How to Make Wirless Network SECURE

I am running my desktop hard line to a comcast modem which runs XP Pro. My Laptop which is running Vista is set up wireless via the WRT54GS Linksys Router.
The wireless network is running great but it is identified as UNSECURED!
After three 30 minute waits last night, 2 disconnects when I was not understanding them ( not a computer whiz but I do ok) and 1 live chat tech that copy and pasted the directions on how to set it up but not how to make it secure and then a quick disconnect    .
Can anyone tell me exactly HOW TO MAKE THIS NETWORK SECURED and WHAT computer shall I use to perform this?
Thank you for any help you can give me,
SWAT
JohnDoe sorry for violating any rules.
(Edited post for guideline compliance. Thanks!)
Message Edited by JOHNDOE_06 on 08-27-2007 11:04 AM
Message Edited by SWAT on 08-27-2007 11:13 AM

SWAT wrote:
Sbatch...you click on the pull down window to the settings.....I click on WPA then I input the code I wanted (only room for 1 code) then scroll all the way down to click on save settings.
That method does not secure my laptop wireless settings?
**No, that secures your router's wireless settings.
or
Is this the only method to secure the network?
With some investigation I can find have found the following:
If I right click on my Network Icon in my tool bar and then click Connect to Network and then right click on the Network and right click Properties I get a box with the following:
Tab for connection and a tab for security with pull down bars which can be changed...
1) Security Types -No Authentication (open), shared, wpa2 personal, wpa personal, wpa2 enterprise, wpa enterprise and 802.1x
2) Encryption Types -WEP
Current settings on my laptop Linksys wireless network security is
Security Type- OPEN
Encryption- NONE
sBatch when I perform the WPA on my desktop my laptop must be off or not on the network correct?
Doesn't matter, once you change the security settings onthe router, you will be prompted for the settings to reconnect to it.
Has anyone found the LinkSys hyperlink for setting the WRT54GS router as SECURED?
Define "secured".  Wired, only physical connection have access.
Wireless, once you add WPA or WEP (WPA is better) it's secured.
Sincerely,
SWAT
Does that help?

Similar Messages

  • Adobe pro 8: how to make an existing secure encrptyed form unfillable after editing

    Hello,
    as the discussion topic says.
    adobe pro 8: how to make an existing secure encrptyed form unfillable after editing?  Is it even possible to do in adobe pro 8?
    For work there's a secure and encrptyed form.  I want to write in the form and save it so it will be unfillable / uneditable.
    this form is not created by myself, and already secure and encrypted.
    I am aware that in other recent adobe pro versions on how to do this, since they have a " save as a copy" function in the file menu. (adobe 8 doesnt have)
    I've also tried printing as a PDF, but due to encryption of the form, that doesn't come out great.
    Upgrading to a recent version of adobe pro is not an option.
    I've also tried exporting as a picture files and then recombinding them to a pdf.  I dont like this method and find it time consuming.
    If possible please inform me of a way to solve this problem , step by step with adobe pro 8's features.
    or
    show me the equivalent method to how recent versions "save a copy" of a secure encrypted form on adobe pro 8.
    Thanks in advance for reading this thread and helping.

    Well after you use save a copy, and the security is disabled, you could then re enable security features and disable editing of the form.
    EDIT: I just tested , with a PDF is in secure mode, even using a "save a copy" feature wouldn't work.
    Would finding a program to desecure the pdf be a possible option?
    Or is there a way to copy the form (with all it's editable fields) and paste it as an unsecure pdf?
    You would then be able to make new security features.
    thanks for replying and viewing this problem.

  • How to locate my network security key

    I wrote this same request a month or so ago and can no longer locate my 'saved' message.  Would someone please forward me the link again on how to locate the network security key so I may add another computer to my wi-fi.
    And another question, will there be any change that more than one security key will appear and if so, how will I determine which key is the proper key to use?
    Thank you much.

    The "key" is another word for your normal wireless network "password", sometimes called a "pass phrase".
    The password generates a 64 character code of random letters and numbers. I doubt that this would be of any use to you, but if you want to see it.....
    Open AirPort Utility on your Mavericks Mac
    Click the AirPort icon, the click Edit
    Click the Base Station icon at the top of the screen
    Click Show Passwords
    More likely, you have a Windows Firewall issue, or Microsoft Security Essentials...if installed....is blocking the connection.  The anti-virus program can do the same thing.

  • How to find my network security key

    I recently installed Windows 7 on my MBP (OS Mavericks). I am trying to make a connection from Windows to my home network (Airport Extreme). When I do so, I'm asked for the "network security key." How do I find that? I've searched everywhere I know how, to no avail. My network works fine w/ my MBP running Mavericks. Can someone help me?

