Categories
Arts & Humanities
Beauty & Style
Business & Finance
Cars & Transportation
Computers & Internet
Consumer Electronics
Education & Reference
Entertainment & Music
Family & Relationships
Food & Drink
Games & Recreation
Health
Home & Garden
Others
Politics & Government
Pregnancy & Parenting
Science & Mathematics
Society & Culture
Travel
| ||||||||
We need your help! Please help us improve our content by removing questions that are essentially the same and merging them into this question. Please tell us which questions below are the same as this one:
The following questions have been merged into this one. If you feel any of these questions have been included in error help us improve our content by splitting these questions into seperate discussions. Please unmerge any questions that are not the same as this one:
|
Leader BoardWhat's this?
Leading Today | Pts | Helpful | ||
1. | masterren | 200 | 65% | |
2. | ocram17 | 200 | 77% | |
3. | haize1021 | 200 | 74% | |
4. | just_anot | 200 | 86% | |
5. | Sumer pan | 200 | 100% | |
6. | Janvi1234 | 200 | 97% | |
7. | jaysonfur | 200 | 74% | |
8. | me.jagvin | 200 | 100% | |
9. | wannamini | 200 | 67% | |
10. | Waqar has | 200 | 94% | |
11. | Barbara B | 2 | 92% | |
12. | kfa13 | 0 | 72% | |
13. | assondhi | 0 | 83% | |
14. | Tommie | 0 | 77% | |
15. | Elijah | 0 | 64% | |
Leading this Week | Pts | Helpful | ||
1. | MD Wasim | 600 | 100% | |
2. | akosiars | 400 | 88% | |
3. | lanz08 | 400 | 65% | |
4. | lastname0 | 400 | 77% | |
5. | Arbi2k | 400 | 83% | |
6. | rein14 | 400 | 64% | |
7. | Barbara B | 327 | 92% | |
8. | Qudagwo | 272 | 67% | |
9. | akki786a | 204 | 97% | |
10. | Traw94 | 200 | 100% | |
11. | krizmae18 | 200 | 73% | |
12. | SlimingCh | 200 | 74% | |
13. | Abhishak | 200 | 99% | |
14. | maremare4 | 200 | 86% | |
15. | Bright Ab | 200 | 100% | |
16. | aaron.adz | 200 | 96% | |
17. | Surinder@ | 200 | 100% | |
18. | joey_moto | 200 | 68% | |
19. | chinthapa | 200 | 89% | |
20. | herjave02 | 200 | 75% | |
Leading this Month | Pts | Helpful | ||
1. | Arbi2k | 2000 | 83% | |
2. | MD Wasim | 1400 | 100% | |
3. | akosiars | 1400 | 88% | |
4. | Barbara B | 1109 | 92% | |
5. | lavignero | 1000 | 100% | |
6. | nazenborg | 800 | 82% | |
7. | krazeeme6 | 600 | 73% | |
8. | zessanne1 | 600 | 60% | |
9. | elitehear | 600 | 62% | |
10. | Aftab6. A | 600 | 100% | |
11. | kuramathe | 402 | 82% | |
12. | jennifer. | 400 | 68% | |
13. | rivrivlov | 400 | 100% | |
14. | 839581864 | 400 | 100% | |
15. | cattybroo | 400 | 86% | |
16. | Waqar has | 400 | 94% | |
17. | 805371234 | 400 | 98% | |
18. | irina1961 | 400 | 100% | |
19. | Rmclain | 400 | 100% | |
20. | bermudez1 | 400 | 100% | |
21. | peetabrar | 400 | 93% | |
22. | lastname0 | 400 | 77% | |
23. | haize1021 | 400 | 74% | |
24. | lanz08 | 400 | 65% | |
25. | ait1 | 400 | 75% |
The WPS push button (center, blue) on a wireless router showing the symbol defined by the Wi-Fi Alliance for this function. This statement works for WPS users.
Wi-Fi Protected Setup (WPS; originally, Wi-Fi Simple Config) is a network security standard to create a secure wireless home network.
