Philips CPWNA100/00 用户手册

下载
页码 43
Chapter 5 - General network and security related information
The DOs and DON'Ts of securing your wireless network
Note: For an example of how to encrypt your wireless network, please see the
chapter on "An example of how to secure your wireless network."
DO
Enable the highest encryption key level that your hardware provides for.
Upgrade your hardware, if possible. If you do not protect your wireless
network, all data from your PC might be accessible by, for example, your
neighbours or passers-by.
Use a wireless base station or router with Network Address Translation
(NAT) and firewall enabled for sharing your Internet connection.
Change the default passwords for your network devices. Leaving these at
default makes it easy for an outsider to gain access.
Position wireless base stations away from windows and toward the centre
of your home.This decreases the strength of the signal outside your home.
Some wireless base stations allow you to control access based on the
unique Media Access Control (MAC) address of the network adapter trying
to associate with it. If a MAC address has not been registered in  the
wireless base station, it will not associate with it. If your base station has this
feature, enable it and add the MAC addresses of the network adapters.
Just use common sense: Install an anti-virus program on each computer on
your network and use it regularly to check your computers for viruses.
Remember to update the anti-virus program on a regular basis.
DON'T
Do not rely on radio transmission range limitations to secure your network.
Enable wireless security (WEP/WPA) to protect your network from
unwanted access.
Use encryption keys and passwords that are hard to guess. Do not change
passwords to reflect your name, address, or anything that would be easy to
guess.
Never open attachments to email messages that you are not expecting. In
addition, scan all diskettes and home-made CDs for viruses before opening
files from them, or before starting your computer from them.
Do not load a program from an unknown source onto one of your
network computers.
Do not ignore the common signs of viruses: unusual messages that appear
ENGLISH
21