Question about Linksys Wireless-G WRT54G Router

1 Answer

Secure network connection

Please tell me how to make my network connection secure. I understand there is a hacker that has been able to hack through a wpa system, and at present I have had all security removed from my network. Thanks,
Donna

Posted by on

1 Answer

  • Level 2:

    An expert who has achieved level 2 by getting 100 points

    MVP:

    An expert that gotĀ 5 achievements.

    Novelist:

    An expert who has written 50 answers of more than 400 characters.

    Governor:

    An expert whose answer gotĀ voted for 20 times.

  • Expert
  • 93 Answers

Standard WPA security will work just fine. You can configure your wireless setup via the web interface for the router. Here's a link to the Linksys website, where there is step-by-step documentation on how to do this. Basically, you just set up a key (a password) in the router, and any system trying to connect via wi-fi has to have that key to get in. It is highly unlikely anyone can hack this, if you use a resonably sized key (8 characters, minimum).

Don't be afraid - wi-fi setup is very simple, and should only take you about 5 minutes. To open the web interface to the router, type "192.168.1.1" into the address bar. Leave the user name blank, and type "admin" for the password. You can (and should) change those later. The user guide has a very clear and concise checklist to follow for setting up wireless security. Follow it, and you will be fine.

Here's that link:
http://www.linksys.com/servlet/Satellite?childpagename=US%2FLayout&packedargs=page%3D2%26cid%3D1115416835852%26c%3DL_Content_C1&pagename=Linksys%2FCommon%2FVisitorWrapper&SubmittedElement=Linksys%2FFormSubmit%2FProductDownloadSearch&portaltype=null&sp_prodsku=1175241407708

If that link doesn't work (long ones can be a problem), then just go to Linksys.com, select the download section, and put in your router model number.

Cheers

Posted on Nov 12, 2008

1 Suggested Answer

6ya6ya
  • 2 Answers

SOURCE: I have freestanding Series 8 dishwasher. Lately during the filling cycle water hammer is occurring. How can this be resolved

Hi,
a 6ya expert can help you resolve that issue over the phone in a minute or two.
best thing about this new service is that you are never placed on hold and get to talk to real repairmen in the US.
the service is completely free and covers almost anything you can think of (from cars to computers, handyman, and even drones).
click here to download the app (for users in the US for now) and get all the help you need.
goodluck!

Posted on Jan 02, 2017

Add Your Answer

Uploading: 0%

my-video-file.mp4

Complete. Click "Add" to insert your video. Add

×

Loading...
Loading...

Related Questions:

2 Answers

I think i have been hacked my fb app has disappeared and i cannot get into my page


Hi, Unfortunately there's lots of scammers and hackers on Facebook, The link below is a YouTube page full of videos showing scammers on Facebook, Take care........ CHEERS..
facebook scammers YouTube
Also this is something that needs sharing.........
Hackers gained entry to Facebook's internal corporate network for several months, with access to hundreds of the social network's employee usernames and passwords.
The hackers, which were actively exploiting Facebook's network in July and September last year and possibly as recently as February this year, were discovered by a security researcher perform testing on Facebook's corporate network.
Having discovered seven security vulnerabilities with Facebook's corporate tools, including a file transfer service, Devcore security researcher Orange Tsai found that at least one hacker, possibly two, had compromised Facebook and were operating within its corporate network.
Tsai said: "While collecting vulnerability details and evidences for reporting to Facebook, I found some strange things on web log.
"The hacker created a proxy on the credential page to log the credentials of Facebook
employees. These logged passwords were stored under web directory for the hacker to use [collect] every once in a while."
According to Tsai, the logged Facebook employee credentials could have given the hackers access to email accounts, Facebook's virtual private network and other company tools. Facebook user data is stored separately to its corporate network; it is unknown whether the right Facebook employee credentials could have given the hackers access to Facebook user data.
Tsai said: "At the time I discovered these, there were around 300 logged credentials dated between 1-7, from 1 February, mostly '@fb.com' and '@facebook.com'. Upon seeing it I thought it was a pretty serious security incident."
The testing - a series of attempts by security researchers to find and report holes in a site or service's cyber security - was conducted as part of Facebook's Bug Bounty, which sees the social network pay people who find and disclose vulnerabilities to the company.
Facebook was alerted to the hack on 5 February by Tsai. The company launched an internal investigation, which concluded on 20 April, allowing Devcore to publish the details of the hack.
Commenting on Hacker News, a Facebook security team member called Reginaldo said: "On this case, the software we were using is third party. As we don't have full control of it, we ran it isolated from the systems that host the data people share on Facebook. We do this precisely to have better security.
"We determined that the activity Orange detected was in fact from another researcher who participates in our bounty program. Neither of them were able to compromise other parts of our infra-structure."
Facebook has not responded to request for comment.

