{"id":2191,"date":"2011-06-15T16:29:43","date_gmt":"2011-06-15T20:29:43","guid":{"rendered":"http:\/\/thundercloud.net\/infoave\/new\/?p=2191"},"modified":"2011-06-15T16:29:43","modified_gmt":"2011-06-15T20:29:43","slug":"how-to-set-up-a-security-key-for-a-wireless-network","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/how-to-set-up-a-security-key-for-a-wireless-network\/","title":{"rendered":"How to set up a security key for a wireless network"},"content":{"rendered":"<p>Personal information and files on your wireless network can sometimes be seen by  people who skulk around looking for open (non-secured) Wi-Fi networks. Today&#8217;s  wireless routers have much greater operating ranges (the distance the wireless  signal travels), and this means that someone 200-500 feet away (and sometimes farther) from your home  can access your connection. If they have the right kind of software installed,  they can intercept data coming from and going to your computer. How likely is  this? Not very likely, but there&#8217;s no sense taking a chance. If you&#8217;re on secure  server (https:\/\/) like a banking site or financial site, the snoop wouldn&#8217;t be  able to intercept the data being transmitted to the secure server or from the  secure server, except at the point of entry. Secure servers encrypt data with a  128-bit key that expires as soon as your session ends. It would take a hacker  using a brute force password cracking tool, trillions years to crack a key with  2 to the 128th power random characters. Since our universe is only 13 billion  years-old now, you really don&#8217;t have to worry about that. If you&#8217;re still around  in a few trillion years, drop EB a postcard, she&#8217;ll be in Restlawn.<\/p>\n<p>But leaving your Wi-Fi  connection open so that anyone can use it, isn&#8217;t a good idea. Data you transmit  can be intercepted, and if you&#8217;re sending private and confidential data, it can  be intercepted by anyone using a simple packet sniffer. (No, EB, that&#8217;s snifter  &#8211; Brandy Snifter &#8211; not &#8220;sniffer&#8221;).<\/p>\n<p>We&#8217;re providing the information below for WPA2 for Vista and Windows 7 users. And WEP for Windows XP users. If you secure your Wi-Fi network and  you won&#8217;t have to worry about that friendly stranger in the black sedan parked  just down the street &#8211; for the last 3 hours.<\/p>\n<p>In Windows Vista and Windows, the &#8220;Set Up a Network wizard&#8221; will guide you  through setting up a security key, quickly and easily. You can access the &#8220;Set  Up a Network wizard&#8221; by clicking: Control Panel\\Network and Internet\\Network and  Sharing Center and choosing &#8220;Set up a new connection or network&#8221; from the list &#8211;  then choose &#8220;Set up a new network&#8221;. Use the wizard to guide you through setting  up a security key for your home Wi-Fi connection.<\/p>\n<p>Encryption methods for wireless networks: There are currently three types of  wireless network encryption: Wi-Fi Protected Access (WPA and WPA2), Wired  Equivalent Privacy (WEP), and 802.1x. The first two are described in more detail  when using the wizard. 802.1x is typically used for large businesses and  therefore we won&#8217;t cover it here.<\/p>\n<p>Wi-Fi Protected Access (WPA and WPA2):\u00a0 WPA and WPA2 require users to  provide a security key to connect. Once the key has been validated, all data  sent between the computer or device and the access point is encrypted.<\/p>\n<p>There are two types of WPA authentication: WPA and WPA2. If possible, use WPA2  because it is the most secure. Almost all new wireless adapters support WPA and  WPA2, but some older ones don&#8217;t. In WPA-Personal and WPA2-Personal, each user is  given the same passphrase. This is the recommended security setup for home  networks.<\/p>\n<p><a href=\"http:\/\/www.yellowpipe.com\/yis\/tools\/WPA_key\/generator.php\">Here&#8217;s a  link to a WPA key generator<\/a> if you want a quick way to generate a random WPA  key.<\/p>\n<p>This information is for Windows  XP users whose computers have older adapters don&#8217;t support WPA or WPA2:<\/p>\n<p>Wired Equivalent Privacy (WEP) &#8211; WEP is an older network security method that&#8217;s  still available to support older devices, but it&#8217;s no longer recommended. When  you enable WEP, you set up a network security key. This key encrypts the  information that one computer sends to another computer across your network.  However, WEP security is relatively easy to crack.<\/p>\n<p>If after reading all of the above, you still want to use WEP shared key  authentication, you can do so by following these steps:<\/p>\n<p>To manually create a network profile using WEP shared key authentication:<\/p>\n<p>1.Click Control Panel\\Network  and Internet\\Network and Sharing Center<\/p>\n<p>2.Click Set up a new connection or network.<\/p>\n<p>3. Click Manually connect to a wireless network, and then click Next.<\/p>\n<p>4. On the Enter information for the wireless network you want to add page, under  Security type, select WEP.<\/p>\n<p>5. Complete the rest of the page, and then click Next.<\/p>\n<p>6. Click Change connection settings.<\/p>\n<p>7. Click the Security tab, and then, under Security type, click Shared.<\/p>\n<p>8. Click OK, and then click Close.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Personal information and files on your wireless network can sometimes be seen by people who skulk around looking for open (non-secured) Wi-Fi networks. Today&#8217;s wireless routers have much greater operating ranges (the distance the wireless signal travels), and this means that someone 200-500 feet away (and sometimes farther) from your home can access your connection. If they have\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/how-to-set-up-a-security-key-for-a-wireless-network\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/2191"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=2191"}],"version-history":[{"count":2,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/2191\/revisions"}],"predecessor-version":[{"id":2193,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/2191\/revisions\/2193"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=2191"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=2191"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=2191"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}