1. Enable Encryption on your Access Point. Using 128-bit encryption or higher makes your Wireless Network more secure. WEP and WPA are entirely different encryption schemes. WEP has been proven insecure. Using WPA is recommended, but actually no more secure than WEP. WPA is just a little friendlier to use.
  2. Set the &qt;&qt;Administrator&qt;&qt; password on the router. Anybody who gains access can use the &qt;&qt;default&qt;&qt; password to lock you out, or grant themselves more privileges (i.e. disable MAC address filtering or add one more MAC address to the MAC address filtering list so they don&qt;&qt;t always need to &qt;&qt;clone&qt;&qt; your MAC address to get in). If you forget it, most routers have a hardware reset that will restore all of the settings to factory defaults.
  3. Don&qt;&qt;t use easily guessed Keys, such as "ABC123", "Password", or a string of numbers in order. Use something hard to guess that contains both letters and numbers. Special characters such as !@#$&qt; are not supported by most routers. The longer the key, the better. Using the Passwords Page on GRC.com is recommended.
  4. Change your ESSID (Wireless Network Name)from the default to something unique. Don&qt;&qt;t use your phone number, address, or anything that may identify you. If you leave it &qt;&qt;linksys&qt;&qt; (or whatever default) your Windows notebook will automatically connect to every other network it encounters with the same name, and not every wireless network is a good and secure thing to connect to.
  5. Disable the &qt;&qt;ESSID Broadcast&qt;&qt; feature of your Access Point or Router. People will be less likely to pass by and notice your network. On the down-side, it becomes problematic to connect a guest&qt;&qt;s computer to it, as well as many &qt;&qt;devices&qt;&qt;, like printers with wireless networking built in.
  6. Use MAC Address filtering on your Access Point or router. This registers the hardware address (MAC Address) of your networked devices, and prevents unknown devices from joining or accessing the network (unless they clone one of your &qt;&qt;allowed&qt;&qt; MAC addresses after you go to bed).