Created by the Wi-Fi Alliance and introduced in 2006, the goal of the protocol is to allow home users who know little of wireless security and may be intimidated by the available security options to set up Wi-Fi Protected Access, as well as making it easy to add new devices to an existing network without entering long passphrases. Prior to the standard, several competing solutions were developed by different vendors to address the same need.[1]
A major security flaw was revealed in December 2011 that affects wireless routers with the WPS PIN feature, which most recent models have enabled by default. The flaw allows a remote attacker to recover the WPS PIN in a few hours with a brute-force attack and, with the WPS PIN, the network's WPA/WPA2 pre-shared key (a.k.a. PSK).[2] Users have been urged to turn off the WPS PIN feature,[3] although this may not be possible on some router models.[4] Game dev tycoon chart.
- 5Vulnerabilities
Modes[edit]
The standard emphasizes usability and security, and allows four modes in a home network for adding a new device to the network:
PIN method:
Push button method:
Near-field communication method:
USB method:
The last two modes are usually referred to as out-of-band methods as there is a transfer of information by a channel other than the Wi-Fi channel itself. Only the first two modes are currently[when?] covered by the WPS certification. The USB method has been deprecated and is not part of the Alliance's certification testing.
Some wireless access points have a dual-function WPS button, and holding this button down for a shorter or longer time may have other functions, such as factory-reset or toggling WiFi.[7]
Some manufacturers, such as Netgear, use a different logo and/or name for Wi-Fi Protected Setup;[8] the Wi-Fi Alliance recommends the use of the Wi-Fi Protected Setup Identifier Mark on the hardware button for this function.[9]
Technical architecture[edit]
The WPS protocol defines three types of devices in a network:
- Registrar
- A device with the authority to issue and revoke access to a network; it may be integrated into a wireless access point (AP), or provided as a separate device.
- Enrollee
- A client device seeking to join a wireless network.
- AP
- An access point functioning as a proxy between a registrar and an enrollee.
The WPS standard defines three basic scenarios that involve components listed above:
- AP with integrated registrar capabilities configures an Enrollee Station (STA)
- In this case, the session will run on the wireless medium as a series of EAP request/response messages, ending with the AP disassociating from the STA and waiting for the STA to reconnect with its new configuration (handed to it by the AP just before).
- Registrar STA configures the AP as an enrollee
- This case is subdivided in two aspects: first, the session could occur on either a wired or wireless medium, and second, the AP could already be configured by the time the registrar found it. In the case of a wired connection between the devices, the protocol runs over Universal Plug and Play (UPnP), and both devices will have to support UPnP for that purpose. When running over UPnP, a shortened version of the protocol is run (only two messages) as no authentication is required other than that of the joined wired medium. In the case of a wireless medium, the session of the protocol is very similar to the internal registrar scenario, but with opposite roles. As to the configuration state of the AP, the registrar is expected to ask the user whether to reconfigure the AP or keep its current settings, and can decide to reconfigure it even if the AP describes itself as configured. Multiple registrars should have the ability to connect to the AP. UPnP is intended to apply only to a wired medium, while actually it applies to any interface to which an IP connection can be set up. Thus, having manually set up a wireless connection, the UPnP can be used over it in the same manner as with the wired connection.
- Registrar STA configures enrollee STA
- In this case the AP stands in the middle and acts as an authenticator, meaning it only proxies the relevant messages from side to side.
Protocol[edit]
The WPS protocol consists of a series of EAP message exchanges that are triggered by a user action, relying on an exchange of descriptive information that should precede that user's action. The descriptive information is transferred through a new Information Element (IE) that is added to the beacon, probe response, and optionally to the probe request and association request/response messages. Other than purely informative type-length-values, those IEs will also hold the possible and the currently deployed configuration methods of the device.
After this communication of the device capabilities from both ends, the user initiates the actual protocol session. The session consists of eight messages that are followed, in the case of a successful session, by a message to indicate that the protocol is completed. The exact stream of messages may change when configuring different kinds of devices (AP or STA), or when using different physical media (wired or wireless).
