Glory routing four protection Wi-Fi master key can also network?


The "Wi-Fi Master Key", which is regarded as a net artifact by netizens, recently blew up a major problem involving the theft of a user's personal Wi-Fi password! When the average user selects default sharing, the App can access the Wi-store stored in the mobile phone system. The Fi password data file is uploaded to the cloud. When other users connect to Wi-Fi, they can automatically obtain the password from the cloud. After obtaining the Wi-Fi password, you can directly change the router parameters. If you are taken care of by a malicious person, you can directly tamper with the DNS. When you visit the online banking, Alipay and other pages, they will be linked to a dangerous phishing website; it may be overnight. Between you and your saved hard-earned money, you may not be left. You may also access private photos and videos on your computer through the local area network and publish them on the Internet.... This is not really sensational, and these are not inevitable.

How to avoid this kind of risk? On the one hand is to raise the awareness of network security, on the other hand, it is also crucial to choose a high-security wireless router. The newly released Glory Routing at the MWC2015 Conference today boasts four major security assurance technologies: "WPA/WPA2-PSK encryption," "anti-violence cracking algorithm," "visitor Wi-Fi isolation," and "a stranger's one-click blackout." Easy to eliminate such risks. Is it really true that these technologies are so reliable? Let's take a look together.


Protection 1: "WPA/WPA2-PSK" encryption

To improve security in a Wi-Fi environment, the most basic one is to have a good password encryption method to ensure that your password is not easily cracked by the intercept signal. Currently, there are three types of encryption for commercially available routers, including "WEP", "WPA/WPA2", and "WPA/WPA2-PSK." We do not need to study the principles of these three encryption methods, as long as we know that "WEP" is a relatively early encryption method, and it is now able to easily achieve the WEP encryption crack; and "WPA/WPA2" is based on WEP encryption evolution The third, "WPA/WPA2-PSK" is based on the same "WPA/WPA2" technology, but it is simplified for home users and is currently the most secure and easiest to implement. With the support of this technology, the traditional method of wireless password cracking has nearly become ineffective, giving home networks the most basic security guarantees.

Protection II: Anti-brute algorithm

Although there is a "WPA/WPA2-PSK" encryption network, because common home Wi-Fi will turn on SSID broadcasting (you can search for Wi-Fi network names by mobile phones and computers), hackers can also use another Methods to crack - exhaustive method. The so-called brute-force method is what we often say about brute-force cracking the network. You can try the password of the Wi-Fi network through any combination of numbers and letters until you combine your Wi-Fi network password. Most users will not deliberately change the login user name (admin) and password (admin) after purchasing the router. It will also allow hackers to easily crack and log in to the router and tamper with the settings. However, the game is very high-footed. Glorious routing combines the login password and Wi-Fi password together and uses algorithmic discrimination. Once too many logins are discovered in a short time, the device login is blocked, and the brute force algorithm is eliminated from the source. attack.

Protection 3: Visitor Wi-Fi Isolation

Proactive attacks are not difficult to defend, and sometimes you casually entertain with entertainment instead of limiting your Wi-Fi environment to danger. Now that the three or five friends and relatives come to the door, the first question is often: "What is your home Wi-Fi password?" Many people relax their vigilance and blurt out their passwords. Although relatives and friends are not malicious, if they are equipped with rogue software such as "Wi-Fi master key," then the Wi-Fi password in your home is equivalent to being written on every mobile phone equipped with this rogue software. , making the Wi-Fi password in your home the "password" that the world knows. In this case, Glory Routing can provide the "Guest Mode" Wi-Fi environment for relatives and friends separately from the home network. The benefits of doing so will not allow visitors to see the shared content of the home network to avoid embarrassment, and will not reveal the impact of private Wi-Fi password on the home network environment.

Not only that, "Guest Mode" can also set different Wi-Fi names and passwords, which is totally different from home networks. What's more, "Guest mode" can also set automatic switch duration, such as a dinner dinner, just open the guest mode in the HiLink mobile app and schedule it for 4 hours. After the guest leaves the guest network Will automatically shut down. Hackers have also been "netless" to attack.

Protection 4: Strangers pull black

Although it seems that the first three kinds of protection measures seem to be enough to give us an absolutely secure network environment. However, Wi-Fi networks in the family may still be stolen by other external factors such as dictation, eavesdropping, and so on. Then we have no way? Of course not, Hi-Ring Route HiLink App provides a "strange black button" function, once the unknown device is detected will be promptly reminded directly in the mobile phone App "can be a black button "Let the intruder's equipment permanently fail to log in again to ensure the security of the network environment.


In today's "it's all-pervasive, you have no place to hide," today, all kinds of "keys" may help users get a small profit, but the network security should not be underestimated. The advanced breakthroughs in the security of glory routing and the evolution of intelligence will surely better protect the interests of ordinary consumers. Today, paying attention to cyber security begins with glory routing.

Recommended installation sofa butler, download address: http://app.shafa.com/
Hot Apps Recommended: HDP VST All-in-one Fast-viewing film Dragons Live Karaoke King TV Thumb Playing ZAKER

Posted on