Apr 29, 2016 | Tablets & eReaders

1 Answer

I received an email from facebook informing me that I have won US$900 000,00 in the Facebook Group Award Program 2016 which was drawn on 18 March 2016. Is there such a competition or draw?


Hi Juaan, Unfortunately there's lots of scammers on Facebook, The link below is a YouTube page full of videos showing scammers on Facebook, Hackers gained entry to Facebook's internal corporate network for several months, with access to hundreds of the social network's employee usernames and passwords.
The hackers, which were actively exploiting Facebook's network in July and September last year and possibly as recently as February this year, were discovered by a security researcher perform testing on Facebook's corporate network.
Having discovered seven security vulnerabilities with Facebook's corporate tools, including a file transfer service, Devcore security researcher Orange Tsai found that at least one hacker, possibly two, had compromised Facebook and were operating within its corporate network.
Tsai said: "While collecting vulnerability details and evidences for reporting to Facebook, I found some strange things on web log.
"The hacker created a proxy on the credential page to log the credentials of Facebook
employees. These logged passwords were stored under web directory for the hacker to use [collect] every once in a while."
According to Tsai, the logged Facebook employee credentials could have given the hackers access to email accounts, Facebook's virtual private network and other company tools. Facebook user data is stored separately to its corporate network; it is unknown whether the right Facebook employee credentials could have given the hackers access to Facebook user data.
Tsai said: "At the time I discovered these, there were around 300 logged credentials dated between 1-7, from 1 February, mostly '@fb.com' and '@facebook.com'. Upon seeing it I thought it was a pretty serious security incident."
The testing - a series of attempts by security researchers to find and report holes in a site or service's cyber security - was conducted as part of Facebook's Bug Bounty, which sees the social network pay people who find and disclose vulnerabilities to the company.
Facebook was alerted to the hack on 5 February by Tsai. The company launched an internal investigation, which concluded on 20 April, allowing Devcore to publish the details of the hack.
Commenting on Hacker News, a Facebook security team member called Reginaldo said: "On this case, the software we were using is third party. As we don't have full control of it, we ran it isolated from the systems that host the data people share on Facebook. We do this precisely to have better security.
"We determined that the activity Orange detected was in fact from another researcher who participates in our bounty program. Neither of them were able to compromise other parts of our infra-structure."
Facebook has not responded to request for comment.
facebook scammers YouTube

Apr 27, 2016 | Facebook Computers & Internet

12 Answers

How can i hack my boyfriend fb. I want to get total access to his fb he is having private messages with girls ("friends"). I've caught him many times messaging girls.


Hi, you can try GT Recovery to recover your deleted data. Watch this video and it may help you. Hope you like it. You can download this app in google play.

May 20, 2015 | Computers & Internet

1 Answer

How do you get a hacker off your computer and network


To secure your wireless network from unauthorized access,please click on this link and follow my instructions :-http://www.fixya.com/support/r3559128-wireless_router_security

Dec 02, 2011 | HEWLETT-PACKARD HP All-in-One MS235...

2 Answers

Everytime i sign into playstation etwork its says undergoing maintenance and its been going on for weeks


Hi.
The PlayStationNetwork was recently attacked and had their database breached by hackers.

The hackers stole the personal information of over 1,000,000 users accounts, including names, addresses, and in some of the accounts their credit card information as well.

Sony says that it will not re-open PSN until it is sure that the weak points of their network have been fixed so that they can't be breached again.

I know this is frustrating, but as long as it is shut down, the bad guys can't hack into it either.

