TAILIEUCHUNG - Wireless Networks dor Dummies phần 4

và để cho nhân viên của bạn kết nối. Tuy nhiên, có những cạm bẫy, ngay cả với cách tiếp cận này đơn giản. Bạn sẽ đặt các điểm truy cập? Quá nhiều Trang này sẽ yêu cầu người dùng nhập các thông tin của họ để truy cập e-mail của mình. | 102 Part II Implementing Your Wireless Network Choosing a fail-safe password Do not use any word in the dictionary. Any dictionary. Such passwords are probably the easiest to attack because all you need is a brute force attacking tool and a dictionary. This book doesn t have sufficient pages to go into the details of performing such attacks but numerous tools are available because your primary access to the logon process is through a Web page. That is why you don t want to allow remote access doing so makes it too easy for hackers to attack the device. So what should you do Use a combination of alpha a b c and numeric 1 2 3 characters. If your device permits special characters like @ you can combine these also to create an even stronger password. Although you can get carried away figuring out different passwords remember that you need this password to access the device in order to administer it. The good news is that if you forget the password all you need to do is physically reset the device and it reverts to its original settings. Check your owner s manual to learn how this is done. These devices allow for command line interaction. You do this using a program called Telnet or Secure Shell. We do not recommend using Telnet because the authentication password travels across the network in clear text and is therefore available to anyone with access to the network and a sniffer. Secure Shell is an encrypted method of access. Unfortunately setup and use of SSH takes more space than we are allowed for this book. You can read all about SSH at . Continue using the browser to finish creating a static WEP key. To set up WEP go to the Security page and follow the prompts. Your access point is now available for use on your network. Connect it as you would the SMC and begin enjoying the wonderful world of wireless. Testing the Signal Before you allow your users to connect you need to make sure that the placement of your wireless networking components remains .

TỪ KHÓA LIÊN QUAN
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.