Read More
Tips on Protecting Your Router

Tips on Protecting Your Router

Everyone knows D-Link routers are fast and easy to set up – what they often forget is how they work to protect your network against unwanted intruders like Wi-Fi viruses, information hackers and neighbors who just want to leech your bandwidth. Simply protecting your network with a password/encryption key adds an essential layer of basic security that even the most persistent of neighbors can’t always break through.


WEP is the lower level of wireless encryption, thus we don’t suggest configuring it on your device. WEP stands for Wired Equivalent Privacy and is a protocol that adds security to wireless networks, designed to give them the equivalent level of privacy protection as a comparable wired network. WEP encryption requires a ten-character password comprised of letters and/or numbers. While easy to remember, WEP is being phased out, as it is said to be less reliable and less secure than WPA and WPA2 due to its limited number of password combinations. For the best network security we recommend the following…


WPA (Wi-Fi Protected Access) offers the next level of security over WEP. It features TKIP integration, which generates a new key for each packet of information – making your network even more secure.  WPA2 is the next level in securing your network and replaces TKIP with an AES encryption method, which is much stronger. WPA2 allows you to feel secure knowing that no unwanted users can access your  wireless network, making it safe for not only yourself but any other authorized users. 


WPS (Wi-Fi Protected Setup) is push button technology that is compatible with WPA/WPA2 and allows you to easily secure your home wireless network. With WPS you are able  to set up and connect all of your devices (laptop, printer, smartphone, etc.) to one secured network. WPS randomly generates your password, configures your network name and WPA security key so that your can simply use a personal identification number (PIN) to log in, eliminating the need to remember a long password. 

Whatever method you choose, when you buy a D-Link router, you can count on the fact that we’re always working to ensure you have the latest standards of protection. Speed and security – with D-Link routers, you don’t have to compromise.

For more tips on wireless security check out this blog on password protection.

Tags: , , , , , , , , , , , , , , , , , , , , , , ,


  1. Where are they available and how much $. Sudbury Ontario P0m1l0

    • Hi Luc – These types of password and encryption keys are just something you want to look for when choosing a router as they’re not necessarily something you can purchase as an add-on.

  2. Is there a way in which the average less tech savy person can detect hacked activity on their system?

    Thanks for your time and consideration,


    • Hi Dr. Winbush – Common signs of a possible virus or being hacked are usually reported by any new and unusual activity. Excess popups, unwanted downloads or software installs and fake virus warnings are all things you should take notice of. If there is ever any sign or possibility of malicious software you should immediately conduct a virus scan from a trusted anti-malware program and change any passwords you think may have been compromised. Here is another blog with a few tips on network security that might help as well.

  3. Can The router Get virus? Have it someone Virus Protect?

    • Hi Kund – Yes, routers are susceptible to a computer virus and especially to denial-of-service (DoS) or distributed denial-of-service (DDoS) attacks which are basically attempts to make a machine or network resource unavailable to its intended users. The best way to defend against these attacks are to create firewalls for your routers or set up a Virtual Private Network using NAT or Network Address Translation to hide/mask your true IP addresses from the others outside of your own internal network and of course use an antivirus protective software application on all your network connected devices if possible.

Post a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>


Register | Lost your password?