Mini Spy


Latest Threads

  1. Warning Welcome to, a free community where people like yourself come together to discuss and learn about PC security and computers.
    As a guest, you can browse and view the various discussions in the forums, but you can not create new threads or reply to an existing one unless you are a registered member. By joining our free community you will have access to post threads, start private conversations with other members, respond to polls, upload content and access many other special features.
    Registration is fast, simple and absolutely free, so please join us today!
  2. Emsisoft  Mobile Security GiveawayEXCLUSIVE Emsisoft Mobile Security Giveaway

    Get a free license key for Emsisoft Mobile Security to protect your Android smartphone. We are giving away Emsisoft Mobile Security license keys for our awesome members!

    Get an Emsisoft Mobile Security license key!

  3. Zemana AntiLogger Unlimited GiveawayEXCLUSIVE: Zemana AntiLogger Giveaway

    Get a free license key for Zemana AntiLogger. We are giving away 300 Zemana AntiLogger license keys for our awesome members!

    Get a Zemana AntiLogger license key!

  4.  NoVirusThanks EXE GiveawayEXCLUSIVE : NoVirusThanks EXE Radar Pro Giveaway

    Get a free license key for NoVirusThanks EXE Radar Pro. We are giving away NoVirusThanks EXE Radar Pro license keys for our awesome members!

    Get a NoVirusThanks EXE Radar Pro license key!

  5. ZoneAlarm 2015 Extreme Security GiveawayEXCLUSIVE 2015 Extreme Security Giveaway

    Starting with April 17,2014 get a free license key for ZoneAlarm 2015 Extreme Security. We are giving away ZoneAlarm 2015 Extreme Security license keys for our awesome members!

    ZoneAlarm 2015 Extreme Security Giveaway starting on April 17,2014

  6. Windows XP End Of Support

    After 12 years, support for Windows XP has ended on April 8, 2014. There will be no more security updates or technical support for the Windows XP operating system. Without critical Windows XP security updates, your PC may become vulnerable to harmful viruses, spyware, and other malicious software which can steal or damage your business data and information. Many software vendors will no longer support their products running on Windows XP as they are unable to receive Windows XP updates. Most PC hardware manufacturers will stop supporting Windows XP on existing and new hardware.

  7. Tip of the Day Always keep an eye on what you click and download, including music, movies, files, browser plug-ins or add-ons
    Be wary of pop-up windows that ask you to download software or that offer to fix your computer. Often these pop-ups will claim that your computer has been infected and that their download can fix it – don’t believe them. Close the window and make sure you don’t click inside the pop-up window. Do not open files of unknown types, or if you see unfamiliar browser prompts or warnings asking you to open a file. Sometimes malware may prevent you from leaving a page if you land on it, for example by repeatedly opening a download prompt. If this happens, use your computer’s task manager or activity monitor to close your browser.

How to Set up a security key for a wireless network

Discussion in 'Safe Online Practices' started by Jack, Feb 15, 2011.

  1. Jack

    Jack Administrator Staff Member

    Jan 24, 2011
    Likes Received:
    Trophy Points:
    Personal information and files on your wireless network can sometimes be seen by people who pick up your network signal. This can lead to identity theft and other malicious acts. A network security key or passphrase can help protect your wireless network from this type of unauthorized access.

    Encryption methods for wireless networks

    There are currently three types of wireless network encryption: Wi‑Fi Protected Access (WPA and WPA2), Wired Equivalent Privacy (WEP), and 802.1x. The first two are described in more detail in the following sections. 802.1x is typically used for enterprise networks and isn't discussed here.

    Wi‑Fi Protected Access (WPA and WPA2)

    WPA and WPA2 require users to provide a security key to connect. Once the key has been validated, all data sent between the computer or device and the access point is encrypted.

    There are two types of WPA authentication: WPA and WPA2. If possible, use WPA2 because it is the most secure. Almost all new wireless adapters support WPA and WPA2, but some older ones don't. In WPA-Personal and WPA2-Personal, each user is given the same passphrase. This is the recommended mode for home networks. WPA-Enterprise and WPA2-Enterprise are designed to be used with an 802.1x authentication server that distributes different keys to each user. This mode is primarily used in work networks.

    Wired Equivalent Privacy (WEP)

    WEP is an older network security method that's still available to support older devices, but it's no longer recommended. When you enable WEP, you set up a network security key. This key encrypts the information that one computer sends to another computer across your network. However, WEP security is relatively easy to crack.

    There are two kinds of WEP: open system authentication and shared key authentication. Neither is very secure, but shared key authentication is the least secure of the two. For most wireless computers and wireless access points, the shared key authentication key is the same as the static WEP encryption key—the key that you use to secure your network. A malicious user who captures the messages for a successful shared key authentication can use analysis tools to determine the shared key authentication key, and then determine the static WEP encryption key. After the WEP encryption key has been determined, the malicious user has full access to your network. For this reason, this version of Windows doesn’t support automatically setting up a network using WEP shared key authentication

    Note : We don't recommend using Wired Equivalent Privacy (WEP) as your wireless security method. Wi‑Fi Protected Access (WPA or WPA2) is more secure. If you try WPA or WPA2 and they don't work, we recommend that you upgrade your network adapter to one that works with WPA or WPA2. All of your network devices, computers, routers, and access points must also support WPA or WPA2.

    How to Set up a security key for a wireless network :
    The Set Up a Network wizard will guide you through setting up a security key :

    • Open Set Up a Network by clicking the Start button
      In the search box, type network,
    • Click Network and Sharing Center,
    • Click Set up a new connection or network
    • Click Set up a new network.

    If, despite these warnings, you still want to use WEP shared key authentication, you can do so by following these steps:

    To manually create a network profile using WEP shared key authentication

    • Open Network and Sharing Center by clicking the Start button.In the search box, type network, and then click Network and Sharing Center.
    • Click Set up a new connection or network.
    • Click Manually connect to a wireless network, and then click Next.
    • On the Enter information for the wireless network you want to add page, under Security type, select WEP.
    • Complete the rest of the page, and then click Next.
    • Click Change connection settings.
    • Click the Security tab, and then, under Security type, click Shared.
    • Click OK, and then click Close.
  2. bogdan

    bogdan Administrator Staff Member

    Jan 7, 2011
    Likes Received:
    Trophy Points:
    Use at least WPA-PSK (Pre Shared Key) instead of WEP to protect your home wireless network. If you use a good (random) password or passphrase (note that a passphare is longer than a password and includes spaces) to encrypt your connection your are secure.

Want to reply to this thread or ask your own question?

It takes just 2 minutes to sign up (and it's free!). Just click the sign up button to choose a username and then you can ask your own questions on the forum.
Similar Threads: security wireless
Forum Title Date
Other Security Related Discussions Three wireless security myths - busted! May 22, 2013
Giveaways, Contests and Sweepstakes F-Secure Internet Security 2014 for 90 days Today at 8:46 AM
News Section LaCie admits year-long malware security breach, customer data at risk! Today at 1:27 AM
News Section In an attempt to improve web security, Google may begin favoring encrypted sites in searches Yesterday at 3:34 PM
Other Security Related Discussions Security advice....this or that? Monday at 3:00 PM is an independent website.All trademarks mentioned on this page are the property of their respective owners.