Email Alerts
-
Book of Wireless author on wireless advantages and issues
Wireless technology offers terrific advantages but also presents challenges to both network pros and end users. In this Q&A, John Ross -- author of "The Book of Wireless: A Painless Guide to Wi-Fi and Broadband Wireless" -- talks about trends in wire... Interview
-
Buying your own WAPs vs. Internet service provider's wireless routers
Should you buy a wireless router from your Internet service provider or buy our own WAPs? Our wireless networking expert gives a case for each in this response. Ask the Expert
-
Aruba Networks unveils wireless intrusion prevention enhancements, other security upgrades, at Inter
Aruba Networks's strengthened their security portfolio, unveiling intrusion prevention enhancements that give networking professionals a chance to write their own wireless defense. Article
-
Challenges of managing wireless security covered at Interop
When wireless LANs (WLANs) are deployed as mainstream enterprise network infrastructure, security and management become paramount concerns to corporations. Wireless networking expert Lisa Phifer will speak to these issues of wireless security and man... Interop Las Vegas 2008 ex
-
Is my firewall setting preventing wireless network guest access?
In a wireless guest network, find out why some vendors can connect without authentication while others cannot get an IP in this ask the expert response. Ask the Expert
-
Wireless hot spot security -- podcast
Learn how to keep your enterprise network secure while your mobile workforce utilizes public wireless hot spots, in this podcast. Podcast
-
Wireless troubleshooting: AP not reestablishing association after loss of connectivity
Learn how to troubleshoot your wireless connectivity with our expert, Lisa Phifer. She explains why connectivity is reachable in a mobile cabin and why the AP can't reestablish association after loss of connectivity, in this expert response. Ask the Expert
-
Wireless security protocols -- How WPA and WPA2 work
WPA and WPA2 improve upon WEP's encryption methods for better 802.11 wireless security. WPA was carefully designed so that hardware upgrades would not be needed. The processing power of many early access points (APs) was quite limited. The RC4 cipher... Tip
-
Wireless security -- How WEP encryption works
Inadequate wireless security can jeopardize critical company information. Encryption is an important part of wireless security -- but how does it work? In this tip, first in a two-part series on 802.11 wireless security protocols, learn how WEP or Wi... Tip
-
Will WPA2-PSK keep wireless networks safe from war drivers?
Will WPA2-PSK keep wireless networks safe from war drivers? Find out from network security expert Michael Gregg. Ask the Expert
Network Management Strategies for the CIO