Question about Linksys Wireless-G WRT54G Router
Please tell me how to make my network connection secure. I understand there is a hacker that has been able to hack through a wpa system, and at present I have had all security removed from my network. Thanks,
Standard WPA security will work just fine. You can configure your wireless setup via the web interface for the router. Here's a link to the Linksys website, where there is step-by-step documentation on how to do this. Basically, you just set up a key (a password) in the router, and any system trying to connect via wi-fi has to have that key to get in. It is highly unlikely anyone can hack this, if you use a resonably sized key (8 characters, minimum).
Don't be afraid - wi-fi setup is very simple, and should only take you about 5 minutes. To open the web interface to the router, type "192.168.1.1" into the address bar. Leave the user name blank, and type "admin" for the password. You can (and should) change those later. The user guide has a very clear and concise checklist to follow for setting up wireless security. Follow it, and you will be fine.
Here's that link:
If that link doesn't work (long ones can be a problem), then just go to Linksys.com, select the download section, and put in your router model number.
Posted on Nov 12, 2008
a 6ya expert can help you resolve that issue over the phone in a minute or two.
best thing about this new service is that you are never placed on hold and get to talk to real repairmen in the US.
the service is completely free and covers almost anything you can think of (from cars to computers, handyman, and even drones).
click here to download the app (for users in the US for now) and get all the help you need.
Posted on Jan 02, 2017
Tips for a great answer:
Apr 29, 2016 | Tablets & eReaders
Apr 27, 2016 | Facebook Computers & Internet
May 20, 2015 | Computers & Internet
Dec 02, 2011 | HEWLETT-PACKARD HP All-in-One MS235...
May 07, 2011 | Computers & Internet
Apr 08, 2011 | Computers & Internet
Hacking is very technical to explain. Usually, the persons that acquire resources are the only recognisers to hacking incidences. For example, hacking into devices that least becomes recognised may not dispense such a message. Hacking situations are explanable. First the conditon where the hackers have retrieved details that belong as personal details. Attempting to retrive forgetton passwords to personal accounts may be possible with means knwn as hacking to another person since the default entry is not resorted. Second, the sitaution where the hackers have to acquire resources least recognible by the owner. Resources would usually display on networks for example least known to persons until disappearance. Conditions of such nature least makes available recogniston of hacking unless personal resurces become disintergral. Third the situation that hacking is suspected without any resources missing. Occasionally message goes around of hacking taking place making persons caustion. In such situations, missing details appears hacked until proven unhacked. All three categories of hacking are technical to explain depending on whos side made the hacking. The network sites administrator has contact details either email, phone or chat to quest for recent conditions or concerns. Inform the network sites experts of the condition either in person sicne computer device surfng is techncial.
Feb 07, 2011 | Facebook Social Network
Sep 19, 2009 | Compaq Computers & Internet
Mar 14, 2008 | Computers & Internet
Dec 03, 2007 | Computers & Internet
76 people viewed this question
Usually answered in minutes!