Preventing the web graphics from teaching the wireless network to no longer card

  
Now, almost every household has a wireless network. However, sometimes using it will make the network speed very slow. Most of this situation is being smashed by others. So, how does the wireless network prevent the network? Below, let's take a look at the wireless network prevention method with Xiaobian. 1, set complex wireless password capture package exhaustive wireless password is the most common wireless password cracking method, if your WiFi password is weak password, pure number, birthday, mobile phone number and other common password, then crack password is minutes So, setting a complicated password is the solution. Log in to the router management interface, click Wireless Settings > Wireless Security Settings, select the encryption method as: WPA-PSK/WPA2-PSK, encryption algorithm AES. Set a relatively complex password (at least 8 for numbers or combinations of letters) in the PSK password, as shown below. Note: When using a dual-band router, it is recommended to set the wireless password in the 2.4G and 5G wireless security settings respectively. 2. Set the wireless MAC address filtering login router management interface, click Wireless Settings > Wireless MAC address filtering, add the wireless terminal MAC address in the usage environment to the allow list, enable the rule: 3, hide the SSID in the wireless settings》》 In the setting, the hook of the SSID broadcast front end is canceled and saved (if prompted to restart, please click restart). This method is suitable for users with higher levels. The connection is more complicated. For example, Win7 will display other networks, and the mobile phone does not display hidden networks. You need to manually enter the SSID number and password to connect. If you unfortunately hide the network and don't know how to connect, press the reset button to reset it. Judgment method: How to know whether the wireless network is stolen or not to log in to the router management interface. In the wireless setting, the status list will display the MAC address of the wireless device currently connected to the router, and accordingly, it can be determined whether there is an illegal user access. . For example, there are only 2 wireless terminals in the usage environment, but if there are 3 current hosts in the host state, the wireless network is stolen. Tip: Log in to the router manager management interface.
Copyright © Windows knowledge All Rights Reserved