Email Alerts
-
Wireless security protocols -- How WPA and WPA2 work
WPA and WPA2 improve upon WEP's encryption methods for better 802.11 wireless security. WPA was carefully designed so that hardware upgrades would not be needed. The processing power of many early access points (APs) was quite limited. The RC4 cipher... Tip
-
Wireless security -- How WEP encryption works
Inadequate wireless security can jeopardize critical company information. Encryption is an important part of wireless security -- but how does it work? In this tip, first in a two-part series on 802.11 wireless security protocols, learn how WEP or Wi... Tip
-
Will WPA2-PSK keep wireless networks safe from war drivers?
Will WPA2-PSK keep wireless networks safe from war drivers? Find out from network security expert Michael Gregg. Ask the Expert
-
How to know if you're connecting to fake or real access points (APs)
With a wireless LAN hotspot, how do you know if you're connecting to a fake or real access point? Find out in this expert response with Lisa Phifer. Ask the Expert
-
NAC solution authentication fix for your wireless network
Learn how to fix authentication issues when testing your NAC solutions with 802.11a/g wireless APs, in this Ask the Expert response. Ask the Expert
-
Wireless network security made easy - from The Book of PF
This chapter from The Book of PF: A No-Nonsense Guide to the OpenBSD Firewall covers the basics of getting a wireless network up and running and some of the options for making your wireless network more secure. It discusses the various encryption met... Chapter Download
-
How do I troubleshoot wireless access points (APs) losing connectivity?
Learn why wireless access points (APs) commonly lose network connectivity in this expert response with wireless networking expert Lisa Phifer. Ask the Expert
-
Wireless security
Wireless security and polices are covered in this guide. Learning Guide
-
Wireless network security: Controlling secondary connections
Corporate wireless networks can be jeopardized by workers who use unsecured secondary connections. A few steps can help protect the network against these unwanted connections. Tip
-
How do we control who gets our wireless network's free Internet access?
Learn how to control access to your wireless network's free Internet. Ask the Expert
Network Management Strategies for the CIO