    The "key" is another word for your normal wireless network "password", sometimes called a "pass phrase".
    The password generates a 64 character code of random letters and numbers. I doubt that this would be of any use to you, but if you want to see it.....
    Open AirPort Utility on your Mavericks Mac
    Click the AirPort icon, the click Edit
    Click the Base Station icon at the top of the screen
    Click Show Passwords
    More likely, you have a Windows Firewall issue, or Microsoft Security Essentials...if installed....is blocking the connection.  The anti-virus program can do the same thing.

  • How to make Singleton Class secure

    I have a Singleton class which I instantiate using reflection by a call to a public getInstance method that return the object from a private constructor. I have to use reflection as I dont have any other options since my class instantiation is decided on runtime. How will I secure other form instantiating the same class again by using reflection on my private constructor? Any ideas?

    How much do these different implementations of your singleton have in common? What I'm getting at is, is there some common code you could extract out of them all, and make that a singleton in it's own right? Needing to do this sort of hacking is often a sign you're fudging something together, that could be solved more elegantly. We use the Singleton pattern generally when the state of the object needs to exist exactly once. Can you extract that from the disparate objects?
    The singleton classes that I load do not have anything in common. They are all similar but unique, and independant in their own respect. I will have to decide only on what singleton object I have to load in runtime, based on certain criterion. This is done by reflection, by a call to the public getInstance() method of the respective singleton classes, since I am deciding on runtime. My problem is that can I prevent others from accessing my private constructor from outside the class using reflection, which enables them to create another duplicate object. Can I restrict them to use only my getInstance() method instead?? I know this is hacking to access the private members, but I want to know whether there is any way where I can restrict this hacking???In the above code I dont want these statements to work at any case
    java.lang.reflect.Constructor[] c = cl.getDeclaredConstructors();
    c[0].setAccessible(true);
    A anotherA  = (A) c[0].newInstance(new Object[]{"Duplicate"});

  • Z87-GD65 - how to make E2200 network port active in S5 system power state?

    My question is how do I make the E2200 network port active in the S5 system power state on the MSI Z87-GD65 motherboard?
    I require Wake on LAN (magic packet) for my computer but after shutdown the network port is inactive hence the WOL packet can not wake the computer. I have checked and activated the following items:
    On the motherboard
    - EuP 2013 = disabled
    - Resume by PCI-E device = enabled
    In Windows 8.1 E2200 network port settings
    - Wake on Magic Packet = enabled
    - Energy efficient network = disabled
    After I shutdown (power state S5) the network port activity lights go dark so I assume the port has shutdown as well. On my previous Gigabyte motherboard the network port stayed active allowing WOL packets to be transmitted to turn on the pc. Have I missed a setting on this new motherboard? My workmate also bought the same motherboard and has the same issue.

    Success!   
    MSI support responded and listed the correct settings and it is working!
    So the correct settings are:
    In the motherboard BIOS:
    - LAN Option ROM = Enabled
    - EuP 2013 = Disabled
    - Resume by PCI-E device = Enabled
    In Windows 8.1 E2200 network port settings:
    Under Power Management:
    - Allow this device to wake the computer = ON
    - Only allow a magic packet to wake the computer = ON
    Under Advanced:
    - Energy Efficient Ethernet = Disabled
    - Shutdown Wake Up = Enabled
    - Wake on Magic Packet = Enabled
    All working fine now. All I was missing was the "Shutdown Wake Up" setting. I hope this helps anyone else who has this excellent motherboard.

  • How to make bpel process secure?

    Currently, I have a bpel process that can be accessed by anyone who knows its endpoint. I now need to add some basic authentication to ensure that only authenticated users access the BPEL process. I am thinking about using the http basic authentication but I don't know how to set it up in bpel. I don't know whether or not I can add the web.xml and sun-web.xml files to the bpel process to set up the security constraint like web applications. Does anyone know how to do it?
    thanks

    You can find useful information here
    http://wiki.open-esb.java.net/Wiki.jsp?page=HTTPBasicAuthentication

  • How to make a network with my ImacG3 700 and my PC

    Please
    I want to link my G3 700 and my Pc to store iMovie files and burn DVD on it, because i have only CD on my Mac;
    Is it possible to share screen (iMac) with PC or is it necessary to have both?
    If somebody on this site is french or french speaking it will be more understable for me.
    thanks in advance

    Thank you for the link you provide me.
    It seems usefull
    I have now to go into the detailed process and I will come back soon, after implementation.
    Bye

  • I have unlocked iphone 5.i tried to use it with tmobile.it shows full network but fails to activate and shows sim invalid.how to make it work?

    i have unlocked iphone 5.i tried to use it with tmobile.it shows full network but fails to activate and shows sim invalid.how to make it work?

