When renovating or changing routers, you always face a problem: if the password is too simple, it is easy to be cracked by hackers' social engineering or even brute force, which will slow down the Internet speed; if it is too complicated, it may be too much of a headache for friends who come to visit to enter it. After all, there are various mature generation, storage and filling schemes for ordinary website passwords, but for Wi-Fi passwords that need to be shared frequently, the existing methods simply do not work.
However, this does not mean that your Wi-Fi password cannot be both secure and convenient. In fact, today's smart devices usually come with a variety of methods that can ensure that the Wi-Fi password is complex enough while allowing you and your friends to quickly connect to the Wi-Fi network.
Today, APPSO will teach you step by step how to strengthen the security of your home Wi-Fi network, starting from the most basic password setting.
Basic Settings
If you want to do your job well, you must first sharpen your tools. If you want to strengthen your Wi-Fi network, you must start with encryption protocols and password strength.
1. Use strong encryption protocols such as WPA2 or WPA3
Currently, the three most popular Wi-Fi network encryption methods are Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA), of which WPA has been upgraded to the second and third generations. Although some older devices still use WEP encryption, it has been found to have serious security vulnerabilities and is therefore considered an unsafe encryption method by default.
Generally speaking, the default encryption settings for newly launched Wi-Fi AP (access hotspot) devices are all WPA2. If you want to check your Wi-Fi network encryption protocol, you need to modify or view it in your Wi-Fi AP or wireless router (hereinafter referred to as "Wi-Fi device"). Here we take the newer TP-LINK router as an example:
Connect the device to the Wi-Fi device's network. Open the router settings page from the browser and click 'Route Settings' at the bottom. Enter 'Wireless Settings'. Find 'Authentication Type' in the 'Wireless Settings' section on the right. Make sure 'WPA2-PSK / WPA3-SAE' is selected and click Save.
▲ The option to modify the authentication encryption type on newer TP-LINK brand routers
The router settings page may be different for different brands, models and release dates of Wi-Fi devices; the options are also located in different places, generally in "Wireless Settings", "Broadcast Settings", and "AP Settings". The supported encryption authentication types are also different, make sure to select the following authentication types:
WPA2-Personal / WPA2-PSKWPA3-Personal / WPA3-SAE
How to find your Wi-Fi router's setup page address? Currently, the default setting page address of most Wi-Fi routers on the market is one of the following addresses: 192.168.1.1192.168.0.110.0.0.1 You can try opening the above three addresses first to see if you can open your router's settings login page. If that doesn't work, you can check the label on the bottom of the router, or connect your phone to the corresponding Wi-Fi and find the Wi-Fi details page in the settings. The IP address marked with 'router' or 'gateway address' (it usually starts with 192.168) is most likely the address of your router settings login page. In addition, if your router (WAN interface) is connected to the operator's 'optical modem' or other gateway/router, these addresses may open the settings page of the upstream network device, so please pay more attention. Still find it troublesome? Try unplugging the WAN port of the router and then connecting to this Wi-Fi. Newer routers have a network detection function and will automatically take you to the router backend when the network is disconnected. |
If your Wi-Fi device does not have the above encryption methods, it may be due to old firmware. Try updating the firmware (refer to the Wi-Fi device manual) and then set it up. If it still does not work, it is strongly recommended to consider replacing a more modern Wi-Fi device to ensure network security.
2. Set a strong password
The reason why this item is put after the encryption protocol is that the password issues we will talk about next are closely related to the encryption protocol: in 2018, a vulnerability was found in the WPA2-Personal encryption protocol, which was achieved by "squeezing" the client connected to the network offline, waiting for the client to try to reconnect to the Wi-Fi device, and then cracking the password by intercepting the handshake packet.
Although this cracking possibility exists, it does not mean that WPA2-Personal is completely unsafe. Some security manuals will recommend that users set sufficiently irregular characters to avoid this attack method. Of course, completely irregular passwords will also cause certain obstacles to our subsequent device connections. For this reason, using pseudowords, which are easy-to-read but meaningless words, to form passwords can ensure randomness while making it relatively easier for us to enter.
If you use 1Password, when creating a new password, select "easy to remember password" and you can generate a virtual password according to your needs. In addition, there are other password generation tools on the Internet to generate virtual passwords.
▲ 1Password on the left and "Physical Password Generator" on the right
In addition, remember to write down the new password after changing it.
Connection
Even with complex, randomly generated passwords, there's no need to do an 'eyesight test' or 'typing test' when you have guests over. With just these few tips, connecting to your Wi-Fi couldn't be easier.
1. Use the built-in sharing function
Including various systems under Apple, as well as most models of major domestic Android manufacturers, there is a 'share Wi-Fi password' option.
Let's talk about iPhone first. If you and your friend both use iPhone, have exchanged phone numbers or email addresses in the Contacts app, and your phone numbers or email addresses are registered in your iCloud account, then you can quickly connect to the Internet through the built-in network password sharing feature of iOS.
It is best to unlock your iPhone first and ask your friend to open the 'Settings' app, enter 'Wireless LAN' or 'WLAN', click your network name, and then wait on the password input interface. At this time, your iPhone will pop up a sharing prompt, just click 'Share Password'
As for Android phones, most of the sharing functions they provide are through QR code sharing. Taking LineageOS as an example, enter the details page of the Wi-Fi network, click the 'Share' button, and the Wi-Fi QR code will be displayed after verifying the lock screen password.