Band or radio selection[edit]
Some devices with dual-band wireless network connectivity do not allow the user to select the 2.4 GHz or 5 GHz band (or even a particular radio or SSID) when using Wi-Fi Protected Setup, unless the wireless access point has separate WPS button for each band or radio; however, a number of later wireless routers with multiple frequency bands and/or radios allow the establishment of a WPS session for a specific band and/or radio for connection with clients which cannot have the SSID or band (e.g., 2.4/5 GHz) explicitly selected by the user on the client for connection with WPS (e.g. pushing the 5 GHz, where supported, WPS button on the wireless router will force a client device to connect via WPS on only the 5 GHz band after a WPS session has been established by the client device which cannot explicitly allow the selection of wireless network and/or band for the WPS connection method).[10][11]
A Telstra 4GX Advanced III mobile broadband device showing WPS pairing options for a particular radio/band.
Vulnerabilities[edit]
Online brute-force attack[edit]
In December 2011, researcher Stefan Viehböck reported a design and implementation flaw that makes brute-force attacks against PIN-based WPS feasible to be performed on WPS-enabled Wi-Fi networks. A successful attack on WPS allows unauthorized parties to gain access to the network, and the only effective workaround is to disable WPS.[3] The vulnerability centers around the acknowledgement messages sent between the registrar and enrollee when attempting to validate a PIN, which is an eight-digit number used to add new WPA enrollees to the network. Since the last digit is a checksum of the previous digits,[12] there are seven unknown digits in each PIN, yielding 107 = 10,000,000 possible combinations.
When an enrollee attempts to gain access using a PIN, the registrar reports the validity of the first and second halves of the PIN separately. Since the first half of the pin consists of four digits (10,000 possibilities) and the second half has only three active digits (1000 possibilities), at most 11,000 guesses are needed before the PIN is recovered. This is a reduction by three orders of magnitude from the number of PINs that would be required to be tested. As a result, an attack can be completed in under four hours. The ease or difficulty of exploiting this flaw is implementation-dependent, as Wi-Fi router manufacturers could defend against such attacks by slowing or disabling the WPS feature after several failed PIN validation attempts.[2]
A young developer based out of a small town in eastern New Mexico created a tool that exploits this vulnerability to prove that the attack is feasible.[13][14] The tool was then purchased by Tactical Network Solutions in Maryland for 1.5 million dollars. They state that they have known about the vulnerability since early 2011 and had been using it.[15]
In some devices, disabling WPS in the user interface does not result in the feature actually being disabled, and the device remains vulnerable to this attack.[4]Firmware updates have been released for some of these devices allowing WPS to be disabled completely. Vendors could also patch the vulnerability by adding a lock-down period if the Wi-Fi access point detects a brute-force attack in progress, which disables the PIN method for long enough to make the attack impractical.[16]
Offline brute-force attack[edit]
In the summer of 2014, Dominique Bongard discovered what he called the Pixie Dust attack. This attack works only for the default WPS implementation of several wireless chip makers, including Ralink, MediaTek, Realtek and Broadcom. The attack focuses on a lack of randomization when generating the E-S1 and E-S2 'secret' nonces. Knowing these two nonces, the PIN can be recovered within a couple of minutes. A tool called pixiewps has been developed[17] and a new version of Reaver has been developed to automate the process.[18]
Since both the access point and client (enrollee and registrar, respectively) need to prove they know the PIN to make sure the client is not connecting to a rogue AP, the attacker already has two hashes that contain each half of the PIN, and all they need is to brute-force the actual PIN. The access point sends two hashes, E-Hash1 and E-Hash2, to the client, proving that it also knows the PIN. E-Hash1 and E-Hash2 are hashes of (E-S1 | PSK1 | PKe | PKr) and (E-S2 | PSK2 | PKe | PKr), respectively. The hashing function is HMAC-SHA-256 and uses the 'authkey' that is the key used to hash the data.
Physical security issues[edit]
All WPS methods are vulnerable to usage by an unauthorized user if the wireless access point is not kept in a secure area.[19][20][21] Many wireless access points have security information (if it is factory-secured) and the WPS PIN printed on them; this PIN is also often found in the configuration menus of the wireless access point. If this PIN cannot be changed or disabled, the only remedy is to get a firmware update to enable the PIN to be changed, or to replace the wireless access point.
It is possible to extract a wireless passphrase with the following methods using no special tools:[22]
What Is Wi Fi Protected Setup
- A wireless passphrase can be extracted using WPS under Windows Vista and newer versions of Windows, under administrative privileges by connecting with this method then bringing up the properties for this wireless network and clicking on 'show characters'.
