Network Security - Need a recommendation

Hi there!
I'm currently running a wireless network in my apartment that is passworded on a regular bare bones LinkSys router. Currently I have both my PC desktop and my MBPro on this network. Both are running just fine.
What I am concerned about is people in the apartment complex using my network. I know I could bump up the security on my router but what I really want is a program that lets me A) see the IP's of people connecting to my network, if any, and B) single them out and block them. I have no idea whether such a program exists for Leopard. I'm actually fairly computer-savvy, but network security is a new arena for me.
I'm just wondering if anyone could recommend a program to use that is only moderately complex. Also, I'm willing to pay money, but free is always better. Or any other information would be great, e.g. if the MBP already has the propensity for this type of activity on its own. I know it does a great many things .
Thanks for any help!
Message was edited by: demosthenes_

demosthenes_ wrote:
A) see the IP's of people connecting to my network, if any
Your router should provide this via the web based administration interface.
B) single them out and block them
In stead of monitoring the router for rogue connections, you could setup your Linksys router to perform MAC address filtering. MAC Address filtering involves setting up a whitelist of MAC addresses that can connect to the router and any MAC address that isn't in the list you can explicitly deny access.
What you would need to do is to add the MAC address for each device you have that you want to connect to the network.
To be honest though, if you're at all concerned about the security of your data, http traffic, if you do any online banking, shopping etc you should really enable the encryption features of your router. With the way you have things setup at the moment, even with MAC Address filtering enabled your wireless connection can still be snooped on which means your passwords, account numbers etc are potentially travelling in the clear over the airwaves.
Personally I would just configure the router to use the highest encryption level that all your computers can support and secure the Wireless network with a 10+ digit authentication key (utilising alphanumeric, punctuation and number characters). Doing this will ensure that your network is secure and minimise the risk of someone getting hold of any sensitive data.

Similar Messages

  • Need my wireless network security key

    I got a laptop and a kindall.  Wanted to connect them to my wireless network.  A screen asks for the wireless network security key.  I have no idea what that is.  Went to home computer and tried to copy the key, but I ended up deleting it and now can't connect to my wi-fi on that either.  I  attempted to restore computer to earlier date in hopes I could get back the code that was set up and when that didn't work, I set the router to default mode by using a pen to hold in button in back 10 to 15 seconds.  Nothing has work, and I have no internet connection.  I had to use my computer at work to type this.  What can I do?

    You must hard reset the router by pressing and holding the reset button in back for 30 seconds and release.  Wait 10 seconds and power cycle the router.  Connect via your browser with a wired computer to 192.168.1.1 username blank, password 'admin'.  Now configure the router back to your settings with your new SSID and password.  Once done change all your computers to  the same password.  Write the password down and tape it to the router.

  • Network security:LAN manager authentication level setting on GPO

    Hi,
    We have a requirement from project team to change the one of the security setting on default domain policy for all computers in domain. Below are the security setting which we need to modify.
    computer configuration-->windows settings-->security settings-->local policies-->security options-->
    Network security: LAN manager authentication level 
    this setting need to be changed to - Send LM & NTLM - use NTLMv2 session security if negotiated.
    The project team facing issue with Apache web server and they found the solution on below link.(we have tested this  by changing local group policy and this solution works as expected)
    https://www.sysaid.com/Sysforums/posts/list/9065.page 
    We need to know what is the impact after enabling this on domain computers.
    Need help on this to go-head on this.

    Hi,
    you have a weaker domain security overall. "
    LM Hash Generation 
    The algorithm introduces several weaknesses that attackers can exploit. First, all lowercase characters are set to uppercase, reducing the number of possible characters. Second, it splits a long, strong, password into two seven-character chunks.
    Both the LM and NTLM protocols operate essentially the same way; the only difference is the password hash.
    REF: The Most Misunderstood Windows Security Setting of All Time
    This post is provided AS IS with no warranties or guarantees, and confers no rights.
    ~~~
    Questo post non fornisce garanzie e non conferisce diritti

  • Portege R700 PT311A - Network Adapter needs to be installed

    My Toshiba Portg R700 (PT311A-06600Q) will not connect to the internet.
    It says that a Network Adapter needs to be installed and configured, but I do not have the disc to do this, nor do I have an internet connection on my laptop to download the driver.
    I have attempted to download the driver onto a USB, using another laptop, then using that USB, I have tried to install it onto the problem computer, but it won't install.
    There is no Windows installed on the problem computer, may this be an issue as to why the driver won't install?
    Help me, please!

    Hi
    I hope you picked up the right driver.
    Not quite sure if you are talking about LAN driver or WLan driver and what Windows system you are using but fact is that all drivers for this unit can be found here:
    http://www.mytoshiba.com.au/support/download
    I would recommend you to check once again if you downloaded the proper driver. Then move the driver package to the notebook (desktop). Unzip the package and execute the setup or install exe file.
    In case you would not find any exe files in the package, I would recommend you to install the driver within the device manager.

