HP CQ32 manual Protecting your Wlan, Use a wireless transmitter with built-in security

Page 29

Protecting your WLAN

Because the WLAN standard was designed with only limited security capabilities—basically to foil casual eavesdropping rather than more powerful forms of attack—it is essential to understand that WLANs are vulnerable to well-known and well-documented security weaknesses.

WLANs in public areas, or “hotspots,” like coffee shops and airports may not provide any security. New technologies are being developed by wireless manufacturers and hotspot service providers that make the public environment more secure and anonymous. If you are concerned about the security of your computer in a hotspot, limit your network activities to noncritical e-mail and basic Internet surfing.

When you set up a WLAN or access an existing WLAN, always enable security features to protect your network from unauthorized access. The common security levels are Wi-Fi Protected Access (WPA)- Personal and Wired Equivalent Privacy (WEP). Because wireless radio signals travel outside the network, other WLAN devices can pick up unprotected signals and either connect to your network (uninvited) or capture information being sent across it. However, you can take precautions to protect your WLAN:

Use a wireless transmitter with built-in security

Many wireless base stations, gateways, or routers provide built-in security features such as wireless security protocols and firewalls. With the correct wireless transmitter, you can protect your network from the most common wireless security risks.

Work behind a firewall

A firewall is a barrier that checks both data and requests for data that are sent to your network, and discards any suspicious items. Firewalls are available in many varieties, both software and hardware. Some networks use a combination of both types.

Use wireless encryption

A variety of sophisticated encryption protocols is available for your WLAN. Find the solution that works best for your network security:

Wired Equivalent Privacy (WEP) is a wireless security protocol that encodes or encrypts all network data before it is transmitted using a WEP key. Usually, you can allow the network to assign the WEP key. Alternatively, you can set up your own key, generate a different key, or choose other advanced options. Without the correct key, others will not be able to use the WLAN.

WPA (Wi-Fi Protected Access), like WEP, uses security settings to encrypt and decrypt data that is transmitted over the network. However, instead of using one static security key for encryptions as WEP does, WPA uses “temporal key integrity protocol” (TKIP) to dynamically generate a new key for every packet. It also generates different sets of keys for each computer on the network.

Using a WLAN 19

Image 29
Contents Compaq Presario Notebook PC Product notice Safety warning notice Iv Safety warning notice Table of contents Pointing devices and keyboard Power management Drives 101 111 Identifying hardware FeaturesTouchPad ComponentsTop components Lights Button and speakers Fn key KeysDisplay Front component Right-side components Left-side components Rear component Bottom components Wireless antennas Additional hardware components Labels Networking Using wireless devicesUsing the wireless action key Identifying wireless and network status iconsUsing the wireless controls Using operating system controls Using HP Wireless AssistantSetting up a Wlan Using a WlanProtecting your Wlan Use a wireless transmitter with built-in securityRoaming to another network Connecting to a WlanBluetooth and Internet Connection Sharing ICS Using Bluetooth wireless devices select models onlyCannot connect to a Wlan Troubleshooting wireless connection problemsCurrent network security codes are unavailable Cannot connect to a preferred wireless networkNetwork icon is not displayed Wlan connection is very weak Cannot connect to the wireless routerConnecting to a local area network Setting pointing device preferences Using pointing devicesUsing the TouchPad Pointing devices and keyboardSelecting Scrolling Using TouchPad gesturesRotating Connecting an external mouseUsing the action keys Using the keyboardIcon Function Hotkey Description Using the hotkeysPage Cleaning the TouchPad and keyboard Multimedia Multimedia featuresEnvironmental Notices Identifying your multimedia componentsAdjusting the volume Using the media activity action keys Using other preinstalled multimedia software Using CyberLink PowerDVD softwareInstalling multimedia software from a disc Multimedia softwareChecking your audio functions Connecting external audio devicesAudio Video Connecting an external monitor or projectorConnecting an Hdmi device select models only Configuring audio for Hdmi select models only Optical drive Identifying the installed optical driveDVD±RW/R Using optical discsCD-R discs Selecting the right discCD-RW discs DVD±R discsBlu-ray Disc Playing a CD, DVD, or BDLightScribe DVD+R discs Page Changing DVD region settings Configuring AutoPlayCopying a CD or DVD Observing the copyright warningCreating burning a CD or DVD Removing an optical disc CD, DVD, or BD Webcam tips Webcam select models onlyAdjusting webcam properties Troubleshooting Computer does not detect the optical drive Disc does not play automatically Disc does not playMovie is not visible on an external display Movie stops, skips, or plays erraticallyRemove any discs from the optical drive Obtaining the latest Windows device drivers Obtaining the latest HP device driversSetting power options Power managementUsing power-saving states Initiating and exiting SleepInitiating and exiting Hibernation Using the battery meterUsing power plans Customizing power plans Viewing the current power planSelecting a different power plan Connecting the AC adapter Using external AC powerTesting an AC adapter Using battery powerFinding battery information in Help and Support Displaying the remaining battery chargeUsing Battery Check Inserting or removing the batteryCharging a battery Identifying low battery levels Maximizing battery discharge timeManaging low battery levels Fully charge the battery Calibrating a batteryResolving a low battery level Discharge the battery Disable Hibernation and SleepStoring a battery Conserving battery powerFully recharge the battery Reenable Hibernation and SleepShutting down the computer Disposing of a used batteryReplacing the battery Page Handling drives Identifying installed drivesDrives Using external drives Page Improving hard drive performance Using Disk DefragmenterUsing Disk Cleanup Replacing the hard drive Page Page Page External devices and external media cards Using a USB deviceConnecting a USB device Removing a USB device Inserting a digital card Using Digital Media Slot cardsRemoving a digital card Memory modules Page Page Page Protecting the computer Using passwordsSecurity Setting passwords in Setup Utility Setting passwords in WindowsPower-on password Administrator passwordManaging a power-on password Using antivirus software Using firewall software Installing critical updates Starting Setup Utility Setup Utility BiosNavigating and selecting in Setup Utility Using Setup UtilityChanging the language of Setup Utility Displaying system information Restoring default settings in Setup UtilityExiting Setup Utility Setup Utility menusMain menu Security menuDiagnostics menu System Configuration menuSoftware updates Determining the Bios version Updating the BiosDownloading a Bios update Updating programs and drivers Backup and recovery Creating recovery discs Backing up your information Using Windows Backup and Restore When to create restore points Using system restore pointsCreate a system restore point Restore to a previous date and timeRecovering from the recovery discs Performing a recoveryIndex Symbols/NumericsDVD Hdmi
Related manuals
Manual 8 pages 26.72 Kb