programming4us
programming4us
DESKTOP

Windows 8 : Configuring networking (part 7) - Managing network settings - Managing a wireless network

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

Managing a wireless network

You can manage the wireless network by using the options presented in the shortcut menu that you opened in the previous procedure and that was shown in Figure 17:

  • Hide Estimated Data Usage Hides the statistics that you see about estimated usage.

  • Set As Metered Connection Instructs Windows to use the data connectivity of this device sparingly.

  • Forget This Network Disconnect from this network and forget it. This erases the network from Windows memory. If you want to reconnect to this network later, you need to go through the connection process again.

  • Turn Sharing On Or Off Enable or disable the sharing option on this connection.

  • View Connection Properties Opens a traditional Windows dialog box with additional configuration options for this network (Figure 18).

Available new wireless networking management options

Figure 18. Available new wireless networking management options

There are two tabs on the properties page for this network, and each has a number of options that you can configure or view.

Connection Properties

The Connection Properties page provides you with general information about the configuration of the network adapter:

  • Name This field displays the name of the network as Windows has it stored.

  • SSID The service set identification (SSID) is the identifier that the wireless access point broadcasts when it advertises itself as available for connections.

  • Network Type Most often, you will connect to an access point–type network. In this configuration, your computer is connected to a wireless access point, which acts as the doorway to the network. Sometimes, you might participate in an ad hoc network, which provides direct, computer-to-computer wireless communication without an access point present.

  • Network Availability This network is available to all users of this Windows 8–based computer.

  • Connect Automatically When This Network Is In Range When selected, if the Windows 8 device enters the range of this network, the device will automatically connect to the network.

  • Look For Other Wireless Networks While Connected To This Network When selected, Windows 8 continues to look for other wireless networks, even if the current one is usable.

  • Connect Even If The Network Is Not Broadcasting Its Name (SSID) For security reasons, some wireless network operators hide their SSID. Windows 8 can still connect to these networks as long as the SSID is already known.

Security Properties

The Security Properties page provides options for securing the wireless network by using one of a number of options:

  • Security Type Choose from a number of security options.

    • No security This is a wireless network that has no security built in. It is considered dangerous computing to use a wireless network that has no security.

    • WPA2-Personal Wi-Fi Protected Access version 2 for personal use. This security option uses a pre-shared key—a password—to enable access to the network.

    • WPA-Personal Wi-Fi Protected Access version 1 for personal use. This version is not nearly as attack resistant as WPA2.

    • WPA2-Enterprise Wi-Fi Protected Access version 2 for enterprise use. Enterprise-grade WPA and WPA2 use Secure Socket Layer (SSL) certificates to secure communication between clients and the wireless network. WPA2 Enterprise is the most secure wireless option currently available.

    • WPA-Enterprise Wi-Fi Protected Access version 2 for enterprise use.

    • 802.1X An authentication method that is used in some enterprises.

  • Encryption Type There are different kinds of encryption that can be used to secure wireless communication.

  • Network Security Key If you’ve selected a Personal option, this is the password for the network.

  • Show Characters Display the actual Network Security Key instead of dots.

Other  
  •  Managing Windows 8 native applications (part 4) - Sideloading apps in Windows 8,Inventorying and removing apps
  •  Managing Windows 8 native applications (part 3) - Controlling applications by using AppLocker
  •  Managing Windows 8 native applications (part 2) - Disabling and controlling access to the Windows Store app , Managing access to hardware and installed applications
  •  Managing Windows 8 native applications (part 1) - Installing, updating, and uninstalling Windows 8 native applications, Reinstalling apps that have been removed
  •  Windows 8 : Managing traditional desktop applications (part 2) - Controlling program settings for traditional applications
  •  Windows 8 : Managing traditional desktop applications (part 1) - Using Windows Installer in Windows 8, Running Windows Installer packages and MSIExec
  •  Windows Server 2008 R2 : Active Directory certificate services (part 2) - Deploying Active Directory Certificate Services
  •  Windows Server 2008 R2 : Active Directory certificate services (part 1) - Planning for Active Directory Certificate Services
  •  Windows Server 2008 R2 : Administering group policy (part 2) - Creating and managing Group Policy Objects, Troubleshooting Group Policy
  •  Windows Server 2008 R2 : Administering group policy (part 1) - Overview of Group Policy
  •  
    Top 10
    Free Mobile And Desktop Apps For Accessing Restricted Websites
    MASERATI QUATTROPORTE; DIESEL : Lure of Italian limos
    TOYOTA CAMRY 2; 2.5 : Camry now more comely
    KIA SORENTO 2.2CRDi : Fuel-sipping slugger
    How To Setup, Password Protect & Encrypt Wireless Internet Connection
    Emulate And Run iPad Apps On Windows, Mac OS X & Linux With iPadian
    Backup & Restore Game Progress From Any Game With SaveGameProgress
    Generate A Facebook Timeline Cover Using A Free App
    New App for Women ‘Remix’ Offers Fashion Advice & Style Tips
    SG50 Ferrari F12berlinetta : Prancing Horse for Lion City's 50th
    - Messages forwarded by Outlook rule go nowhere
    - Create and Deploy Windows 7 Image
    - How do I check to see if my exchange 2003 is an open relay? (not using a open relay tester tool online, but on the console)
    - Creating and using an unencrypted cookie in ASP.NET
    - Directories
    - Poor Performance on Sharepoint 2010 Server
    - SBS 2008 ~ The e-mail alias already exists...
    - Public to Private IP - DNS Changes
    - Send Email from Winform application
    - How to create a .mdb file from ms sql server database.......
    programming4us programming4us
    programming4us
     
     
    programming4us