How to encrypt data on lan (i m already using it password protected/authorised)?

write your query clearly.There are different kinds of encryption but what type of it, is required by you? Anyways here it goes and tell if it helped or not by posting comment on the site so that i can help further. you have to read these things because i dont know which encryption are you using WEP or WPA.


KEY POINT to prevent misuse of WiFi Facility by unauthorized user, ALWAYS USE Security feature of WiFi router given above and repeated below again:

SSID : The SSID is a unique name to identify the ADSL Router in the wireless LAN. Wireless clients associating to the ADSL Router must have the same SSID.
Broadcast SSID Select No to hide the SSID such that a station can not obtain the SSID through passive scanning. Select Yes to make the SSID visible so a station can obtain the SSID through passive scanning.

Wireless LAN :: WEPWEP (Wired Equivalent Privacy) encrypts data frames before transmitting over the wireless network. Select Disable to allow all wireless computers to communicate with the access points without any data encryption.Select 64-bit WEP or 128-bit WEP to use data encryption.Key#1~Key#4 The WEP keys are used to encrypt data. Both the ADSL Router and the wireless clients must use the same WEP key for data transmission.If you chose 64-bit WEP, then enter any 5 Characters each key (1-4). If you chose 128-bit WEP, then enter 13 characters for each key (1-4).The values must be set up exactly the same on the Access Points as they are on the wireless client stations. The same value must be assigned to Key 1 on both the access point (your ADSL Router) and the client adapters, the same value must be assigned to Key 2 on both the access point and the client stations and so on, for all four WEP keys.
Wireless LAN :: WPA-PSKWi-Fi Protected Access, pre-shared key. Encrypts data frames before transmitting over the wireless network.Pre-shared Key The Pre-shared Key are used to encrypt data. Both the ADSL Router and the wireless clients must use the same WPA-PSK key for data transmission. Key Length 8 – 64 characters.

Wireless LAN :: MAC FilterYou can allow or deny a list of MAC addresses associated with the wireless stations access to the ADSL Router.Status Use the drop down list box to enable or disable MAC address filtering.Action Select Deny Association to block access to the router, MAC addresses not listed will be allowed to access the router. Select Allow Association to permit access to the router, MAC addresses not listed will be denied access to the router.


Or if you want folder encryption goto this site to download encryption software but all are shareware if i find some freeware then will post on this site :

http://www.hiteksoftware.com/autokrypt/download_file_encryption.htm

http://www.all-internet-security.com/encryption/


Say no to WEP & use WPA:

Back when the first consumer WLAN hardware hit the streets more than six years ago, they came with a technology called WEP, or wired equivalent privacy
WEP was designed to protect a wireless network from eavesdropping, but it soon became apparent that due to myriad flaws, WEP's privacy was not at all equivalent to that of a wired network. Therefore, it wasn't long (though at the time it seemed like forever) before a new technology called WPA — Wi-Fi Protected Access — debuted to address many of WEP's shortcomings.
WPA has been a mainstream technology for years now, but WEP remains a standard feature on virtually every wireless router on store shelves today. Although it's mainly there for backward compatibility with the oldest hardware, if reports and studies are accurate, a significant percentage of WLANs operating today (especially those used in homes) are still using outdated and insecure WEP for their encryption.
Widespread use of WEP is almost understandable given that to the layperson, the similar abbreviations WEP and WPA don't convey any meaningful difference between the two security methods (and they may even imply equivalence) Plus, WEP is almost always presented first by the security interface of most broadband routers since WEP comes before WPA both historically and alphabetically).
This week we'll take a look at why you shouldn't be using WEP anymore, and why WPA is a better choice.
WEP — The Weak Encryption Protocol
WEP's major weakness is its use of static encryption keys. When you set up a router with a WEP encryption key, that one key is used by every device on your network to encrypt every packet that's transmitted. But the fact that packets are encrypted doesn't prevent them from being intercepted, and due to some esoteric technical flaws it's entirely possible for an eavesdropper to intercept enough WEP-encrypted packets to eventually deduce what the key is.
This problem used to be something you could mitigate by periodically changing the WEP key (which is why routers generally allow you to store up to four keys). But few bother to do this because changing WEP keys is inconvenient and time-consuming — it has to be done not just on the router, but on every device that connects to it. As a result, most people just set up a single key and then continue using it ad infinitum.
A recent development reinforces how even changing WEP keys frequently is no longer sufficient to protect a WLAN. The process of "cracking" a WEP key used to require that a malicious hacker intercept millions of packets plus a fair amount of time and computing power.
But technology moves fast, and that's no longer the case. In fact, researchers in the computer science department of a German university recently demonstrated the capability to compromise a WEP-protected network very quickly. After spending less than a minute intercepting data (fewer than 100,000 packets in all) they were able to compromise a WEP key in just three seconds, and they did it using a system equipped with a mere 1.7 GHz Pentium M CPU, which is less powerful than the processor found in today's entry-level notebooks.
Of course, none of this means that there's necessarily someone lurking outside your window with the capability or desire to hack your wireless network in the blink of an eye. But given that it can be broken increasingly easily with commonly available equipment and software.

*** Important***

Switch to WPA
Even if your router is several years old, it almost certainly supports some form of WPA (and if it doesn't, upgrading to the latest firmware may fix that). The easiest-to-use and most widely supported version is WPA Personal, sometimes referred to as WPA Pre-Shared Key (PSK).
To encrypt a network with WPA Personal/PSK you provide your router not with an encryption key, but rather with a plain-English passphrase between 8 and 63 characters long. Using a technology called TKIP (for Temporal Key Integrity Protocol), that passphrase, along with the network SSID, is used to generate unique encryption keys for each wireless client. And those encryption keys are constantly changed. (Although WEP also supports passphrases, it does so only as a way to more easily create static keys, which are usually comprised of the hex characters 0-9 and A-F).
Unfortunately, there are still wireless devices being sold today — mostly of the consumer electronics variety — that don't support WPA. Frankly, you should avoid buying any wireless device that does not support WPA. When it comes to regular PCs, WPA is supported by both Windows XP with Service Pack 2 and Mac OS X (as well as Windows Vista, naturally). In XP you won't find WPA options in the Data encryption drop-down menu found within the properties sheet for a wireless network connection. Look for it instead under Network Authentication, and then make sure that the choice you make for Data encryption — TKIP or AES — matches what your router is set for. (Many routers support AES, which offers stronger encryption that the kind used by TKIP.)
Properly configured, WPA offers you infinitely better protection than WEP.
If your router or its firmware is of relatively recent vintage (within the last 18-24 months), it may support WPA2, which provides further improvements over WPA, including using AES encryption by default.

No comments: