Monday, July 14, 2008

Connecting Your Secured LinkSys WRT54GC To Your Windows XP Laptop Or Desktop

If you followed along with the first article, then you are ready to set-up your PC to access the secure wireless connection.

This article does not go into hardening your PC against other threats, you should always make sure you are using a firewall, virus scanner and/or spam blocking software.

Now that you have successfully configured your LinkSys WRT54GC the next step is to configure your PC so that you can access the secured connection.

This is easy to do, and only requires a few additional steps.

First you should have an icon on your status bar that looks like a computer - it shows the wireless network connection. When you move your mouse over top of it, you should see the wireless information for the connection.

Since your connection will not be established, there may be an X or SLASH through the icon. Not to worry, setting up this connection is very easy.

First step is to double-click on the icon. This will bring up the WIRELESS NETWORK CONNECTION STATUS window.

Next on this window, click on the PROPERTIES button. This will display another window that reads WIRELESS NETWORK CONNECTION PROPERTIES on the window bar.

Click on the tab that reads WIRELESS NETWORKS.

Since your network should already be set-up, you can highlight the entry and click on the PROPERTIES button - it will light-up once you select your network.

On this screen and this tab (marked ASSOCIATION) there will be several fields, one of which is called Network name (SSID). This field is not accessible, but will list the name of your network.

Then there is another block of options under WIRELESS NETWORK KEY. This is what you need to update in order to access your secured wireless network.

The first item is the NETWORK AUTHENTICATION. Provided youve kept your PC updated and have all the latest updates and patches, when you click on this list box you will have several options available to you: OPEN, SHARED, WPA and WPA-PSK.

Select the one that you used on your LinkSys WRT54GC wireless access point. Chances are if you followed part 1 of this article then you should select WPA-PSK.

Next you will select the DATA ENCRYPTION method. Choices available to you will be: TKIP or AES.

Once again you will select the one which you selected on your LinkSys WRT54GC wireless access point. TKIP and AES are both as strong, however AES may slow down your internet connection from your PC to the access point since it goes through more encryption methods.

In my experiences I have noticed that when I use TKIP I retain a 108 Mbps speed to the access point, whereas with AES it drops in half to 54 Mbps. However Ive decided to stay with AES.

Once you have selected the appropriate DATE ENCRYPTION method the next step is to select the NETWORK KEY and enter this into two spots: NETWORK KEY and CONFIRM NETWORK KEY.

The network key is the SAME key you entered into your wireless access point (the LinkSys WRT54GC). If this is a long string and youve saved the string (not recommended for long-term, only during your initial set-up and configuration) then you can simply CUT the string from the document and PASTE it into the required fields! Otherwise you will need to manually type in the 63 character string - which may not be an easy task to complete.

Enter the string into the required fields - NETWORK KEY and CONFIRM NETWORK KEY then click on the OK button.

When the previous window opens up (WIRELESS NETWORK CONNECTION PROPERTIES) click the OK button again.

Finally click CLOSE on the WIRELESS NETWORK CONNECTION STATUS.

It may take a few seconds to a few minutes for your PC to synchronize to the access point, however once it does you will be able to surf the web securely between your PC and your access point. As well, it will be very difficult for the average individual to hack into your wireless connection and steal your broadband access!

It really is that simple, that everyone should be protecting their wireless connection. Not only are you ensuring nobody can use your broadband access, but data that is sent between your PC an the access point is secured as well - you wont be sending out your account details un-encrypted anymore just waiting for someone with the smarts to capture that data and use it for their own means.

Before we finish, would you like to see how many secured or unsecured connections are in your area? Yes, you can see this easily with Windows own tools. Double-click on the icon we mentioned earlier in this article. This will bring up the WIRELESS NETWORK CONNECTION STATUS window.

Click on the VIEW WIRELESS NETWORKS button.

If youve done everything correctly you will not see your connection in the list but you will see all the other connections around you (for those individuals that did not disable the broadcast of their SSID) plus youll be able to see who has encrypted their connection fully and who is using basic encryption.

Those that are using WPA or stronger - those will be tough to crack or hack into. Those that are not - with the right tools (all available freely over the Internet) you could access their wireless connection with a bit of work and steal their broadband access (though I highly recommend that you do not).

Setting the appropriate security measures is very easy, and just common sense. Like you would not leave your bank statement in a public place - you should ensure that your computer(s) are secured to prevent your private information being given to the public.

Get more information about adware, spyware, malware and viruses plus information on wireless wifi theft and securing your wireless connection at http://www.free-adware-spyware-virus-removal.com

Streamyx
Streamyx Entry
Streamyx Soho
Streamyx Packages
Streamyx Business
Streamyx Corporate
Streamyx
WIMax
Streamyx Speedometer
Streamyx Self Installation Guide
Streamyx Combo 140
Streamyx Registration
Streamyx Combo
Streamyx Combo 160
Broadband Malaysia

How To Find That Private Number That Just Called Your Phone

Are you fed up with the recent increase in the number of calls from a private number? Are you getting calls from them at all times - day, noon, or night? If this is the case then you need help, professional help. No, we are not talking about detectives, which was probably the only way of finding out more about the mysterious callers from private numbers. We are talking about a reverse phone directory, which is better than a detective is and does not pinch your pocket.

You are not the only one who gets calls from private number, there are many more people out there who share the same concerns as you do. Most of them have tried and found relevant information regarding these by using the services of a reverse phone directory. It is time you tried one too. This is probably one of the salient points of the internet revolution. You do not have to go anywhere to find information - it is available right there and you can browse through as many reverse phone directories as you want from the comforts of your home.

When you are choosing a reverse phone directory service, you need to choose a reliable provider. Just any provider will not do because there are certain services who offer free access while others offer paid and both the providers might be unreliable. So you need to first browse through the internet to find more about the various services available and how popular they are. Checking the Google Rank for the website can also help because Google works hard to remove spam and un-reliable websites. Plus, higher ranking translates into higher web traffic. It basically means that there are more people visiting that particular site. This makes a particular website reliable to an extent.

Most of the reputable reverse phone directory services charge a small fee because finding information regarding private and unlisted numbers is never easy. So there is a cost attached to bring you this information and it is minimal. The good part is that you will never have to remain in dark regarding the caller from a private number. Just make your payment at the reverse phone directory website and access their services. Enter the area code followed by the seven digit private number and within seconds, you will get all the necessary information regarding them including owners name, current and previous address, neighborhood, locality, state etc. You don't have to be in the dark anymore and you don't need to burn your midnight oil thinking about the mysterious caller: with a reverse phone directory, you will get a name!

John Wood has written many articles reviewing the various reverse cell phone lookup services available on the internet. You can start your own free reverse phone numbers search and read more articles at his site Reverse Cell Phone Directory.

Streamyx
Streamyx Home Basic
Streamyx 512k
Streamyx Combo 1MB
Streamyx Combo
Streamyx Petaling Jaya
Streamyx
Streamyx Tmpoint
Streamyx Packages
Streamyx Packages
Streamyx Combo 60
Streamyx Combo 90
Streamyx Promotion
Streamyx Combo 90
Streamyx