How to prevent tampering without encryption

  
Xiao Liu has multiple computers in his home. In order to allow all members of the family to surf the Internet, Xiao Liu purchased wireless routers and wireless network cards and other devices, built the computer group into the internal network, and then shared the Internet through the wireless router. Recently, when Xiao Liu downloaded the file, it was found that the network was significantly reduced. Xiao Liu used the scanning software to scan the intranet and found that there were two computers with unknown origins, “蹭”, which came in and took up a lot of bandwidth. No wonder the speed of the network slowed down. It seems that there must be a hacker who cracked the password of his wireless network, and was able to "free" online. Xiao Liu thinks that although the password can protect the security of the wireless network, everything has two sides. On the one hand, once the password is leaked or cracked, it will not have any protection. On the other hand, the encryption mechanism will also have an impact on the wireless network speed. Can you shut out the nets without encrypting them? After research, Xiao Liu found an effective solution. Here is a common Mercury MW150R router as an example to illustrate the specific operational skills. Address pool clever & ldquo; slimming & quoquo; do not leave the 蹭 ; ; ” ” ” ” ” ” ” ” ” ” ” ” ” ” ” ” ” ” ” ” ” ” ” ” ” ” ” ” ” ” ” ” ” ” And we only need to set the automatic IP address for Internet Protocol in the Local Connection Properties window, so that the computer can get the address assigned from the router. Although this is simple, it also opens the door to illegal connections. In fact, we completely narrow the scope of the address pool according to the number of computers we use, and keep the extra connections outside the door. For example, if you have three computers in your home, you only need to get three valid IPs. Then enter the router settings window, click on the "DHCP server" on the left side, and "DHCP service", select the "Enable" option in the "DHCP server" column on the right side of the window. Set the actual required address range in the "Address Pool Start Address" and “Address Pool End Address" columns (Figure 1). For example, set it to “192.168.1.100” to “192.168.1.102”. Then save the configuration information. In this way, the router can only assign 192.168.100, 192.168.101, 192.168.1.102 three addresses to the connected computer. When you turn all three computers in your home into the network, all the above three addresses will be occupied, and other hosts will not be able to access them. The pirate only has to wait for the spare IP address to appear. . In fact, the long wait will only make it give up "not to think". Of course, if you only have one computer, you can even just let the address pool contain an address, so that you can take advantage of it. Enabling the secluded address, cleverly confusing the netizen, although the above method is simple, it is also easy to be seen by the netizens. How can we more cleverly prevent netizens from getting IP easily? We may wish to take a reverse thinking, modify the router address pool and gateway address to a very useful address segment, cleverly confuse the network, so that it can not figure out our details. We know that the private network segment of the IP address includes a class A address range (from 10.0.0.0 to 10.255.255.255), a class B (from 172.16.0.0 to 172.31.255.255), and a class C (from 192.168.0.0 to 192.168.255.255). . But routers commonly use the address segment that starts with 192.168.1.1. This allows everyone to form a mindset that must be used to connect to a wireless router. We can do the opposite, set the router address pool to a very useful address segment, avoiding the viewer's line of sight. For example, we can use the address segment starting with 10.10.1.1. On the left side of the wireless router settings interface, click the “DHCP server”→“DHCP service" item, and set the address pool range in the right window to “10.10.1.1” to “10.10.1.100” (Figure 2). The gateway address can also be subtly changed. Generally speaking, the gateway address is the first address in the address pool, for example, “10.10.1.1”. We can set it to “10.10.1.254”, so that the netizens can't guess. Then save the configuration information. At the same time, in the "DHCP server" column, select the "Do not enable" option, and turn off the automatic address allocation function. We can manually open the local connection properties window on our own computer, set the IP address (such as 10.10.1.99, etc.) and gateway address for the Internet protocol, and freely surf the Internet. The bandwidth is set so that the speed of the turtles is “surfing”. The reason why the netizens are happy to surf the net, the picture is “saving money” and faster internet speed. We may wish to "send goodwill" to allow it to access the router normally, but set its available bandwidth to be "narrow", for example, only allocate 10KB/s of bandwidth, it is estimated that the other party will be "unbearable" & rdquo; and voluntarily quit. We can bind the MAC address of the intranet computer to the specified IP to form a list of MAC addresses. The computer in the list is not limited to speed, and the IP address outside the list can be set to ultra-low bandwidth. The above ideas. For example, there are three computers in the house. On the left side of the router settings interface, click <;IP and MAC Binding&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&; Item, activates the MAC address binding function. Click on the “Add Single Entry” item and enter the MAC addresses of the three computers to bind them to IPs such as 192.168.1.98, 192.168.1.99, and 192.168.1.100. In this way, a list of MAC addresses is formed. Then click on the “IP Bandwidth Control” item on the left side of the setup interface, and tick the “Enable IP Bandwidth Control” item on the right side of the window to select your broadband line type. Set the low-speed bandwidth for the specified IP segment according to the address pool range in the IP bandwidth control rule table (Figure 3). For example, the address pool range is “192.168.1.1” to “192.168.1.100”, then the bandwidth of the “192.168.1.1” to “192.168.1.97” address segment can be set to 5KB/S (set Lower), then save the activation of the bandwidth limit function for this address segment. Even if the netizen is connected to the router, it can only run at a speed, so that it can be connected to the Internet, but it can only be in a dilemma of slow data transmission, making it difficult to retreat. Filtering the MAC address, so that the netizen can take advantage of it. If you think that the above method is interesting, but the operation is a bit cumbersome, you can use the method of filtering the MAC address to completely block the netizen. I know that each NIC can only have a completely different MAC address, which also makes it the only & ldquo; ID card. Add the MAC address of the normal computer to the MAC address filtering table of the router, then only the legitimate computer can access normally, and other illegal connections will be completely intercepted. On the left side of the router settings interface, click the “Security Settings”→“Firewall Settings“ item, in the right window, select the “Enable MAC Address Filtering” option and select “Allow only MAC addresses”. The enabled MAC address in the list accesses the Internet" item (Figure 4). Then click on the "Security Settings" &rarquo;“MAC Address Filtering" item, click on the “Add New Entry" item in the right window, enter the desired MAC address, click the Save button to add it to the MAC Filter the list. In the same way, add all the required MAC addresses. In this way, only hosts with legitimate MAC addresses can connect to the router, and other hosts will not have access. Tip: When using the above tips to protect the wireless network, you must modify the default password of the wireless router in time to prevent others from using the default password to log in to the router settings interface, destroying your security settings. If you feel that the single method of use is not safe, you can use it in combination, and give full play to the power of the “chain meter”, so that the netizens can't count them. This article comes from [System Home] www.xp85.com
Copyright © Windows knowledge All Rights Reserved