Belkin (F5D5231-4) Router Logo

Related Topics:

Posted on Dec 20, 2010
Answered by a Fixya Expert

Trustworthy Expert Solutions

At Fixya.com, our trusted experts are meticulously vetted and possess extensive experience in their respective fields. Backed by a community of knowledgeable professionals, our platform ensures that the solutions provided are thoroughly researched and validated.

View Our Top Experts

How do i turn security on from outside intruders it is unsecure

1 Answer

Marc Cuyag

Level 2:

An expert who has achieved level 2 by getting 100 points

Hot-Shot:

An expert who has answered 20 questions.

Corporal:

An expert that has over 10 points.

Mayor:

An expert whose answer got voted for 2 times.

  • Expert 75 Answers
  • Posted on Dec 20, 2010
Marc Cuyag
Expert
Level 2:

An expert who has achieved level 2 by getting 100 points

Hot-Shot:

An expert who has answered 20 questions.

Corporal:

An expert that has over 10 points.

Mayor:

An expert whose answer got voted for 2 times.

Joined: Jan 27, 2008
Answers
75
Questions
1
Helped
21655
Points
167

Add Your Answer

×

Uploading: 0%

my-video-file.mp4

Complete. Click "Add" to insert your video. Add

×

Loading...
Loading...

Related Questions:

0helpful
1answer

It is asking for an access code to an access point . What is that?

Wireless networks can be secure or unsecure. Anyone can connect to an unsecure site simply by searching for available sites and choosing an unsecure one to connect to. There are inherit risks associarted with unsecure sites and you should NEVER do any financial or highly personal transactions on an unsecure network. Secure networks require a password (access code) to complete connection. This code is provided by the owner/administrator of the network. If you are allowed to connect to such a network, you should already be aware of the code. Otherwise you are basically not invited to the party.
0helpful
1answer

How can i block intruder?

If the Wireless device isn't secured, Secure it. Set up a SSID and Security Key(password). If it is secured, change the Security Key(password), Use the Linksys Setup Manual found here: http://support.linksys.com/en-us/support/routers/WRT120N Always Secure your Wireless. If unsecure your signal, at best, COULD be use by anyone to connect to the web using your resources and slowing down your activity. At worst, use your signal for nefarious purposes causing you a great deal of Pain and Heartache, and MAYBE the FBI knocking at your door.
0helpful
1answer

Data Breach SCDOR123

Click start control panel administrative tools computer management then select event viewer this may vary depending on what operating system you have extend the events there you will see errors in red you will no what exactly what the error was and at what time it occured Right click on the error message select properties you will see all details about the error or click start type in event viewer press ENTER you might be able work your way through the problem
Data and security breaches Businesses store vast amounts of information. A security breach occurs when an intruder, employee or outsider gets past an organization's security measures and policies to access the data. This sort of security breach could compromise the data and harm people. There are various state laws that require companies to notify people who could be affected by security breaches.

Physical Security Breach One form of breach is a physical security breach, wherein the intruder steals physical data, such as files or equipment that contains the data. Intruders could steal computers, particularly laptops, for this purpose. Businesses should monitor access to their property to cut down on such incidents and require employees to lock away their laptops when not in use. b> Electronic Security Breach b> Another form of breach is an electronic security breach, wherein the intruder gets into a business' systems to access sensitive data. The intruder gains such access by taking advantage of any weaknesses in the systems, such as inadequate firewall protection. This could also happen if the organization does not have adequate password protection for sensitive data. This sort of security breach is one reason businesses should perform constant security updates. b> Data Capture Security Breach b> Data capture, or skimming, is a practice whereby the intruder captures and records the data on a magnetic card stripe, such as on a credit card. This form of security breach helps the intruder produce copies of credit and debit cards. The intruder could either be an employee of a merchant who handles the customer's card, or it could be an external intruder. An external intruder could attach a device to card readers or ATM machines to skim information. b> Business Response b> Businesses should be wary of security breaches. Best practices for businesses to follow include having a policy in place to deal with any incidents of security breaches. They should identify what information has been compromised and decide who are the appropriate regulatory authorities to which they should report. Affected customers should also be notified. b> Potential Threats b> Start by identifying potential threats and vulnerabilities in your organization. Employees, temps or newly fired workers who have access to data represent one such threat. Hackers trying to crack your security are another. If your business or customer data passes into the hands of third parties -- vendors, business partners or bankers, for instance -- those parties may prove to be another weak spot. Review your security systems for any obvious flaws; Risk Analytics rates incorrectly configured firewalls as one of the top security threats. b> Calculating Risk b> Once you have a list of potential threats, document which ones represent serious risks. A low-level employee who doesn't have computer access poses less of a risk than an IT staffer with a grudge. If your company doesn't have data-handling procedures to prevent accidentally revealing customer data, that's another serious risk. When calculating the level of risk, consider all the potential negative effects, such as the loss of customers, the loss of money, having to shut down your network temporarily and the blow to your company's image. Security b> Once you document the breach risks, shore up your security to prevent them. Start with the most potentially catastrophic breaches. Preventing breaches requires more than encryption and other technical fixes: Consider the human side of security, such as employees who use easily hackable passwords or don't take security seriously. Think about the security of your business partners' operation as well as your own. If you encrypt key data and carefully regulate access, you still have a problem if your partners don't follow equally strict policies. b> Rethinking b> Never assume that, once you've documented your breach risks, you can rest easy. The information technology landscape changes constantly, creating new vulnerabilities. Mobile-payment technologies that allow shoppers to make credit and debit purchases with smartphones, for instance, are a new field. The field is growing steadily, but it lacks any common security standard. The apps are easy to develop, but developers do not always make security a priority. Review the risks created by new technology if you want to stay on top of new breach dangers. Hope this helps


b>
0helpful
1answer

How do I turn on my laptop in order to use ot wirelessly?

Hi

Enable your wireless connections and search for wireless connection that in unsecured or secured connection. For secured connection, you need to encode the WEP password to be able to access into the internet. For unsecured connection, you can connect directly and automatically.

I hope it helps you.
0helpful
1answer

Vista attempts to connect with the router "unsecured network"

Hi Friend,

If the security is enabled on your computer then on router the security has to be enabled.

Please follow the steps:

1.Open the router page (192.168.0.1)
2.Enter the username and password
3.ClickWireless settings and fill the section as mention

Name(SSID)-As per your choice
Region-As per your location
Channel-6
Mode-Auto

Security options
WEP

Security Encryption
Authentication-Automatic
Encryption strength-64bit

Security Encryption key
Key1-type a 10 digit password

Click Apply. Turn off the router for 30 seconds and turn it on again.

I hope this will resolve the issue.

Regards
Chiranjeet
0helpful
1answer

My linksys says it is unsecured. how do i make it secured?

I found a link on how you can secure your wireless network. Click here. Let me know if you will still have a problem.
Not finding what you are looking for?

34 views

Ask a Question

Usually answered in minutes!

Top Belkin Computers & Internet Experts

ExpressFiX
ExpressFiX

Level 2 Expert

691 Answers

Brad Brown

Level 3 Expert

19187 Answers

Alexander

Level 2 Expert

171 Answers

Are you a Belkin Computer and Internet Expert? Answer questions, earn points and help others

Answer questions

Manuals & User Guides

Loading...