Email Alerts
-
Hacking Wireless Networks For Dummies
This chapter download, "Still at War," covers installing and using network discovery and wardriving tools Kismet and Wellenreiter and discusses wardriving countermeasures. Tip
-
Wireless LAN Resource Guide
These resources will help you avoid potential pitfalls to ensure that your wireless LAN implementation is successful from start to finish. We also provide you with WLAN management and troubleshooting tools and discuss the ever important task of keepi... Learning Guide
-
Why can't my notebook with wireless card connect to our router?
Ask the Expert
-
What are some recent developments in WLAN security?
Ask the Expert
-
Which transmission media are the most secure and the least secure?
Ask the Expert
-
Security software for Linksys WAP
Lisa Phifer offers her advice about security software for a Linksys Wireless-G access point. ITKnowledge Exchange Advi
-
Is a Microsoft VPN tunnel established through a WEP encrypted access point secure?
ITKnowledge Exchange member "Jeremy54" had a question Wireless and VPN and our resident wireless guru, Lisa Phifer offered her advice. Here is the Q&A. ITKnowledge Exchange Advi
-
EAP Authentication Protocols for WLANs
Chapter download from 'Cisco Wireless LAN Security' Chapter Download
-
Wi-Fi access points go nuclear
No matter how secure Wi-Fi gets, there may be some places where wireless networking just isn't appropriate. Security experts at the recent Black Hat conference recently explained how a U.S. nuclear power plant is using Wi-Fi and risking an informatio... Article
-
Concerned about deploying both a public Wi-Fi hotspot and private Wi-Fi service
Ask the Expert
Network Management Strategies for the CIO