Email Alerts
-
802.11 wireless protocol
802.11 is a family of wireless and mobile networking specifications developed by the IEEE. Learn more... Fast Lookup
-
Wireless Hacks, 2nd Edition: Hack 51 -- Track wireless users
Hack 51 from Wireless Hacks, Second Edition, shows you how you can automatically keep a database of MAC-to-IP address mappings. Chapter Download
-
Wireless Hacks, 2nd Edition: Hack 71 -- Wall off your wireless
Hack 71 from Wireless Hacks, Second Edition teaches you how to build a tiny wireless firewall using a wide range of PC hardware and a BSD firewall. Chapter Download
-
Security and compliance issues will dominate the new year
Puneet Mehta offers his prognostications on what you can expect in the field of networking in 2006. TechColumn
-
MIMO makes a splash in 2006
Lisa Phifer offers her prognostications on what you can expect in the field of networking in 2006. TechColumn
-
Wireless LAN resources
These resources will help you avoid potential pitfalls to ensure that your wireless LAN implementation is successful from start to finish. Multimedia Guide
-
Wireless LAN Resource Guide
These resources will help you avoid potential pitfalls to ensure that your wireless LAN implementation is successful from start to finish. We also provide you with WLAN management and troubleshooting tools and discuss the ever important task of keepi... Learning Guide
-
Security software for Linksys WAP
Lisa Phifer offers her advice about security software for a Linksys Wireless-G access point. ITKnowledge Exchange Advi
-
Is a Microsoft VPN tunnel established through a WEP encrypted access point secure?
ITKnowledge Exchange member "Jeremy54" had a question Wireless and VPN and our resident wireless guru, Lisa Phifer offered her advice. Here is the Q&A. ITKnowledge Exchange Advi
-
EAP Authentication Protocols for WLANs
Chapter download from 'Cisco Wireless LAN Security' Chapter Download
Network Management Strategies for the CIO