I hope this helps you understand what is going on with PSN, and explains why you can't connect to it.

I hope you have a good day, and hopefully Sony's PSN will be up and running again soon.

May 07, 2011 | Computers & Internet

3 Answers

I want hack free wifi passwords for use loptop at home


There is no such thing for a home network... as soon as you broadcast out in the open air you are vulnerable... WEP encryption?? hacked (a matter of minuts) WPA (a matter of hours) WPA2 (a matter of days)... as for passwords??? the best password is composed of a long invented (not in the dictionary) word with characters, caps and small caps and numbers example: xaDertHryuBef$fO#Vis@38y40 now that is a good password (just try to remember it ha!) a good sniffer will show the SSID in minuts, search for the encryption key (8000 words a minut) and even if you filter with MAC address it will perform a MAC replication, NET WHISKER, NMAP, WIRER SHARK are some of the 1000 tools to hack networks... I'm a CWNA (Certified Wireless Network Administrator) and believe me if you want a COMPLETELY HACKER FREE WIFI it cost a lot of money and you need a 24/7 supervising... tell me how much you want to invest and I will tell you what to do to get the best buy for the buck...

Apr 08, 2011 | Computers & Internet

2 Answers

Facebook and emails I have been hacked, how can continue to be returned to me again ..... Thank you


Hacking is very technical to explain. Usually, the persons that acquire resources are the only recognisers to hacking incidences. For example, hacking into devices that least becomes recognised may not dispense such a message. Hacking situations are explanable. First the conditon where the hackers have retrieved details that belong as personal details. Attempting to retrive forgetton passwords to personal accounts may be possible with means knwn as hacking to another person since the default entry is not resorted. Second, the sitaution where the hackers have to acquire resources least recognible by the owner. Resources would usually display on networks for example least known to persons until disappearance. Conditions of such nature least makes available recogniston of hacking unless personal resurces become disintergral. Third the situation that hacking is suspected without any resources missing. Occasionally message goes around of hacking taking place making persons caustion. In such situations, missing details appears hacked until proven unhacked. All three categories of hacking are technical to explain depending on whos side made the hacking. The network sites administrator has contact details either email, phone or chat to quest for recent conditions or concerns. Inform the network sites experts of the condition either in person sicne computer device surfng is techncial.

Feb 07, 2011 | Facebook Social Network

1 Answer

Hackers


google the IP addresses and find their connected server (ie. 192.168.1.1 could be tied to testurl.com). upgrade your internet security (firewall, anti-virus, anti-spam, anti-spyware, anti-malware) and google CCleaner, download, and use. and if you use a wireless router, up the security on it by enabling WAP or WEP so no one on the outside of the network without the password can snoop in on what you're doing and gain access to your systems.

Sep 19, 2009 | Compaq Computers & Internet

1 Answer

Hacker tried to get into my computer


192.168.X.X is an internal network address...your "hacker" is either in the same room, or at least on your network, the other is an IP in San Francisco, CA, and PPPoE is a very unlikely method for a "hacker" to use, it's actually a very secure method of connecting 2 computers over the internet.

Mar 14, 2008 | Computers & Internet

1 Answer

Wireless connection


this information is setup at the router (Access Point) and you will need to get the information from there.. Although there are ways to 'hack' this information, I will not tell you how to do this here, as we do not want to enable 'hackers'...

You need to hard wire the computer to the Access Point and enter the configuration of the device.. within it, you will find the SSID (name of the wifi network connection) and the type of encryption (WEP, WAP, etc.). From this page, you can discover the Passphrase or Encryped Password, which will allow you to access the WiFi connection.

Dec 03, 2007 | Computers & Internet

Not finding what you are looking for?
Linksys Wireless-G WRT54G Router Logo

Related Topics:

76 people viewed this question

Ask a Question

Usually answered in minutes!

Top Linksys Computers & Internet Experts

Prashant M
Prashant M

Level 3 Expert

2260 Answers

Les Dickinson
Les Dickinson

Level 3 Expert

18381 Answers

mark

Level 2 Expert

105 Answers

Are you a Linksys Computer and Internet Expert? Answer questions, earn points and help others

Answer questions

Manuals & User Guides

Loading...