    Who was your original carrier; did you call them to ask them to unlock your phone, and are you aware of what their unlock policy is (THey may only unlock for international sims and not US sims

  • How to make adf security?

    Dear all
    How to make adf security?
    I am new adf security.
    I'm facing security issue. Now i need to secure me application (User, Group, Role etc...)
    Oracle recommend me use WebLogic internal LDAP or OID. How to manage User, Group, Role deploy after?
    Thanks Lhagva

    Hi,
    once you deployed an application, users and roles are no longer in the domain of ADF Security. So the administration is
    WLS console - if users and groups are in the WLS LDAP
    Identity Management - if users and roles are in OID, RDBMA, Active Directory etc.
    Enterprise Managers - to manage application roles and granting permissions or application roles to enterprise groups
    Frank

  • HT201270 MORNING COMMUNITY, anyone know how to make the i4s forget a network - when the device won't give you that option?

    MORNING COMMUNITY, anyone know how to make the i4s forget a network - when the device won't give you that option?

    if you dont have the options to forget network you can reset your network settings, but than the device forget all networks
    settings > general > reset > reset network settings

  • How to make the WTR 610N external (USB) storage port my network common BackUP point..

    My networked PC's (XP Pro & VISTA Ultimate OS's) are set up to share those Folders & files I've selected for BackUp.  I intend to connect a 600 Gb ext HD to my WTR 610N Ext Storage port.  I hope a simple instruction (Move to...;Copy to...; even  Point & drag) will suffice to create the BackUp.  What commands should I use to select location and name of that special BackUp port.?

    How to Make my Macbook Pro's internal HDD external, when I get a SSD?
    Get an externel enclosure at the same time.
    You can order from OWC
    http://eshop.macsales.com/shop/hard-drives/2.5-Notebook/
    Put the SSD in the externel enclosure and use something like Carbon Copy Cloner,  to clone the internal drive and all it content to the SSD.  Then swap them out.
    Always good to have more than one backup.

  • Secured wirless network question

    hi
    Can I access a secured wirless network by any chance?
    thanks

    If I understand your question correctly.....NO. Accessing a secured network "by chance" is almost impossible. Now can some one access a secured network..... Maybe. Secured networks are protected by a password and if the password can be obtained then your in, however passwords on networks are highly encrypted. It would be a lot of work so some one would probably have a darn good reason to want in.

  • How to make form based authenticaiton in adf security?

    Hi all
    How to make form based authenticaiton in adf security?
    help give example video or project.
    Thanks lhagva

    Have you read the docs (http://download.oracle.com/docs/cd/E17904_01/web.1111/b31974/adding_security.htm)?
    Timo

  • I forgot the answers to my security questions... and I don't know how to make a rescue email address. pls help!

    how do I make a rescue address? and also how do I reset my security questions?

    You need to ask Apple to reset your security questions; this can be done by clicking here and picking a method, or if your country isn't listed, filling out and submitting this form.
    It isn’t possible to create a rescue email address without supplying two of the answers. They wouldn't be security questions if they could be bypassed without Apple verifying your identity.
    (109040)

Maybe you are looking for

  • Oracle Workflow 2.6.4 Migration

    Hi, One of our customer wants to migrate Oracle Workflow 2.6.4 from http server to WLS server and they are following the this blog : https://blogs.oracle.com/warehousebuilder/entry/owb_11gr2_tip_downloading_and_installing_workflow_monitor_264 Now the

  • Airport Extreme set up with Time Warner

    OK. I am experiencing a similar problem as mentioned in a differnt thread, but a bit different. First my Airport Utlility is 6.3.1 so the graphics for settings are completely different.  I have an ATV2, Black Mccbook and Ipad2. My problem is when I t

  • Error message: cannot remove older versions of apple software update

    I recently got a 30 gb ipod, and i cant install itunes 7. I originally tried installing it at first, and it said cannot remove older applications of Apple Software Update. So i installed itunes 4 to put music on my ipod. Then i tried again to install

  • AR02-Asset Historysheetreport -001 Ordinary depreciation positive in are 01

    In AR02 -Asset History sheet report,we are getting the below error displayed for few specific assets  .The asset values  are displayed in correcltly till October and however in December 2009. it shws correct values. The message displayed :     001 Er

  • SAP-ABAP LSMW

    Hi Experts, I have done a few objects in LSMW, but I am not very clear about the need of Project, Subproject and object in LSMW. My question is generally what is a project , subproject and object of LSMW? and what are the differences between each one