This is an all too common problem, as wireless networks have become more prevalent with the spread of broadband internet access. Many consumers are not aware of how to configure their networks to avoid this type of unauthorized access. Most home networks, and even some small business networks, are unsecured and, as a result, there is a real potential for data loss, identity theft, or getting your computer hijacked for malicious activity that can cause an even more serious liability. If an individual accesses your private wireless network, anything illegal that they do on the internet will appear that you are doing it. If this should happen, your broadband internet provider will contact law enforcement officials who could come knocking at your door.
Individuals who access private wireless networks without permission (called "hacking") feel that our constitution gives them the right to take advantage of unsuspecting, inexperienced individuals by accessing their wireless networks. Their misconceived line of thinking is that wireless routers use radio waves and if those radio waves extend beyond the network owner's residence or business then it's fair game. These individuals are breaking the law! Anyone accessing a private wireless network without the expressed knowledge and permission of the owner may be committing numerous misdemeanors and felonies such as Breach of Privacy, Theft of Service, Computer Tampering, and Computer Trespass. If someone gains access to your computer for credit card or any other personal information, then that's Criminal Possession of Computer-Related Materials. Furthermore, each time the offender illegally logs into a private network, it is construed as a separate offense.
Lastly, if someone accesses your wireless network illegally, your files could become corrupted by viruses or other malicious code in order to potentially bypass any protection that you may have running on your system.
So how do you stop this from happening to you? How can you protect your computer? There are precautions that everyone with broadband should take. However, you may find it less distressing to contact a local computer professional to ensure that these precautions are set up properly.
First, if you have not set the password on your router, then it is using a default password that all other routers from that company use. Hackers also know that password and could easily find the computers connected to the router. So, if you have not set the password on your router, you should do that. Follow the instructions that came with your router. Once you set it, you can forget it until you need to change your router's settings. The best passwords are a mix of at least 8 characters (alpha, numeric, symbol, and case sensitive). For example, "H3nn1ngC0mputer$ervic3s" is a strong password. Furthermore, wireless internet networks (called "Wi-Fi") add an additional weak link to network security. If your wireless network is not encrypted (secure), anyone within reception distance can access your internet connection and your computer. There are even websites that list locations of unencrypted Wi-Fi networks. Yet, encrypting your Wi-Fi network could be as easy as setting up a password. See the manual that came with your Wi-Fi transmitter for more information.
Second, most good routers have built-in firewall capabilities. However, it's not a bad idea to have a firewall in place on your computer as well. In this case, a firewall is software that puts a barrier between your computer and the internet and/or network. You can purchase a third party internet security program from Webroot, Symantec, McAfee, AVG, Avast, eTrust, or you may want to enable Window's firewall. To do this, open "Control Panel", click on "Windows Firewall", then click on "ON" and then "OK".
Third, and undoubtedly the easiest precaution but somewhat extreme, is to turn your computer and network off when you are not using it. No one can hack into a computer or network that is turned off.
These 3 easy tips may not make your computer impenetrable to the best hackers but, unless you have something valuable on your computer, like your personal information, they should discourage a hacker and convince him to find his thrills elsewhere.