http://infotech.indiatimes.com/quickiearticleshow/3488190.cms

http://compnetworking.about.com/od/wirelesssecurity/tp/wifisecurity.htm

http://www.wlanbook.com/netstumbler-alternatives/ 

http://compnetworking.about.com/od/wirelesshotspots/qt/noautoconnect.htm

http://www.dailywireless.com/features/secure-wireless-lan-021507/ 

Wardriving, in which any person within the peripheral reach of your router’s wireless signal (between 20 to 100 metres) can simply stand outside your premises in a car or on a bike and send a terror mail by using a laptop or handheld device. 

Definition of White-Hat Hacker :

White Hat Hackers, also known as Ethical Hackers, are Computer Security experts, who specialise in Penetration Testing, and other testing methodologies, to ensure that a company's information systems are secure. Such people are employed by companies where these professionals are sometimes called sneakers. These Security experts may utilise a variety of methods to carry out their tests, including Social Engineering tactics, use of Hacking tools, and attempts to evade security to gain entry into secured areas.

Wikipedia

  1. Change Default Admin Password.
  2. Change Default IP and Netmask.
  3. Disable remote administration.
  4. Change SSID.
  5. Turn off SSID broadcasting.
  6. Turn off PING Response.
  7. Turn on (Compatible) WPA / WEP Encryption. WPA instead of WEP
  8. Enable MAC Address Filtering.
  9. Turn off Auto-Connect to Open WiFi Network.
  10. Assign Static IP Addresses to Devices.
  11. Enable Firewalls On Each Computer and the Router.
  12. Position the Router or Access Point Safely.
  13. Reduce your WLAN transmitter Power.
  14. Install Firewalls, Anti-Virus, Anti-Spyware on Each Computer.
  15. Turn Off the Router when its not in use.

Test Tool: http://www.netstumbler.com/downloads/
http://www.metageek.net

Setting up a wireless network isn't easy--and the hardest part is making sure that you have it working properly. Netstumbler helps you optimize your wireless network by showing you whether it has any holes. With NetStumbler, you can locate WLAN areas with poor coverage and detect other networks that may be interfering with your network. You can also detect unauthorized access points.

How the SSID spreads virally.

A second person in close proximity to the user above also has a wireless enabled laptop and is looking to connect to a WiFi network. They scan to see what is available and notice an SSID called “Free Public WiFi”….they connect to it not knowing that it is an ad hoc network. After a few seconds of wondering why they can’t surf the web they disconnect from the SSID, shrug their shoulders and move on with life. Now they have the viral SSID in their preferred list too. The next time they power on their laptop it starts to look for the “Free Public WiFi” SSID. This process is repeated in many locations across the US and world again and again. Soon this SSID is in preferred wireless networks lists everywhere spreads like a virus.

What is MAC ?

In Computer Networking, a Media Access Control address (MAC address) or Ethernet Hardware Address (EHA), hardware address, adapter address or physical address is a quasi-unique identifier assigned to most network adapters or network interface cards (NICs) by the manufacturer for identification. If assigned by the manufacturer, a MAC address usually encodes the manufacturer's registered identification number.

Wikipedia