Basic Wireless Security Settings
- Please visit us on Facebook ! If you need help setting up, consider that 1.3 billion active users on Facebook and the number keeps growing. !
- 80% of the Fortune 500 are on Facebook, 83% have corporate Twitter Accounts !
- Americans spend more time on social media than any other major internet activity, including email !
- Facebook reports that the average American now spends 40 minutes a day checking their Facebook feed !
- MicroNet open in 1996, when Dos was the lattes operating system !
- Managing your reputation in social media is very important !
ASUS Wireless Routers
The RT-N12 D1 Wireless-N300 router delivers reliable and fast speeds on both wired and wireless network connections for your home or office environment. With 2T2R MIMO technology and two detachable 5dBi high-gain antennas, the RT-N12 uses the latest antenna innovation for extended wireless coverage range making it ideal for streaming HD video, placing VoIP calls, and performing other essential internet tasks..
ULTRA Etorque™ A5 Mid-Tower ATX
Protect your essential PC gaming components inside this durable ULTRA Etorque™ A5 Mid-Tower ATX Gaming Case. The framework of this ATX mid-tower case allows you to install four 5.25in hard drives exposed, six 3.5in hard drives(1x 2.5" Internal, converted from a 5.25" bay), with a built-in SATA HD Dock. The enclosure supports a 403mm max VGA card while in the rear of the case are seven PCI slots to utilize.
Current News Windows 10
Today I had the honor of sharing new information about Windows 10, the new generation of Windows. Our team shared more Windows 10 experiences and how Windows 10 will inspire new scenarios across the broadest range of devices, from big screens to small screens to no screens at all. You can catch the video on-demand presentation here.
Windows chief Terry Myerson acknowledged that Windows 10 is collecting personal information about its customers to enable some of its best features, including the Cortana virtual assistant. It also collects information about your computer's performance to detect and correct potential bugs.
Wireless security is a hot topic these days, and different advice abounds. Here's a short checklist to make sure you have the basics covered:
- Use vendor-supplied security -- Since the capabilities of each wireless router/access point/bridge differ from brand to brand, it's best to get the vendor's recommendation on the best security options for their devices.
- Change the default admin password of your wireless router/access point/bridge -- Once a potential attacker detects a wireless network, this is one of the easiest ways to further compromise it.
- Turn down the power -- Some vendor's wireless router/access point/bridge's offer the option of changing the power settings so that your wireless network is not broadcasting its signal farther than you really need it to.
- Use Media Access Control (MAC) address filtering and Wired Equivalent Privacy (WEP) -- MAC address filtering will help restrict access to your home wireless network to only those users you authorize. If WEP is the only security option available on your wireless router/access point/bridge, use a key that is hard to guess and change it periodically.
- Consult MicroNet about antenna positioning -- Different antennas radiate signal in different patterns. Check your vendor's documentation to verify optimal antenna positioning for your wireless network.
- Change SSID and, if possible, disable SSID broadcast -- Your wireless router/access point/bridge may come with a default SSID already configured. Change it as soon as you set up your wireless network. Also, some vendor's may offer the option of not broadcasting this network identifier.
- Keep your wireless router/access point/bridge firmware up to date -- New firmware can help resolve compatibility problems, plug security holes and provide other important fixes. Check with MicroNet for these updates.
- Use a VPN for working at home -- For enterprise users working at home, always check with your enterprise IT department or help desk for best practices regarding accessing the company network over your wireless home network. Often, virtual private network (VPN) software is required for this purpose.
- Keep your antivirus software up to date -- Viruses, worms and Trojans are a continuous threat. Make sure your wireless network is not a haven for these problems.
- Use a firewall -- Either a hardware or software firewall can help protect your computer and the rest of your network from attack.
If you need further assistance please contact us, we will be happy to assist you.