- A simple exploit in the Intel PROset wireless client utility can reveal the wireless passphrase when WPS is used, after a simple move of the dialog box which asks if you want to reconfigure this access point.[22]
- A generic service bulletin regarding physical security for wireless access points.
- A wireless router showing printed preset security information including the Wi-Fi Protected Setup PIN.
References[edit]
- ^Tim Higgins (2008-03-13). 'How is WPS supposed to work?'. Pudai LLC. Retrieved 2012-01-02.
- ^ abViehböck, Stefan (2011-12-26). 'Brute forcing Wi-Fi Protected Setup'(PDF). Retrieved 2011-12-30.
- ^ abAllar, Jared (2011-12-27). 'Vulnerability Note VU#723755 - WiFi Protected Setup PIN brute force vulnerability'. Vulnerability Notes Database. US CERT. Retrieved 2011-12-31.
- ^ abGallagher, Sean (2012-01-04). 'Hands-on: hacking WiFi Protected Setup with Reaver'. Condé Nast Digital. Retrieved 2012-01-20.
- ^P2P Spec 1.2, clause 3.1.4.3
- ^P2P Spec 1.2,
- ^[1] Tenda W311R+ product page: long press causes factory reset. Retrieved 18 January 2016; Draytek: Vigor 2820 Series manual: short press toggles WiFi
- ^'Netgear N600 Wireless Dual Band Gigabit ADS2+ Modem Router DGND3700 User Manual'(PDF). www.netgear.com. Retrieved January 16, 2016.
- ^'Wi-Fi Alliance Brand Style Guide 2014'(PDF). www.wi-fi.org. Wi-Fi Alliance. April 2014. Retrieved January 16, 2016.
- ^[2] 'D-Link DSL-2544N Dual Band Wireless N600 Gigabit ADSL2+ Modem Router User Manual, Version 1.0', Page 11, Retrieved 26 January 2016.
- ^NetComm NF8AC User Guide, Page 11, http://media.netcomm.com.au/public/assets/pdf_file/0004/142384/NF8AC-User-Guide.pdf , Retrieved October 16, 2016.
- ^'Windows Connect Now–NET (WCN-NET) Specifications'. Microsoft Corporation. 2006-12-08. Retrieved 2011-12-30.
- ^'reaver-wps'. Retrieved 2011-12-30.
- ^'Reaver demonstration on WPS - proof of concept'.
- ^Dennis Fisher (2011-12-29). 'Attack Tool Released for WPS PIN Vulnerability'. Retrieved 2011-12-31.
This is a capability that we at TNS have been testing, perfecting and using for nearly a year.
- ^Slavin, Brad (January 18, 2013). 'Wi-Fi Security – The Rise and Fall of WPS'. Netstumbler.com. Retrieved December 17, 2013.
- ^'pixiewps'. Retrieved 2015-05-05.
- ^'Modified Reaver'. Retrieved 2015-05-05.
- ^'WPS- Advantages and Vulnerability', ComputerHowToGuide.com, September 4, 2014, http://www.computerhowtoguide.com/2014/09/wps-advantages-vulnerability.html , Retrieved October 16, 2016.
- ^'Wi-Fi Protected Setup (WPS) is Insecure: Here’s Why You Should Disable It', How-To-Geek, November 24, 2013, http://www.howtogeek.com/176124/wi-fi-protected-setup-wps-is-insecure-heres-why-you-should-disable-it/ , Retrieved October 16, 2016.
- ^'Wi-Fi Protected Setup: Friend or Foe', Tomáš Rosa, Smart Cards & Devices Forum 2013, May 23, Prague, http://crypto.hyperlink.cz/files/rosa_scadforum13.pdf , Tomáš Rosa, Retrieved October 16, 2016.
