[X]   Directory of
Guides & Reviews

Beginners Guides
Motherboards by Brand
Weekly Newsletter
Archived Newsletters

+70 MORE Beginner GUIDES....
Beginners Guides: Securing A Wireless Network
Beginners Guides: Securing A Wireless Network - PCSTATS
Modern wireless networking products are inexpensive, simple to set up and very convenient. They are also full of holes... security holes, that is.
Filed under: Beginners Guides Published:  Author: 
External Mfg. Website: PCSTATS Jul 30 2007   M. Dowler  
Home > Reviews > Beginners Guides > PCSTATS

Checking Ports and Workgroups

Now examine the results for IP addresses generated by the port scanning, and computers that do not fit your notes.


The 'net view' command can be used to locate computers within the same workgroup as the computer the command is run on. A workgroup is a simple logical grouping of computers used by Windows. All Windows systems belong to the 'workgroup' workgroup by default, so the 'net view' command can be very useful in finding out which computers are currently attached to the network.

To use net view: Open the command prompt (start/run/'cmd'). At the prompt, type 'net view'


This will bring up the names of all computers attached to the network that belong to the same workgroup as your system.

If your PC belongs to a different workgroup, you can change the net view command to search for computers in other workgroups by typing Net 'view /domain:(the workgroup name you wish to search)'. Scanning, as mentioned above, is a more reliable method than net view however.

The Airsnare program is another excellent wireless (and wired) intrusion detection program offered as freeware at this site. It can be rather complicated to set up though, so we will not cover it further in this article. Instructions can be found on the website for its use.

Checking your router logs and connections

This is an important step, but difficult to detail since it really depends on your hardware. Most home routers will keep some sort of log file of recent connections and connection attempts. Some will also log common 'bad' or unwanted Internet traffic such as someone attempting to use a port scanner against your router's IP address.

Routers will also generally keep a list of the systems they have given IP addresses to, which would indicate whether you have any unwanted guests on your network.

< Previous Page © 2023 PCSTATS.com
Please respect the time and effort that went into creating each PCSTATS Beginners Guide, do not illegally copy. Thank you.
Next Page >


Contents of Article: PCSTATS
 Pg 1.  Beginners Guides: Securing A Wireless Network
 Pg 2.  Network Security vs. Wireless Security
 Pg 3.  Finding Intruders on a Network
 Pg 4.  — Checking Ports and Workgroups
 Pg 5.  Checking Router Logs
 Pg 6.  Managing Network Shares
 Pg 7.  Personal Firewalls
 Pg 8.  Using Zonealarm
 Pg 9.  Securing a Router and Wireless Connection
 Pg 10.  More Steps to Securing a WLAN
 Pg 11.  Disabling DHCP on a WAP
 Pg 12.  Wireless Protected Access: WEP Improved

Hardware Sections 

PCSTATS Network Features Information About Us Contact
PCSTATS Newsletter
Tech Glossary
Technology WebSite Listings
News Archives
(Review RSS Feed)
Site Map
PCstats Wallpaper
About Us
Privacy Policy
Advertise on PCSTATS

How's Our Driving?
© Copyright 1999-2023 www.pcstats.com All rights reserved. Privacy policy and Terms of Use.