  • Officejet 6000 wireless and WPA2-Enterprise network security

    I own an Officejet 6000 wireless printer. The manual says that it should be compatible with a wireless network with WPA2-Enterprise network security but when setting up the connection (I am using a macbook and am setting the printer up via usb connection) the newtork is listed but the security type is "unsupported." For whatever its worth it is listed 5 or 6 times but probably thats a different issue.
    I can still select the right network but it only asks for a security key, but my network security requires a log-in name and password.
    What can I do to get my printer connected to the network?

    I get the feeling that most of the people replying here don't know the difference between WPA2-Personal and WPA2-Enterprise.
    Personal has a passkey.
    Enterprise uses both a username and password, usually in conjunction with a Radius server (802.1X athentication).
    What we've had to do solve this problem is create a second SSID on the network that authenticates on WPA2-Personal. We use a really long password to secure the network, one that I will never be able to memorize in my lifetime.
    All we can hope for is that these enterprise-level vendors will, perhaps, gain a greater understanding of wireless authentication processes and the needs of actual enterprise customers who at least a percieved need for wireless printer capabilities. It used to be that customer was always right, though. Perhaps those days are gone...
    The other problem that probably ought to be addressed on consumer end is the fact that multicast tools that make AirPrint work (such as Bonjour), are being blocked from crossing between your wired and wireless networks, perhaps by the wireless controller or due to inefficient routing hierarchy or NAT/PAT issues. Solve this issue and you won't have a need for wireless printers.

  • Help: network security question

    I just bought a PowerBook G4 running OSX 10.4.5 and was wondering about network security. What are some good anti-virus protection programs? I was searching the Apple store and found Net Barrier X4 and Virus Barrier X4 by INTEGO. What is the difference between the two? Are there other programs out there that are better? I will be the only person using this computer and it's for personal use, not business. Does anybody have any recommendations?
    powerbook G4   Mac OS X (10.4.5)  

    What you mention anti virus software programs. In your topic it reads "network security question"
    There is a difference between the two. Network security would be protecting a local LAN or WAN home network used for gaining access to the net. If this is what you want to do then you should have your network WEP or WPA password protected and enable OS X's personal Firewall by going to System Preferences->Sharing->Firewall->Start Firewall. Some good tips to remember are:
    * Never leave your network unlocked.
    *Keep your network password complex (12 digits and letters).
    *Don't hesitate to tell your ISP if someone is "using" your Network.
    *If you see any unknown files don't open them!
    Now if your were talking about a Software virus that affects your computer and causes it to malfunction/crash/break Then you don't have very many worries as there are no "Real" viruses for the Mac right now other then two worms, one which is spread via iChat and the other Bluetooth, both causing you to open them and give your Admin password to run them
    In other words moral of the story is don't open unknown files/programs and don't give your Mac your password unless you know what it's for and why it's asking.
    Net barrier acts as a firewall with more options all though I have found it to cause trouble with my network and have stopped using it.
    Virus Barrier, attempts to keep viruses from affecting your OS by scanning for them and warning you if it finds one and delete them. Once a again two different types of software.
    -Internet Wiz

  • SAP BO network security

    Hi,
    I need to raise network security in SAP systems.
    We already have SAP ERP systems and they all hidden behind saprouter in other subnet.
    But what about SAP BO?
    SAP BI platform server, FC, Intercompany, FIM, DataServices, BPC - I want to move these system to another subnet and hide behind Webdispatcher + saprouter.  
    Anyone have tried to do so?  Or please offer other variants.
    Thanks...

    Hi,
    These links can help you:
    HTTP Based tools
    https://service.sap.com/sap/support/notes/1787981
    WTS
    https://service.sap.com/sap/support/notes/605795
    If you encounter an issue with the install or configuration of SAPRouter.
    A ticket can be created under (or transferred to) CSS component: XX-SER-NET-HTL.
    Best regards,
    Siwar

  • Which network security to I choose for my new IPhone 5.  I have cable internet with airport router.

    Which network security do i choose for my new IPhone 5 If I have cable internet and an airport wireless router?