- ^ abCherry, Bryce. An Emphasis On Physical Security for Wireless Networks AKA The Dangers Of Wi-Fi Protected Setup https://www.youtube.com/watch?v=kRhyvRAUG6k Retrieved 2014-7-14
External links[edit]
- Wi-Fi Protected Setup Knowledge Center at the Wi-Fi Alliance
Retrieved from 'https://en.wikipedia.org/w/index.php?title=Wi-Fi_Protected_Setup&oldid=899362490'
Even if you know you need to secure your Wi-Fi network (and have already done so), you probably find all the security protocol acronyms a little bit puzzling. Read on as we highlight the differences between protocols like WEP, WPA, and WPA2—and why it matters which acronym you slap on your home Wi-Fi network.
What Does It Matter?
You did what you were told to do, you logged into your router after you purchased it and plugged it in for the first time, and set a password. What does it matter what the little acronym next to the security protocol you chose was? As it turns out, it matters a whole lot. As is the case with all security standards, increasing computer power and exposed vulnerabilities have rendered older Wi-Fi standards at risk. It’s your network, it’s your data, and if someone hijacks your network for their illegal hijinks, it’ll be your door the police come knocking on. Understanding the differences between security protocols and implementing the most advanced one your router can support (or upgrading it if it can’t support current gen secure standards) is the difference between offering someone easy access to your home network and not.
WEP, WPA, and WPA2: Wi-Fi Security Through the Ages
Since the late 1990s, Wi-Fi security protocols have undergone multiple upgrades, with outright deprecation of older protocols and significant revision to newer protocols. A stroll through the history of Wi-Fi security serves to highlight both what’s out there right now and why you should avoid older standards.
Wired Equivalent Privacy (WEP)
Wired Equivalent Privacy (WEP) is the most widely used Wi-Fi security protocol in the world. This is a function of age, backwards compatibility, and the fact that it appears first in the protocol selection menus in many router control panels.
WEP was ratified as a Wi-Fi security standard in September of 1999. The first versions of WEP weren’t particularly strong, even for the time they were released, because U.S. restrictions on the export of various cryptographic technology led to manufacturers restricting their devices to only 64-bit encryption. Metastock explorer code days since last signals. When the restrictions were lifted, it was increased to 128-bit. Despite the introduction of 256-bit WEP, 128-bit remains one of the most common implementations.
Despite revisions to the protocol and an increased key size, over time numerous security flaws were discovered in the WEP standard. As computing power increased, it became easier and easier to exploit those flaws. As early as 2001, proof-of-concept exploits were floating around, and by 2005, the FBI gave a public demonstration (in an effort to increase awareness of WEP’s weaknesses) where they cracked WEP passwords in minutes using freely available software.
Despite various improvements, work-arounds, and other attempts to shore up the WEP system, it remains highly vulnerable. Systems that rely on WEP should be upgraded or, if security upgrades are not an option, replaced. The Wi-Fi Alliance officially retired WEP in 2004.
Wi-Fi Protected Access (WPA)
Wi-Fi Protected Access (WPA) was the Wi-Fi Alliance’s direct response and replacement to the increasingly apparent vulnerabilities of the WEP standard. WPA was formally adopted in 2003, a year before WEP was officially retired. The most common WPA configuration is WPA-PSK (Pre-Shared Key). The keys used by WPA are 256-bit, a significant increase over the 64-bit and 128-bit keys used in the WEP system.
Some of the significant changes implemented with WPA included message integrity checks (to determine if an attacker had captured or altered packets passed between the access point and client) and the Temporal Key Integrity Protocol (TKIP). TKIP employs a per-packet key system that was radically more secure than the fixed key system used by WEP. The TKIP encryption standard was later superseded by Advanced Encryption Standard (AES).
Despite what a significant improvement WPA was over WEP, the ghost of WEP haunted WPA. TKIP, a core component of WPA, was designed to be easily rolled out via firmware upgrades onto existing WEP-enabled devices. As such, it had to recycle certain elements used in the WEP system which, ultimately, were also exploited.
WPA, like its predecessor WEP, has been shown via both proof-of-concept and applied public demonstrations to be vulnerable to intrusion. Interestingly, the process by which WPA is usually breached is not a direct attack on the WPA protocol (although such attacks have been successfully demonstrated), but by attacks on a supplementary system that was rolled out with WPA—Wi-Fi Protected Setup (WPS)—which was designed to make it easy to link devices to modern access points.
