Email Alerts
-
Wireless network security testing: Step 2: Searching for Weaknesses
The abundance of wireless devices is making wireless networks -- both authorized and unauthorized -- more common. Attack your own wireless networks to find vulnerabilities before malicious hackers do. Security testing expert Kevin Beaver covers the t... Step-by-Step Guide
-
Wireless network security testing: Step 1: Building the right tools
The abundance of wireless devices is making wireless networks -- both authorized and unauthorized -- more common. Attack your own wireless networks to find vulnerabilities before malicious hackers do. Security testing expert Kevin Beaver covers the t... Step-by-Step Guide
-
Wireless network security testing: Step 3: Demonstrating threats
The abundance of wireless devices is making wireless networks -- both authorized and unauthorized -- more common. Attack your own wireless networks to find vulnerabilities before malicious hackers do. Step-by-Step Guide
-
Hacking Wireless Networks For Dummies, Chapter 10: Still at War
Chapter 10 from Hacking Wireless Networks For Dummies by Kevin Beaver and Peter Davis covers installing and using network discovery and wardriving tools Kismet and Wellenreiter and discusses wardriving countermeasures. Chapter Download
-
Wi-Fi firewalls boost wireless security by blocking airborne attacks
Wi-Fi firewalls, or wireless intrusion prevention systems, are servers that monitor and filter Wi-Fi traffic, blocking unauthorized 802.11 usage and attacks while still in the air. Learn about the benefits of the product and what to consider when sel... Security Spotlight
-
Next steps in municipal wireless mesh networks
Strix Systems VP Nan Chen shares his take on the wireless mesh networking market and why he believes that wireless mesh networks are gaining so much momentum. TechColumn
-
Recipe for rogue hunting
Detecting rogues is fairly easy, but eliminating them can be surprisingly tough. This tip describes a methodical rogue hunting process and tools that can help. School
-
Wi-Fi vulnerability assessment checklist
Vulnerability assessments can help you find and fix WLAN weaknesses before attackers take advantage of them. But where do you start? What should you look for? Have you covered all the bases? This checklist will help to answer these questions. School
-
Getting from here to there: WPA2 migration
WEP has been cracked, WPA is a band-aid, and your CSO recommends upgrading to WPA2. Great, but that's just not going to happen overnight. How do you migrate your installed base of legacy equipment? This tip recommends a workable strategy for migratio... School
-
Controlling WLAN access on a tight budget
WPA and WPA2-Enterprise provide robust WLAN access control, but deploying 802.1X can be overwhelming for companies with limited IT staff and budget. From outsource to open source to preshared keys, this tip describes several less complex or costly al... School
Network Management Strategies for the CIO