    You should choose WPA2 Personal (AES).
    See this Apple doc for more info -> iOS: Recommended settings for Wi-Fi routers and access points

  • Network Security COde location

    Hi
    I have been using my printer since i purchaed in January 2015
    It uses Web Base print (WDS) and all of a sudden on my connections it is asking for the network security key.
    My printer status is offline
    I use a Vodafone Pocket WIFI to run my internet
    Where do i locate my netwwork security key havent had to use one since we loaded printer
    how many digits would this be
    any info you can send to me at [Personal Information Removed]
    I need urgently to use printer
    Tks Gill

    Hi @luckyfourme 
    Based on your description, I believe you are looking for your network encryption key. If this is the case, you can use the following document to locate the password for your network; I Can't Find the WEP or WPA Key or Password for My Wireless Network.
    You may also find the following document helpful to address the Offline message: 'Printer is offline' Message Displays on the Computer and the HP Printer Will Not Print.
    I hope this helps. Please let me know if this resolves the issue, or if you require additional assistance.
    Please click the Thumbs up icon below to thank me for responding.
    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    Please click “Accept as Solution” if you feel my post solved your issue, it will help others find the solution.
    Sunshyn2005 - I work on behalf of HP

  • Network security key

    I currently had Fios internet connection, trying to set up the wire connection and I am having problems.
    Any time I put in the security password, a message come Network security key mismatch.
    I have the log in password printed on the router, with the Essid, Wpas key etc.
    Am I using the wrong keys or need to reset the wireless router?

    What security type is the FiOS Router showing? WEP is the default for anything up to the Rev. F , and all Westell routers. The Rev G and I ActionTecs should be on WPA2.
    Make sure you're entering in WEP keys in All Caps, and if it's a WPA2 or WPA Key that you enter it in case sensitive.
    ========
    The first to bring me 1Gbps Fiber for $30/m wins!

  • Network Security for amateurs

    Hey!
    I've had my Macbook for about a year and a half and I've just started learning more about network security. I realized the other day that my IP doesn't match the one given back to me by websites; as I understand it, this might mean that my network security has been compromised.
    I don't know yet what exactly is causing that, but I want to make sure no one can get into my system. I can't turn on FireVault because I don't have enough space on my hardrive. Do encryption softwares protect against proxies and ARP poisoning? Should I go through the effort of setting up static IPs?
    I know this is very general and probably quite simple, but I want to make sure I'm going in a good direction before I take the time to set up Ettercap. My apartment is set up with Roger's wireless and uses a WEP password. Any ideas?
    Message was edited by: Chessire

    I realized the other day that my IP doesn't match the one given back to me by websites; as I understand it, this might mean that my network security has been compromised.
    Your understanding is wrong
    There's nothing wrong or unusual with having a machine address different from your public address that other sites see. It typically means is that you're running in a NAT (Network Address Translation) environment which is generally a GOOD thing.
    NAT uses a series of private IP addresses (such as 192.168.x.x or 10.x.x.x) that exist only on your LAN. Your router translates that address to a separate public IP address provided by your ISP.
    In this setup, by default, no external user can get to your machine at all since the private address can't be routed over the internet. The only way someone can get to your machine is if you configure your router to permit specific traffic into your network (e.g. if you were running a web server in your LAN you could configure the router to permit incoming web traffic).
    So don't stress over your machine having one address while other sites see a different one.
    Do encryption softwares protect against proxies and ARP poisoning?
    No. I'm not sure what you think there is about 'proxies' that you need to protect against. They serve a useful purpose in certain network configurations. Even if you use one it's unlikely to be a valid attack vector against your machine.
    Should I go through the effort of setting up static IPs?
    Set up static IPs where? If you mean on your LAN it makes no difference since no one can get to your machine anyway. If you're talking about your public IP you'd need to involve your ISP.
    Either way, having a static vs. dynamic IP address doesn't necessarily improve your security.
    My apartment is set up with Roger's wireless and uses a WEP password
    Well, for one, switch to WPA. WEP has been proven to be insecure, with an average hacker being able to compromise the wireless network password within a few minutes.

  • Network security for EP server

    Hi,
    If i have a portal server which talks to SAPR3 systems how should the network security be achieved, if the portal has to open to internet?
    where all will the firewall come into picture? How many DMZs to be there? Is there any SAP recommendation document on this...any info would be of great help
    regards,
    Sujesh

    Hi Sujesh,
    Normally SAP recommend (on their courses) that you have a reverse proxy in the DMZ, then a firewall, then portal, then a firewall, then backend SAP etc.
    However, it also depends on what you already have network architecture wise.
    Paul

  • I recently upgraded by iMac iOS to Yosemite, and I find that my best buy provided Trend Micro stopped working. Question, what security software is recommended, if any for an iMac. Thanks

    I recently upgraded by iMac iOS to Yosemite, and I find that my best buy provided Trend Micro stopped working. Question, what security software is recommended, if any for an iMac. Thanks