Wi-Fi Protected Access II (WPA2)
WPA has, as of 2006, been officially superseded by WPA2. One of the most significant changes between WPA and WPA2 is the mandatory use of AES algorithms and the introduction of CCMP (Counter Cipher Mode with Block Chaining Message Authentication Code Protocol) as a replacement for TKIP. However, TKIP is still preserved in WPA2 as a fallback system and for interoperability with WPA.
Currently, the primary security vulnerability to the actual WPA2 system is an obscure one (and requires the attacker to already have access to the secured Wi-Fi network in order to gain access to certain keys and then perpetuate an attack against other devices on the network). As such, the security implications of the known WPA2 vulnerabilities are limited almost entirely to enterprise level networks and deserve little to no practical consideration in regard to home network security.
Unfortunately, the same vulnerability that is the biggest hole in the WPA armor—the attack vector through the Wi-Fi Protected Setup (WPS)—remains in modern WPA2-capable access points. Although breaking into a WPA/WPA2 secured network using this vulnerability requires anywhere from 2-14 hours of sustained effort with a modern computer, it is still a legitimate security concern. WPS should be disabled and, if possible, the firmware of the access point should be flashed to a distribution that doesn’t even support WPS so the attack vector is entirely removed.
Wi-Fi Security History Acquired; Now What?
At this point, you’re either feeling a little smug (because you’re confidently using the best security protocol available for your Wi-Fi access point) or a little nervous (because you picked WEP since it was at the top of the list). If you’re in the latter camp, don’t fret; we have you covered.
Before we hit you with a further-reading list of our top Wi-Fi security articles, here’s the crash course. This is a basic list ranking the current Wi-Fi security methods available on any modern (post-2006) router, ordered from best to worst:
- WPA2 + AES
- WPA + AES
- WPA + TKIP/AES (TKIP is there as a fallback method)
- WPA + TKIP
- WEP
- Open Network (no security at all)
Ideally, you’ll disable Wi-Fi Protected Setup (WPS) and set your router to WPA2 + AES. Everything else on the list is a less than ideal step down from that. Once you get to WEP, your security level is so low, it’s about as effective as a chain link fence—the fence exists simply to say “hey, this is my property” but anyone who actually wanted in could just climb right over it.
If all this thinking about Wi-Fi security and encryption has you curious about other tricks and techniques you can easily deploy to further secure your Wi-Fi network, your next stop should be browsing the following How-To Geek articles:
Armed with a basic understanding of how Wi-Fi security works and how you can further enhance and upgrade your home network access point, you’ll be sitting pretty with a now secure Wi-Fi network.
READ NEXT- › Steam Won’t Support Ubuntu 19.10 and Future Releases
- › How to Make Your Dumb Window Air Conditioner Smart
- › Microsoft’s New Windows Terminal Is Now Available
- › How to Report a Fake Business Listing on Google Maps
- › How Piracy Makes Legal Streaming Services Better
Categories
Arts & Humanities
Beauty & Style
Business & Finance
Cars & Transportation
Computers & Internet
Consumer Electronics
Education & Reference
Entertainment & Music
Family & Relationships
Food & Drink
Games & Recreation
Health
Home & Garden
Others
Politics & Government
Pregnancy & Parenting
Science & Mathematics
Society & Culture
Travel
| ||||||||
We need your help! Please help us improve our content by removing questions that are essentially the same and merging them into this question. Please tell us which questions below are the same as this one:
The following questions have been merged into this one. If you feel any of these questions have been included in error help us improve our content by splitting these questions into seperate discussions. Please unmerge any questions that are not the same as this one:
|
Leader BoardWhat's this?
