Email Alerts
-
Wireless Hacks, 2nd Edition: Hack 51 -- Track wireless users
Hack 51 from Wireless Hacks, Second Edition, shows you how you can automatically keep a database of MAC-to-IP address mappings. Chapter Download
-
Router Expert: Initial configuration of a Cisco 1200 802.11g WLAN access point
Our router expert continues his series on building a secure wireless LAN with a Linux base. This article explains how to utilize a single Cisco 1200 series access point to provide access to three different IP network segments using VLANs and multiple... Tip
-
Microsoft confirms Windows Wi-Fi flaw
However, until a rollup patch is released, the software giant said Tuesday that users can take basic steps to protect themselves from the Windows wireless vulnerability. Article
-
What is the future of thin access points relative to wireless network security?
What is the future of thin access points relative to wireless network security? Ask the Expert
-
Steps to make WLAN security configuration easier
How can you secure a wireless network connection but also make it easy for authorized users to have access? Ask the Expert
-
MIMO makes a splash in 2006
Lisa Phifer offers her prognostications on what you can expect in the field of networking in 2006. TechColumn
-
Security and compliance issues will dominate the new year
Puneet Mehta offers his prognostications on what you can expect in the field of networking in 2006. TechColumn
-
Challenges posed by 802.11 wireless
802.11 challenges have changed, from satisfying basic necessities like security and coverage, to addressing broader deployment issues like management and quality. Our Wireless Advisor tips have tracked that evolution, serving as an on-going resource... Tip
-
Chasing away your wireless blues
While Wi-Fi security has been grabbing headlines, Bluetooth has been creeping quietly into corporate networks -- often under IT's security radar. Given increasing deployment and broader usage, Bluetooth really deserves more attention and in this tip... Tip
-
Web site documents wireless threats, vulnerabilities
Network Chemistry has launched the industry's first public database to aggregate and communicate wireless vulnerabilities and exploits. The site alerts network administrators and IT managers of potential threats, before any damage is done. Article
Network Management Strategies for the CIO