Category Archives: Walkthroughs and How-tos

A selection of walkthroughs and step-by-step directions on how to get things done.

How to Attain WEP and WPA Simultaneously

First and foremost, I must give credit to one of my twitter pals, TroyBrownBBNews, without whom this post would not be possible. Without his help, I would not have gotten it to work.

So, you might be asking yourself, “Why would I want to have anything to do with WEP?” The answer is, you shouldn’t, but there are still many devices out there that have not yet made the switch to full WPA, let alone WPA2. Simply stated, much like the age-old adage about a chain and a weak link, your network can only be secured up to the level of the lowest security-enabled device. In other words, if you have a device that you must have on your network that’s highest level of encryption is WEP, the highest level of encryption you can enact would be WEP. A WEP-only device will not connect to a WPA network. For instance, and in my case, if you have a child who happens to own a Nintendo DS Lite or DSi, you understand why. For the longest time, I refused to lower my encryption for the home network to allow for online game play. However, in today’s market there are several games that cannot be fully played unless an internet connection is made available. Therein lays the conundrum. Do I lessen the level of protection, or do I deal with purchasing games that my son cannot fully enjoy (and also listen to the repeated pleas for internet connectivity)? The answer is: I can have both with a little work. And so can you. Let’s get started, shall we? Continue reading

Securing your Wireless Network

wirelessSo, you have a wireless network. Now it is time for you to take security seriously. Most people think that setting up a wireless network and hiding the SSID is all you need to do. I have been in networking for several years, mostly as a service tech. I cannot tell you how many times I rolled on a service call to find that a customer’s wireless network had been compromised, often without them even knowing. In my experience, internet leaching neighbors is the most common form of network compromise. However, wardriving is an even bigger threat. When a wardriver finds your unsecured (or weakly secured) network, it is often loaded to a server with GPS coordinates letting others know where they can go to leach internet, or worse. While there is little you can do to stop a truly dedicated hacker, it is rather simple to keep your network from being labeled as a prime target. Continue reading

Manually Reset your Router

Personally, I like to reconfigure my home network every now and then to make sure no one who may or may not have gained access to my system without my knowledge does not enjoy free internet for as long as they live near me. There will be times that you will need to restore your router to factory settings…say, if you have forgotten your admin password, for instance. Hey, it happens to the best of us. Luckily, you do not have to buy a new router. Continue reading

Power Cycle your Device

There will come a time when your wireless devices will not connect to your router, even though the Wi-Fi light is blinking. There will be a time when your router will not connect to your modem. There is an easy process that will solve 75% of all “no internet connection” problems that exist today. It is called the power cycle. Continue reading