Leading Today | Pts | Helpful | ||
1. | masterren | 200 | 65% | |
2. | ocram17 | 200 | 77% | |
3. | haize1021 | 200 | 74% | |
4. | just_anot | 200 | 86% | |
5. | Sumer pan | 200 | 100% | |
6. | Janvi1234 | 200 | 97% | |
7. | jaysonfur | 200 | 74% | |
8. | me.jagvin | 200 | 100% | |
9. | wannamini | 200 | 67% | |
10. | Waqar has | 200 | 94% | |
11. | Barbara B | 2 | 92% | |
12. | kfa13 | 0 | 72% | |
13. | assondhi | 0 | 83% | |
14. | Tommie | 0 | 77% | |
15. | Elijah | 0 | 64% | |
Leading this Week | Pts | Helpful | ||
1. | MD Wasim | 600 | 100% | |
2. | akosiars | 400 | 88% | |
3. | lanz08 | 400 | 65% | |
4. | lastname0 | 400 | 77% | |
5. | Arbi2k | 400 | 83% | |
6. | rein14 | 400 | 64% | |
7. | Barbara B | 327 | 92% | |
8. | Qudagwo | 272 | 67% | |
9. | akki786a | 204 | 97% | |
10. | Traw94 | 200 | 100% | |
11. | krizmae18 | 200 | 73% | |
12. | SlimingCh | 200 | 74% | |
13. | Abhishak | 200 | 99% | |
14. | maremare4 | 200 | 86% | |
15. | Bright Ab | 200 | 100% | |
16. | aaron.adz | 200 | 96% | |
17. | Surinder@ | 200 | 100% | |
18. | joey_moto | 200 | 68% | |
19. | chinthapa | 200 | 89% | |
20. | herjave02 | 200 | 75% | |
Leading this Month | Pts | Helpful | ||
1. | Arbi2k | 2000 | 83% | |
2. | MD Wasim | 1400 | 100% | |
3. | akosiars | 1400 | 88% | |
4. | Barbara B | 1109 | 92% | |
5. | lavignero | 1000 | 100% | |
6. | nazenborg | 800 | 82% | |
7. | krazeeme6 | 600 | 73% | |
8. | zessanne1 | 600 | 60% | |
9. | elitehear | 600 | 62% | |
10. | Aftab6. A | 600 | 100% | |
11. | kuramathe | 402 | 82% | |
12. | jennifer. | 400 | 68% | |
13. | rivrivlov | 400 | 100% | |
14. | 839581864 | 400 | 100% | |
15. | cattybroo | 400 | 86% | |
16. | Waqar has | 400 | 94% | |
17. | 805371234 | 400 | 98% | |
18. | irina1961 | 400 | 100% | |
19. | Rmclain | 400 | 100% | |
20. | bermudez1 | 400 | 100% | |
21. | peetabrar | 400 | 93% | |
22. | lastname0 | 400 | 77% | |
23. | haize1021 | 400 | 74% | |
24. | lanz08 | 400 | 65% | |
25. | ait1 | 400 | 75% |
WPS Pin on HP Printer
Introduction:
HP printers are one of the finest printers in the world. Its continuously advancing technology has already marked its value in market. Change in printing style has also marked an impression on types of printers and their usage. Printers for various types of use like Home, office, bulk needs or occasional gives us a variety of options provided by HP.
Printing is now solely dependent on modes of operation, its not merely limited to wiring and need of system to be attached with printer always. It could be wireless connection and connecting printer through WIFI.
WPS in HP Printer:
We will understand here how to find WPS Pin on HP. Let us first understand what is WPS and where do we use it in printing while using HP Printer.
WPS means WIFI protected setup. It can be used in two ways It can be connected in two modes either by WPS Push button or WPS pin mode.
What Is A Wps Mode
WPS Push button is method is used when router and printer both have push button.
What Is Wps Network
Go to wireless setting on control panel in printer and press push button, you will find signals as connected and displayed on set up.
Now you can operate print command when connected.
WPS Pin Mode:
If your client device has WIFI protected set up pin is used to connect and sync both the devices.
In Wi-Fi protected setup, just enter eight-digit password or “PIN” that you want to set up for your network.
The printer will provide a PIN code that comes as a test print displaying the pin which will be entered into the router.
Where to Find WPS Pin in HP Printer:
- Be adjacent to your printer for viewing its display.
- Click Control panel and select add printer.
- Select printer attached to your device and select it.
- It might ask you for WPS pin and you need to enter the WPS pin for further stepup.
- Enter the PIN code on panel of your printer, PIN is displayed on printer but not for a longer duration.
PIN number of eight digit is displayed on a test print or control panel menu but make sure you have just 90 seconds to enter this WPS pin and make it connected.
Wait for the computer to setup the connection and you are ready to perform your day to day printing tasks.