits next to your Wi-Fi router and protects all Internet connected
Setting Up Your Wireless Network
Setting Up Your Wireless Network 1 TABLE OF CONTENTS Wireless Tips... 3 Terminology... 4 Motorola 2247... 5 Logging In:... 5 Changing the SSID/network name... 6 Westell Model 7500... 12 Configuration of
Using Wireless Technology Securely
Using Wireless Technology Securely US-CERT In recent years, wireless networking has become more available, affordable, and easy to use. Home users are adopting wireless technology in great numbers. On-the-go
Figure 1. The Motorola SB4200 cable modem
Setting Up a Home Wireless Network What You Need If you're still using a dial-up modem to access the Internet, it's time to consider broadband. Depending on where you live, you can either opt for a cable
networking revision B
networking revision B Table of Contents Local area network options (Single Main Repeater Systems)... 3 Wired/Wi-Fi connection through Wi-Fi router... 3 Wired connection through router... 4 Direct connection...
Chapter 15: Computer and Network Security
Chapter 15: Computer and Network Security Complete CompTIA A+ Guide to PCs, 6e What is in a security policy Mobile device security methods and devices To perform operating system and data protection How
Chapter 1 Configuring Internet Connectivity
Chapter 1 Configuring Internet Connectivity This chapter describes the settings for your Internet connection and your wireless local area network (LAN) connection. When you perform the initial configuration
Hands-on MESH Network Exercise Workbook
Hands-on MESH Network Exercise Workbook Santa Clara County RACES Date: 18 March 2015 Version: 1.0 scco_wifi_intro_exonly_v150318.docx 1 Table of Contents HANDS ON! Exercise #1: Looking at your Network
References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household
This appendix is a supplement to the Cyber Security: Getting Started Guide, a non-technical reference essential for business managers, office managers, and operations managers. This appendix is one of
