Email Alerts
-
Set up an ad hoc WiFi network
What if you wanted to do pretty much everything you can do on a network, but didn't have a router? You can set up an ad hoc network, in which you can connect on a peer-to-peer basis with other computers and PDAs. You don't need any extra software; th... Tip
-
Wireless network security testing
The abundance of wireless devices is making wireless networks -- both authorized and unauthorized -- more common. Attack your own wireless networks to find vulnerabilities before malicious hackers do. Security testing expert Kevin Beaver covers the t... Step-by-Step Guide
-
How different 802.11 standards work in various channels
Here, Phifer explains how different 802.11 standards work with 5 MHz and 40 MHz wide channels. Ask the Expert
-
Multicasting on a wireless network
In this response, Phifer discusses multicasting on a wireless network. Ask the Expert
-
Wireless network troubleshooting
Network operators often have the difficult task of troubleshooting wireless issues that arise not only on the wireless LAN but also with users and devices seeking access to it. Having knowledge of common hardware problems and configuration issues is ... Crash Course
-
Wireless security push fueled by paranoia
Wireless security became a necessity for Intermagnetics, but when the company used its access points to monitor the spectrum, performance suffered. Article
-
Cellular data convergence: An introduction to wireless and 3G
The world of wireless data capabilities on the carrier networks is seeing a tremendous amount of growth as it relates to standards and service offerings. In this tip, Robbie Harrell sorts out the alphabet soup of data capabilities being offered by th... Tip
-
Wireless security boost for laptops outside the office
Most companies do a pretty good job with wireless security within the office walls, but what happens when end users take their laptops home -- or to Starbucks? Article
-
Intel's Centrino gear vulnerable to attack
Chip giant Intel says a trio of flaws may lead to remote code execution, privilege escalation and disclosure of security information. AV firms say the flaws could spawn a new wireless worm. Article
-
Three ways to improve wireless network access for your users
Here are three things an administrator can do to improve your company's wireless strategy on the client side. Tip
Network Management Strategies for the CIO