Email Alerts
-
Earning CPE credits in Wireless Security Lunchtime Learning
School
-
Know your wireless encryption options
Understanding wireless encryption is essential to deploying a secure wireless network. Contributor Tony Bradley breaks down the different encryption methods and explains why some are better than others. Tip
-
Public security slip forces Georgia Capitol to lock down WLAN
More than three years after a TV news crew exposed security flaws in the WLAN at the Georgia State Capitol building, the governor's office is trying again to go wireless. Article
-
Endpoint security threats meet their match
Securing the network at every endpoint is changing with some new products that limit, prohibit and protect endpoints and users. Article
-
Can a wireless node still buffer packets when its receiver is turned off?
Can a wireless node still buffer packets when its receiver is turned off? Ask the Expert
-
Is it possible to have multicast traffic on wireless APs sent to a certain stations and have no affe
Is it possible to have multicast traffic on wireless APs sent to a certain stations and have no affect on the rest of the associated stations? Ask the Expert
-
Staying safe in Wi-Fi hot spots
Wi-Fi hot spots can make business travelers more productive but they also pose serious security threats. Fortunately, you don't need to avoid hot spots to avoid wireless intruders because Lisa Phifer details some simple steps you should take to harde... Tip
-
Wireless LAN management: Managing security compliance
Find out the security threats that need to be addressed to make your network compliant with security regulations. Tip
-
802.11 wireless protocol
802.11 is a family of wireless and mobile networking specifications developed by the IEEE. Learn more... Fast Lookup
-
Wireless Hacks, 2nd Edition: Hack 71 -- Wall off your wireless
Hack 71 from Wireless Hacks, Second Edition teaches you how to build a tiny wireless firewall using a wide range of PC hardware and a BSD firewall. Chapter Download
Network Management Strategies for the CIO