Ed Bott - Windows 10 Support Secrets
69 CHAPTER 5 | Connecting to the Internet and cloud services Most of the options on the Network Status page under the Change Your Network Settings heading require some technical knowledge to understand properly. But even nontechnical users should know about the View Your Network Properties link, which shows details about each network adapter, including technical details about its configuration that might be useful when calling a support tech or help desk. Note It’s practically a tech support cliché, but for most networking problems, the first piece of advice to offer users is “Have you tried turning it off and then back on again?” That applies not just to the computer but also to the router or gateway device that connects to the Internet service provider. Many times, a restart of one or both of those devices is all it takes to clear up a transient problem. Working with Wi-Fi Thanks to the ubiquitous Wi-Fi standard, notebooks and tablets can connect to the Internet so that you can get things done at home, on the road, or even in the air. When Windows 10 detects that a wireless connection is available, it displays a dimmed wireless icon in the notification area, with a gleaming highlight in the upper-left corner. Clicking that icon opens the list of available networks, and when you click any one of those networks you can try to connect. Note that I said “try to connect.” Security is a big deal on wireless networks, and how you connect—or even whether you are allowed to do so—depends on the security configuration of the network. You’re most likely to encounter three options: Open network These types of networks are often found in coffee shops and airports. They use no encryption on local network traffic and thus require no password or security key. An attacker could lurk in the vicinity of an open access point and intercept traffic from anyone attached to that access point. You should be extremely careful with open networks and never share any confidential information except over a secure (HTTPS) connection. Secured network (shared passkey) Home networks and secure public networks typically use WPA2 encryption. That requires you to enter a shared key that encrypts traffic between your PC and the wireless network. Although this configuration is much more secure than an open network, you should still exercise caution when using networks where you don’t know and trust the owner of the network. Enterprise network (802.1x) Large organizations can secure wireless networks using WPA2- Enterprise encryption, which requires a separate server that handles authentication. Instead of entering a shared passkey, you gain access to the network using your own credentials—typically your corporate email address and password. This is the most secure wireless configuration but usually requires an IT department to set up and run. Figure 5-3 shows the sign-in process for a WPA2-secured network using a shared key.
Made with FlippingBook
RkJQdWJsaXNoZXIy Mjk0MTY=