{"id":31,"date":"2007-10-11T07:20:11","date_gmt":"2007-10-11T05:20:11","guid":{"rendered":"http:\/\/blog.intego.com\/2007\/10\/11\/learn-how-to-keep-your-wifi-network-fully-secure\/"},"modified":"2007-10-11T07:20:11","modified_gmt":"2007-10-11T05:20:11","slug":"learn-how-to-keep-your-wifi-network-fully-secure","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/learn-how-to-keep-your-wifi-network-fully-secure\/","title":{"rendered":"Learn How to Keep Your WiFi Network Fully Secure"},"content":{"rendered":"<p>&#8220;It&#8217;s ten o&#8217;clock\u2014do you know who&#8217;s using your wireless network? If you haven&#8217;t changed the default network name or admin password someone could be eavesdropping on your email, plucking your passwords out of the air, or sending spam through your Internet connection right now! When you&#8217;re using a wireless network\u2014whether a Macintosh with AirPort gear, Windows with any Wi-Fi equipment, or a Wi-Fi handheld like the iPhone\u2014you&#8217;re exposed to risk unless you take steps.&#8221;<\/p>\n<p>Wireless networking experts Glenn Fleishman and Adam Engst have just released a new edition of their ebook, <a href=\"http:\/\/www.takecontrolbooks.com\/wifi-security.html\">Take Control of Your WiFi Security<\/a>, a 114-page downloadable ebook in PDF format, that is available for only $10. While programs such as <a href=\"https:\/\/www.intego.com\/netbarrier\/\">Intego NetBarrier<\/a> protect your Mac from hackers and vandals, using WiFi networks can raise other risks: eavesdropping, snooping, data interception and more. Learn how to secure your network, and learn about safe computing when you&#8217;re using public hotspots. Make sure that all your surfing is safe and secure! <\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;It&#8217;s ten o&#8217;clock\u2014do you know who&#8217;s using your wireless network? If you haven&#8217;t changed the default network name or admin password someone could be eavesdropping on your email, plucking your passwords out of the air, or sending spam through your Internet connection right now! When you&#8217;re using a wireless network\u2014whether a Macintosh with AirPort gear, [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"&quot;It&#039;s ten o&#039;clock\u2014do you know who&#039;s using your wireless network? If you haven&#039;t changed the default network name or admin password someone could be\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/learn-how-to-keep-your-wifi-network-fully-secure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Learn How to Keep Your WiFi Network Fully Secure - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"&quot;It&#039;s ten o&#039;clock\u2014do you know who&#039;s using your wireless network? If you haven&#039;t changed the default network name or admin password someone could be\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/learn-how-to-keep-your-wifi-network-fully-secure\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2007-10-11T05:20:11+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/learn-how-to-keep-your-wifi-network-fully-secure\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/learn-how-to-keep-your-wifi-network-fully-secure\/\",\"name\":\"Learn How to Keep Your WiFi Network Fully Secure - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"datePublished\":\"2007-10-11T05:20:11+00:00\",\"dateModified\":\"2007-10-11T05:20:11+00:00\",\"description\":\"\\\"It's ten o'clock\\u2014do you know who's using your wireless network? If you haven't changed the default network name or admin password someone could be\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/learn-how-to-keep-your-wifi-network-fully-secure\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/learn-how-to-keep-your-wifi-network-fully-secure\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/learn-how-to-keep-your-wifi-network-fully-secure\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Learn How to Keep Your WiFi Network Fully Secure\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/learn-how-to-keep-your-wifi-network-fully-secure\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/learn-how-to-keep-your-wifi-network-fully-secure\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Learn How to Keep Your WiFi Network Fully Secure\",\"datePublished\":\"2007-10-11T05:20:11+00:00\",\"dateModified\":\"2007-10-11T05:20:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/learn-how-to-keep-your-wifi-network-fully-secure\/#webpage\"},\"wordCount\":173,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"\"It's ten o'clock\u2014do you know who's using your wireless network? If you haven't changed the default network name or admin password someone could be","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/learn-how-to-keep-your-wifi-network-fully-secure\/","og_locale":"en_US","og_type":"article","og_title":"Learn How to Keep Your WiFi Network Fully Secure - The Mac Security Blog","og_description":"\"It's ten o'clock\u2014do you know who's using your wireless network? If you haven't changed the default network name or admin password someone could be","og_url":"https:\/\/www.intego.com\/mac-security-blog\/learn-how-to-keep-your-wifi-network-fully-secure\/","og_site_name":"The Mac Security Blog","article_published_time":"2007-10-11T05:20:11+00:00","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/learn-how-to-keep-your-wifi-network-fully-secure\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/learn-how-to-keep-your-wifi-network-fully-secure\/","name":"Learn How to Keep Your WiFi Network Fully Secure - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"datePublished":"2007-10-11T05:20:11+00:00","dateModified":"2007-10-11T05:20:11+00:00","description":"\"It's ten o'clock\u2014do you know who's using your wireless network? If you haven't changed the default network name or admin password someone could be","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/learn-how-to-keep-your-wifi-network-fully-secure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/learn-how-to-keep-your-wifi-network-fully-secure\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/learn-how-to-keep-your-wifi-network-fully-secure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Learn How to Keep Your WiFi Network Fully Secure"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/learn-how-to-keep-your-wifi-network-fully-secure\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/learn-how-to-keep-your-wifi-network-fully-secure\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Learn How to Keep Your WiFi Network Fully Secure","datePublished":"2007-10-11T05:20:11+00:00","dateModified":"2007-10-11T05:20:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/learn-how-to-keep-your-wifi-network-fully-secure\/#webpage"},"wordCount":173,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-v","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/31"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=31"}],"version-history":[{"count":0,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/31\/revisions"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=31"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=31"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=31"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}