    Uninstall Trend Micro software. It is not needed and could prevent your computer from operating properly. If there is no uninstaller for the software, then see the following:
    Uninstalling Software: The Basics
    Most OS X applications are completely self-contained "packages" that can be uninstalled by simply dragging the application to the Trash.  Applications may create preference files that are stored in the /Home/Library/Preferences/ folder.  Although they do nothing once you delete the associated application, they do take up some disk space.  If you want you can look for them in the above location and delete them, too.
    Some applications may install an uninstaller program that can be used to remove the application.  In some cases the uninstaller may be part of the application's installer, and is invoked by clicking on a Customize button that will appear during the install process.
    Some applications may install components in the /Home/Library/Applications Support/ folder.  You can also check there to see if the application has created a folder.  You can also delete the folder that's in the Applications Support folder.  Again, they don't do anything but take up disk space once the application is trashed.
    Some applications may install a startupitem or a Log In item.  Startupitems are usually installed in the /Library/StartupItems/ folder and less often in the /Home/Library/StartupItems/ folder.  Log In Items are set in the Accounts preferences.  Open System Preferences, click on the Accounts icon, then click on the LogIn Items tab.  Locate the item in the list for the application you want to remove and click on the "-" button to delete it from the list.
    Some software use startup daemons or agents that are a new feature of the OS.  Look for them in /Library/LaunchAgents/ and /Library/LaunchDaemons/ or in /Home/Library/LaunchAgents/.
    If an application installs any other files the best way to track them down is to do a Finder search using the application name or the developer name as the search term.  Unfortunately Spotlight will not look in certain folders by default.  You can modify Spotlight's behavior or use a third-party search utility, EasyFind, instead.
    Some applications install a receipt in the /Library/Receipts/ folder.  Usually with the same name as the program or the developer.  The item generally has a ".pkg" extension.  Be sure you also delete this item as some programs use it to determine if it's already installed.
    There are many utilities that can uninstall applications.  Here is a selection:
        1. AppZapper
        2. AppDelete
        3. Automaton
        4. Hazel
        5. AppCleaner
        6. CleanApp
        7. iTrash
        8. Amnesia
        9. Uninstaller
      10. Spring Cleaning
    For more information visit The XLab FAQs and read the FAQ on removing software.

  • RV180W Router -Configuring network secure from open wireless

       I would like to set up an open wireless network for web access only and keep the 2nd WPA wireless network and the internal wired network secure from this open network.  Not finding any clear indication of how to do this in the manual.  Tnx for any advice.               

    Amjad - you were correct about VLAN being the answer and I eventually figured it out.  Since this router provides multiple wireless networks, I was surprised that the manual didn't outline how to do this since creating a public and private network would be one main reason to buy this product.
    The default setting is for everything to be on VLAN1.  I created a 2nd VLAN for the open wireless network with a different IP subnet and defined a DHCP range and once I figured out that "Inter-VLAN Routing" needed to be enabled on both VLANS, then everything worked.  I suppose that "Inter-VLAN Routing" is how VLAN 2 gets across to VLAN 1 and the gateway, but it doesn't allow connections to anything on VLAN 1 except the gateway.  This is what I wanted.
    Thanks again.

  • NOOB Question Network Security Groups

    It appears I need to use Powershell to create NSG's etc so stupid question is where do I run the powershell to create the NSG from the command "New-AzureNetworkSecurityGroupNew-AzureNetworkSecurityGroup"
    on a particular VM within Azure?

    Hi,
    You could install Azure PowerShell in your Azure VM or in your Local Machine as well.
    Please refer the following link to install PowerShell:
    http://azure.microsoft.com/en-in/documentation/articles/powershell-install-configure/
    I ran the following command in my Local Machine to create a Network Security Group and it worked successfully:
    New-AzureNetworkSecurityGroup-Name"******"-Location"******"-Label"*******"
    Regards,
    Malar.

Maybe you are looking for

  • Apple Mini-DVI to Video Adapter Questions

    I'm in the processing of producing an instructional video using an Intel Core Duo iMac and iMovie. This content will be distributed primarily via broadcast over cable TV. Considering this, I'd like to be able to edit and view my dv footage on a TV mo

  • Why did my index.htm file generate blank? and other weirdness.

    Here's the story. Maybe someone can tell me where I made my mistake, or what happened. I'm numbering the steps for convenience in discussing this. 1) I started a new project, a WebHelp project. 2) I imported content in Word. 3) I created an index, gl

  • The home button on my ipod touch 4th genereation is jammed and i cant press it. What should i do?

    The home button on my ipod touch 4th generation, that i have had for a year now, is jammed. When i go to click it to go to the home screen it doesnt push in. I am not sure how it happened because one moment i pressed it and it was fine and the next i

  • Scheduled report is failing to be triggered via email in SCOM 2007 R2.

    Hi All, I have this strange issue. I have created a scheduled report from the SCOM reporting. It is a default report which comes in SCOM, It is the Most common alerts available in the Microsoft generic report library. I also have the SMTP server conf

  • Will this work? (RVS4000 config)

    I have not worked with the lower end routers, so I am working on a hunch.  I have a dlink wireless router handing out addresses through dhcp for public access.  I also have my private network on a switch with a server handing out addresses.  I would