﻿{"id":374,"date":"2019-01-21T20:08:59","date_gmt":"2019-01-21T19:08:59","guid":{"rendered":"http:\/\/www.uqac.ca\/cybersecurite\/?p=374"},"modified":"2019-01-21T20:35:43","modified_gmt":"2019-01-21T19:35:43","slug":"chiffrement-du-reseau-wi-fi-a-domicile","status":"publish","type":"post","link":"https:\/\/www.uqac.ca\/cybersecurite\/chiffrement-du-reseau-wi-fi-a-domicile\/","title":{"rendered":"Chiffrement du r\u00e9seau Wi-Fi \u00e0 domicile"},"content":{"rendered":"\n<p>Le chiffrement du r\u00e9seau sans fil permet de diminuer les risques d\u2019intrusions et\/ou d\u2019interception de la communication.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Pour activer le chiffrement, selon le guide de votre \u00e9quipement r\u00e9seau :<\/h4>\n\n\n\n<p style=\"text-align:left\">1. Joindre l\u2019interface du routeur \u00e0 l\u2019aide du navigateur internet (ex : Internet explorer) en sp\u00e9cifiant l\u2019adresse de celui-ci (ex : http:\/\/192.168.1.1);<\/p>\n\n\n\n<p>2. S\u00e9lectionner l\u2019option de configuration r\u00e9seau sans-fil ou WIFI;<\/p>\n\n\n\n<p>3. S\u00e9lectionner une option de chiffrement Wap\/Wap2 si disponible, sinon WEP;<\/p>\n\n\n\n<p>4. Sp\u00e9cifier un mot de passe;<\/p>\n\n\n\n<p>5. Sauvegarder le changement;<\/p>\n\n\n\n<p>6. L\u2019\u00e9quipement devrait red\u00e9marrer et occasionner une coupure r\u00e9seau le temps du red\u00e9marrage;<\/p>\n\n\n\n<p>7. Lors de la connexion au r\u00e9seau, on vous demandera le mot de passe.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Le chiffrement du r\u00e9seau sans fil permet de diminuer les risques d\u2019intrusions et\/ou d\u2019interception de la communication. Pour activer le chiffrement, selon le guide de votre \u00e9quipement r\u00e9seau : 1. Joindre l\u2019interface du routeur \u00e0 l\u2019aide du navigateur internet (ex : Internet explorer) en sp\u00e9cifiant l\u2019adresse de celui-ci (ex : http:\/\/192.168.1.1); 2. S\u00e9lectionner l\u2019option de [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":377,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[7],"tags":[],"class_list":["post-374","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-chiffrement"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/374","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/comments?post=374"}],"version-history":[{"count":4,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/374\/revisions"}],"predecessor-version":[{"id":388,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/374\/revisions\/388"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media\/377"}],"wp:attachment":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media?parent=374"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/categories?post=374"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/tags?post=374"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}