Email Alerts
-
Wireless connections with ad hoc networks
Ad hoc wireless networking in Windows Vista with the IPv6 protocol has its risks, but it also has several built-in security mechanisms. In this tip, Brien Posey explains how these security features help counteract some risks of wireless networks. Tip
-
Wireless technology: Five myths debunked
Cisco, along with Forrester Research, recently issued a report calling most wireless LAN fears mere myths, and a campus-wide, all-wireless deployment appears to prove that theory. Article
-
Access on the road: Putting hotspot security to the test
Lisa Phifer and Craig Mathias outline a number of steps that your traveling employees can take to protect themselves while working in public-access networks. Research Report
-
Set up an ad hoc WiFi network
What if you wanted to do pretty much everything you can do on a network, but didn't have a router? You can set up an ad hoc network, in which you can connect on a peer-to-peer basis with other computers and PDAs. You don't need any extra software; th... Tip
-
Wireless network security testing
The abundance of wireless devices is making wireless networks -- both authorized and unauthorized -- more common. Attack your own wireless networks to find vulnerabilities before malicious hackers do. Security testing expert Kevin Beaver covers the t... Step-by-Step Guide
-
Wireless network security testing: Step 2: Searching for Weaknesses
The abundance of wireless devices is making wireless networks -- both authorized and unauthorized -- more common. Attack your own wireless networks to find vulnerabilities before malicious hackers do. Security testing expert Kevin Beaver covers the t... Step-by-Step Guide
-
Wireless network security testing: Step 1: Building the right tools
The abundance of wireless devices is making wireless networks -- both authorized and unauthorized -- more common. Attack your own wireless networks to find vulnerabilities before malicious hackers do. Security testing expert Kevin Beaver covers the t... Step-by-Step Guide
-
Wireless network security testing: Step 3: Demonstrating threats
The abundance of wireless devices is making wireless networks -- both authorized and unauthorized -- more common. Attack your own wireless networks to find vulnerabilities before malicious hackers do. Step-by-Step Guide
-
Hacking Wireless Networks For Dummies, Chapter 10: Still at War
Chapter 10 from Hacking Wireless Networks For Dummies by Kevin Beaver and Peter Davis covers installing and using network discovery and wardriving tools Kismet and Wellenreiter and discusses wardriving countermeasures. Chapter Download
-
Secure network against illegal users
Phifer gives advice on how to handle illegal users on a network. Ask the Expert
Network Management Strategies for the CIO