Wi-Fi Protected Access or the second generation WPA2, is perhaps your best defence for wireless security, although it is not bullet proof, it is much stronger than WEP. WPA was developed because it was acknowledged that tougher measures than WEP was needed to keep intruders out.
WPA2, is also recognized as 802.11, and although is may still be penetrable, some special knowledge may be needed along with a very powerful computer, and a lot of determination.
Similar to WEP, WPA uses a code at each end of the wireless connection, however, it's in the form of a phrase. When the WPA is initially set-up, you are asked for a passphrase.
It may be best to use an easy to remember phrase, such as “The cow jumped over the blue moon”.
Here are the step-by-step instructions:
1) Access the router's settings by entering the IP address in your web browser.
2) On the home tab, click the wireless button
3) Choose the WPA-PSK radio button and you should be presented with 2 pass-phrase input boxes.
4) Enter a phrase that you can easily recall.
5) Click Apply, and the router should restart.
6) After the router has re-started, you will need to reconnect
7) For updated version of Windows, you can connect using the network icon on the system tray, and “connect to a network” You can then find the access point that was secured, which should now be labeled as enabled.
8) Enter the WPA passphrase, that was set in the router, and you should be able enter the network.
If you have problems connecting with older browsers, and it displays the message that “settings saved on the computer do not match the requirements of the network”, do not despair, you do not need to do anything drastic, such as replacing your computer or router.. You can easily edit the settings.
Right click and choose Properties, and then enter the type. Choose either WPA2 personal or WPA-Personal in the security type depending on you the type that was chosen in the initial set-up.
In the encryption type,you can choose the one that matches the option chosen. Or may have had the option to select either TKIP or AES in the router settings.
There are a few very important points of which you should take note.
Remember that the same passphrase is used for all wireless computers and devices, that connect to your Wi-Fi router. You will need to configure the other devices that use the Wi-Fi network.
Using the Dynamic Host Configuration Protocol log, you can detect unwanted visitors who may have accessed your network.
When a computer joins a network, the IP address is needed so that information is sent to the proper location. The address used is an internal address that is used only on the home network.
A home router looks like a computer to the Internet, because it has only one public IP, however the router manages the flow of data from several computers, and uses the internal IP addresses that are assigned by the DHCP. The log contains the list of clients or IP addresses that have accessed the network.
You can identify the computers by using both the IP address the MAC address that is specific to the computer.
Victor Chambers
About the Guest Author:
Victor Chambers is a computer expert specializing in software reviews and Windows tips and tricks, he is also a contributor to web site www.dailydeals4you.com, which provides bitdefender coupons. He has also investigated several AV applications and can recommend norton coupons.
WPA2, is also recognized as 802.11, and although is may still be penetrable, some special knowledge may be needed along with a very powerful computer, and a lot of determination.
Similar to WEP, WPA uses a code at each end of the wireless connection, however, it's in the form of a phrase. When the WPA is initially set-up, you are asked for a passphrase.
It may be best to use an easy to remember phrase, such as “The cow jumped over the blue moon”.
Here are the step-by-step instructions:
1) Access the router's settings by entering the IP address in your web browser.
2) On the home tab, click the wireless button
3) Choose the WPA-PSK radio button and you should be presented with 2 pass-phrase input boxes.
4) Enter a phrase that you can easily recall.
5) Click Apply, and the router should restart.
6) After the router has re-started, you will need to reconnect
7) For updated version of Windows, you can connect using the network icon on the system tray, and “connect to a network” You can then find the access point that was secured, which should now be labeled as enabled.
![]() |
Image Licensed Under Attribution |
8) Enter the WPA passphrase, that was set in the router, and you should be able enter the network.
If you have problems connecting with older browsers, and it displays the message that “settings saved on the computer do not match the requirements of the network”, do not despair, you do not need to do anything drastic, such as replacing your computer or router.. You can easily edit the settings.
Right click and choose Properties, and then enter the type. Choose either WPA2 personal or WPA-Personal in the security type depending on you the type that was chosen in the initial set-up.
In the encryption type,you can choose the one that matches the option chosen. Or may have had the option to select either TKIP or AES in the router settings.
There are a few very important points of which you should take note.
Remember that the same passphrase is used for all wireless computers and devices, that connect to your Wi-Fi router. You will need to configure the other devices that use the Wi-Fi network.
Using the Dynamic Host Configuration Protocol log, you can detect unwanted visitors who may have accessed your network.
When a computer joins a network, the IP address is needed so that information is sent to the proper location. The address used is an internal address that is used only on the home network.
A home router looks like a computer to the Internet, because it has only one public IP, however the router manages the flow of data from several computers, and uses the internal IP addresses that are assigned by the DHCP. The log contains the list of clients or IP addresses that have accessed the network.
You can identify the computers by using both the IP address the MAC address that is specific to the computer.
About the Guest Author:
Victor Chambers is a computer expert specializing in software reviews and Windows tips and tricks, he is also a contributor to web site www.dailydeals4you.com, which provides bitdefender coupons. He has also investigated several AV applications and can recommend norton coupons.