Jump to content
The mkiv Supra Owners Club

Anyone good with Belkin wireless routers ?


MichaelG

Recommended Posts

:cool: Evening all

 

My uncle has asked me to secure his wireless router for him this weekend, as its currently open for anyone to access in the close proximity.

 

I have a D-Link one myself, and know how to do this, but cant for the life of me remember what to do, especially with a BELKIN one :search:

 

Does anyone know the basic steps i need to do on the \ a Belkin to security enable the connection ? i.e. Password protect it so nobody else in the street can latch onto his internet connection ?

 

Much appreciated

 

Cheers

 

Michael

Link to comment
Share on other sites

Care to explain.

You can sniff packets and obtain the MAC addresses on a network then apply that MAC address to your own network adapter (or virtual adapter).

 

Techniques commonly available to discover on the net. Here's a description I found from typing "MAC spoof" into google very quickly just now. http://www.rootsecure.net/content/downloads/pdf/wlan_macspooof_detection.pdf

 

Admitedly you'd have to be pretty knowledgable to do this, or even want to bother.

Link to comment
Share on other sites

Just use WPA like Pete says. Why piss around with MAC filter tables and adresses that you have to modify and track down everytime a friend comes around and wants to use the wireless? Why do that which is (significantly) less secure, when the best way is also the easiest?

 

WPA-PSK for sure. No silly retraints on length of passphrase, and no messing around with ASCII to HEX convertors (because the passphrase generators in the routers don't do what the user expects..).

 

Just make sure you either have SP2 installed on XP machines, or use the card's provided wireless utility to make the connection if you're on an operating system that doesn't support WPA natively.

Link to comment
Share on other sites

Four steps to wireless security:

1: Do not broadcast your SSID

2: Use MAC access control

3: Use encryption (WEP acceptable, WPA-PKA/TKI prefered) with a strong encryption key (don't use your name)

4: Firewall your laptop.

 

Some basestations allow you to manually register permitted devices, which will prevent access by any low-tech war-drivers.

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Restore formatting

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue. You might also be interested in our Guidelines, Privacy Policy and Terms of Use.