1, using a strong password. A strong enough password can make violent cracking impossible. On the contrary, if the password strength is not enough, it will almost certainly damage your system;
2. Control the Media Access Control (MAC) address. Hiding the service set identifier of wireless network and restricting the access of media access control (MAC) address to the network can ensure that the network will not be interfered by primary malicious attackers.
Please turn off the network when you are not using it. Whether this suggestion is adopted depends on the specific situation of the network. If you don't need to use the Internet 24 hours a day, seven days a week, you can take this measure. After all, in the case of closed network, security is the highest, and no one can connect to a non-existent network;
4. Turn off the wireless network interface. If you use a mobile terminal such as a laptop, the wireless network interface should be turned off by default. Only when you really need to connect to the wireless network, turn on the related functions. The rest of the time, the closed wireless network interface makes you not the target of malicious attacks;
5. Ensure the safety of the core. When leaving, make sure that the wireless router or laptop connected to the wireless network is running an effective firewall;
6. Be sure to shut down unnecessary services, especially those that are not needed under the Microsoft Windows operating system, because the consequences of their activities may be unexpected by default.