PCSTATS Main Page Follow PCSTATS on Facebook PCSTATS RSS Feed PCSTATS Twitter Feed + Motherboards
+ Videocards
+ Memory
+ Beginners Guides
News & Advanced Search  Feedback?
[X]   Directory of
Guides & Reviews
The PCstats Forums

Beginners Guides
Weekly Newsletter
Archived Newsletters

+70 MORE Beginner GUIDES....  
 
Contact the Suite 66 Advertising Agency
Beginners Guide: How To Install / Remove an Intel Socket LGA2011 CPU

Beginners Guides: Securing A Wireless Network

Beginners Guides: Securing A Wireless Network - PCSTATS
Price Check: $/£/€
Abstract: Modern wireless networking products are inexpensive, simple to set up and very convenient. They are also full of holes... security holes, that is.
Filed under: Beginners Guides Published:  Author: 
External Mfg. Website: PCSTATS Jul 30 2007   Mike Dowler  
Home > Reviews > Beginners Guides > PCSTATS

Checking Ports and Workgroups

Now examine the results for IP addresses generated by the port scanning, and computers that do not fit your notes.

PCSTATS

The 'net view' command can be used to locate computers within the same workgroup as the computer the command is run on. A workgroup is a simple logical grouping of computers used by Windows. All Windows systems belong to the 'workgroup' workgroup by default, so the 'net view' command can be very useful in finding out which computers are currently attached to the network.

To use net view: Open the command prompt (start/run/'cmd'). At the prompt, type 'net view'

PCSTATS

This will bring up the names of all computers attached to the network that belong to the same workgroup as your system.

If your PC belongs to a different workgroup, you can change the net view command to search for computers in other workgroups by typing Net 'view /domain:(the workgroup name you wish to search)'. Scanning, as mentioned above, is a more reliable method than net view however.

The Airsnare program is another excellent wireless (and wired) intrusion detection program offered as freeware at this site. It can be rather complicated to set up though, so we will not cover it further in this article. Instructions can be found on the website for its use.

Checking your router logs and connections

This is an important step, but difficult to detail since it really depends on your hardware. Most home routers will keep some sort of log file of recent connections and connection attempts. Some will also log common 'bad' or unwanted Internet traffic such as someone attempting to use a port scanner against your router's IP address.

Routers will also generally keep a list of the systems they have given IP addresses to, which would indicate whether you have any unwanted guests on your network.

< Previous Page © 2014 PCSTATS.com
Please respect the time and effort that went into creating each PCSTATS Beginners Guide, do not illegally copy. Thank you.
Next Page >

 

Contents of Article: PCSTATS
 Pg 1.  Beginners Guides: Securing A Wireless Network
 Pg 2.  Network Security vs. Wireless Security
 Pg 3.  Finding Intruders on a Network
 Pg 4.  — Checking Ports and Workgroups
 Pg 5.  Checking Router Logs
 Pg 6.  Managing Network Shares
 Pg 7.  Personal Firewalls
 Pg 8.  Using Zonealarm
 Pg 9.  Securing a Router and Wireless Connection
 Pg 10.  More Steps to Securing a WLAN
 Pg 11.  Disabling DHCP on a WAP
 Pg 12.  Wireless Protected Access: WEP Improved

SEARCH PCSTATS 
Use the power of Google to search all of PCSTATS and the PCSTATS Forums. Tell us what you think of this new feature - FEEDBACK?
   11 / 01 / 2014 | 5:30AM
Hardware Sections 


google
 
PCSTATS Network Features Information About Us Contact
FrostyTech
TransmetaZone
BeginnersPC
PCSTATS Newsletter
PCSTATS Forums
ShoppingList Assistance
Tech Glossary
Technology WebSite Listings
PermaLink News
Archived News
Submit News (Review RSS Feed)
Site Map
PCstats Wallpaper
About Us
Employment
Privacy Policy
Advertise on PCSTATS

How's Our Driving?
© Copyright 1999-2014 www.pcstats.com All rights reserved. Privacy policy and Terms of Use.