Mike - I wouldn't worry so much about the network names of those nearby. Honestly I doubt the average black-hat (hacker is a general term for those who write and modify computer code, cracker or "black hat" is one who breaks into systems) would use such an obvious name. They'd more likely imitate the names of nearby networks to try and trick someone into connecting to them. More likely still they wouldn't do anything of the sort and would other techniques entirely if they wanted to break into a network. Techniques you wouldn't know anything about unless you are really into reading log-files and the likes.
Don't worry about it, is what I'm saying.
As long as you change the administrator password for your router and use the proper security settings you'll have little to worry about on your home network.
brianhabby":35s1s7au said:
Mike,
I wouldn't worry about that list as they are almost certainly your neighbours' wireless networks that you can see. They may be able to see the name of your network as well but if it is secured as you say then they should not be able to gain access unless they are very determined and tech savvy.
One way to avoid the Google miss-type in the future could be to make it your home page. Then if you are on another site and you want to go to Google, just hit the 'Home' button and it will take you straight there without you having to type anything.
HTH
regards
Brian
Just in regards to the part I've bolded in the above quote...
...you may see an option about whether or not to broadcast your router SSID. As tempting as it may be to hide it for security reasons, it's best to broadcast it.
Scenario 1.
Router name OURNETWORK.
Broadcast openly so anyone who wishes to connect (and has the necessary security credentials) can do so.
Any devices (laptops, smartphones and so on) you want to automatically connect wait patiently until they get a signal saying "OURNETWORK" which it then will try to connect to.
Scenario 2.
Router name OURNETWORK.
Network ID (SSID) not broadcast, so anything that wishes to connect to it must figure out that it's there first.
Any devices (laptops, smartphones and so on) you want to automatically connect will periodically call out "Hello? I'm looking for OURNETWORK. Is it out there?" and when it gets a "yes" it'll connect.
Scenario 1 really offers no benefit in security as a determined and capable hacker wouldn't be held back much by not knowing the network name.
Scenario 2 has a bunch of devices going around shouting out your home network name and password and also leaving themselves vulnerable to hackers (or rather, crackers - strictly speaking anyone who writes or modifies computer code is a hacker).
Device: "Hello? I'm looking for OURNETWORK. Is it out there?"
Fake access point: "Yes, this is OURNETWORK. Password please."
Device: "RouterPassword123" (or whatever)
Fake access point: "Access granted."
The fake access point now has access to your device and it's still in your bag/pocket.
In short - Broadcast that SSID.