It should be noted that this QR code does not seem to be scannable via WeChat. iPhones can scan the code via the 'Camera' app, and Android phones can look for the 'Scan' function in the system or Wi-Fi settings. If not, you may need to download a QR code scanner.
2. NFC card
NFC (Near Field Communication) is a protocol that facilitates the rapid exchange of data between two mobile phones or between a mobile phone and other objects. Currently, most models of almost all mainstream brands have NFC function, and we can also use it to make a Wi-Fi connection NFC card, which can connect to the Wi-Fi network with just a touch.
Back to the rendering at the beginning of the article, let’s talk about how to implement it.
First, you need to buy a few blank NFC or RFID cards. Search for "NFC tag" or "NFC card" on mainstream e-commerce platforms, and you can find many blank cards in a variety of styles and colors. The price is usually a few cents each.
Then, we need to download the NFC Tools app on our phone. NFC Tools has both iOS and Android versions, both of which can complete the writing of Wi-Fi NFC cards.
After preparing the blank card and NFC Tools, we can write the Wi-Fi password directly to the blank card:
On the NFC Tools main interface, select 'Write' and click 'Add Record'. Find 'Wi-Fi Network' and click 'Edit' to the right of 'Authentication'. Select the corresponding encryption protocol according to the actual configuration of your router. Fill in your Wi-Fi name (SSID) and password, and click OK in the upper right corner. NFC Tools will automatically return at this time. On the interface after returning, click the third 'Write' button on the top, and then point the blank card at the back of the phone until the phone prompts 'Writing Completed'
Previous article:The out-of-print flagship Essential Phone 5 years ago can be upgraded to Android 12
Next article:The top ten airports with the fastest free Wi-Fi, eight of which are in the US
- Apple faces class action lawsuit from 40 million UK iCloud users, faces $27.6 billion in claims
- Apple and Samsung reportedly failed to develop ultra-thin high-density batteries, iPhone 17 Air and Galaxy S25 Slim phones became thicker
- Micron will appear at the 2024 CIIE, continue to deepen its presence in the Chinese market and lead sustainable development
- Qorvo: Innovative technologies lead the next generation of mobile industry
- BOE exclusively supplies Nubia and Red Magic flagship new products with a new generation of under-screen display technology, leading the industry into the era of true full-screen
- OPPO and Hong Kong Polytechnic University renew cooperation to upgrade innovation research center and expand new boundaries of AI imaging
- Gurman: Vision Pro will upgrade the chip, Apple is also considering launching glasses connected to the iPhone
- OnePlus 13 officially released: the first flagship of the new decade is "Super Pro in every aspect"
- Goodix Technology helps iQOO 13 create a new flagship experience for e-sports performance
- Innolux's intelligent steer-by-wire solution makes cars smarter and safer
- 8051 MCU - Parity Check
- How to efficiently balance the sensitivity of tactile sensing interfaces
- What should I do if the servo motor shakes? What causes the servo motor to shake quickly?
- 【Brushless Motor】Analysis of three-phase BLDC motor and sharing of two popular development boards
- Midea Industrial Technology's subsidiaries Clou Electronics and Hekang New Energy jointly appeared at the Munich Battery Energy Storage Exhibition and Solar Energy Exhibition
- Guoxin Sichen | Application of ferroelectric memory PB85RS2MC in power battery management, with a capacity of 2M
- Analysis of common faults of frequency converter
- In a head-on competition with Qualcomm, what kind of cockpit products has Intel come up with?
- Dalian Rongke's all-vanadium liquid flow battery energy storage equipment industrialization project has entered the sprint stage before production
- Allegro MicroSystems Introduces Advanced Magnetic and Inductive Position Sensing Solutions at Electronica 2024
- Car key in the left hand, liveness detection radar in the right hand, UWB is imperative for cars!
- After a decade of rapid development, domestic CIS has entered the market
- Aegis Dagger Battery + Thor EM-i Super Hybrid, Geely New Energy has thrown out two "king bombs"
- A brief discussion on functional safety - fault, error, and failure
- In the smart car 2.0 cycle, these core industry chains are facing major opportunities!
- The United States and Japan are developing new batteries. CATL faces challenges? How should China's new energy battery industry respond?
- Murata launches high-precision 6-axis inertial sensor for automobiles
- Ford patents pre-charge alarm to help save costs and respond to emergencies
- New real-time microcontroller system from Texas Instruments enables smarter processing in automotive and industrial applications
- Beijing Excellence Communication is recruiting embedded developers with high salary!!!
- How to assign initial values to a continuous RAM range in C2000 chip
- TMS570 Learning 3-Internal Flash Programming
- First post by a newbie
- What is 4G DTU and what are its specific functions?
- CadenceLIVE China 2022 China Online User Conference invites you to attend
- Super detailed summary of receiver sensitivity and equivalent noise bandwidth
- Difference between junction temperature and case top temperature of power device
- The problem of grounding the output signal of the half-bridge inverter circuit
- Xianyu not only hired someone to do their graduation project, but also tried to "extort" money from the seller. It's a pity for these two students from Xidian University...