WLAN Security

Email Alerts

Register now to receive SearchNetworking.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Wireless network security best practices

    Don't let your wireless LAN (WLAN) jeopardize your corporate networks, servers and data. In this guide, you'll discover how to mitigate the risks WLAN pose and learn how to perform vulnerability assessments to manage potential risks. 

  • Wireless network security -- Chapter 8 of 'Essential Computer Security'

    Starting with a brief overview of the wireless protocols and technology, this chapter will cover what's required to secure your own home wireless network to keep unauthorized users out of your network. This chapter will also examine the security prec... 

  • Cisco WLAN design best practices

    Wireless LAN (WLAN) technology has built-in security features, but a one-size-fits-all approach won't ensure adequate security for your organization. This tip provides best practices for designing your security architecture, including user community ... 

  • Wireless connections with ad hoc networks

    Ad hoc wireless networking in Windows Vista with the IPv6 protocol has its risks, but it also has several built-in security mechanisms. In this tip, Brien Posey explains how these security features help counteract some risks of wireless networks. 

  • Wireless technology: Five myths debunked

    Cisco, along with Forrester Research, recently issued a report calling most wireless LAN fears mere myths, and a campus-wide, all-wireless deployment appears to prove that theory. 

  • Access on the road: Putting hotspot security to the test

    Lisa Phifer and Craig Mathias outline a number of steps that your traveling employees can take to protect themselves while working in public-access networks. 

  • Set up an ad hoc WiFi network

    What if you wanted to do pretty much everything you can do on a network, but didn't have a router? You can set up an ad hoc network, in which you can connect on a peer-to-peer basis with other computers and PDAs. You don't need any extra software; th... 

  • Wireless network security testing: Step 1: Building the right tools

    The abundance of wireless devices is making wireless networks -- both authorized and unauthorized -- more common. Attack your own wireless networks to find vulnerabilities before malicious hackers do. Security testing expert Kevin Beaver covers the t... 

  • Wireless network security testing: Step 3: Demonstrating threats

    The abundance of wireless devices is making wireless networks -- both authorized and unauthorized -- more common. Attack your own wireless networks to find vulnerabilities before malicious hackers do. 

  • Wireless network security testing

    The abundance of wireless devices is making wireless networks -- both authorized and unauthorized -- more common. Attack your own wireless networks to find vulnerabilities before malicious hackers do. Security testing expert Kevin Beaver covers the t...