WLAN Security

Email Alerts

Register now to receive SearchNetworking.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Set up an ad hoc WiFi network

    What if you wanted to do pretty much everything you can do on a network, but didn't have a router? You can set up an ad hoc network, in which you can connect on a peer-to-peer basis with other computers and PDAs. You don't need any extra software; th... 

  • Five steps to stamp out unsafe Wi-Fi use

    Lisa Phifer helps dispel the top myths of wireless security and explains five steps that network administrators can take to lead their users toward safer Wi-Fi usage. 

  • Mobile client security

    As more companies employ a mobile workforce, security becomes a critical factor. Organizations are no longer looking for access mechanisms; they are looking for ways to secure the data over the multitudes of access options. In this tip, Robbie Harrel... 

  • Wireless networks are watching you

    Location-based technology promises great boons for business and the public good -- but some consumers are still concerned about it infringing on their privacy. 

  • WLAN security tools: Buyers' guide for SMBs

    Wireless LAN security is critical for small and midsized businesses, which are often the target of unauthorized access attempts and denial-of-service attacks. 

  • Check IT List: Network appliances for small offices

    As the supply and demand for network and security tools increases for small and midsized businesses, so do the options for SMB network appliances. Ed Tittel offers advice for your network setup. 

  • Know your wireless encryption options

    Understanding wireless encryption is essential to deploying a secure wireless network. Contributor Tony Bradley breaks down the different encryption methods and explains why some are better than others. 

  • Staying safe in Wi-Fi hot spots

    Wi-Fi hot spots can make business travelers more productive but they also pose serious security threats. Fortunately, you don't need to avoid hot spots to avoid wireless intruders because Lisa Phifer details some simple steps you should take to harde... 

  • Wireless LAN management: Managing security compliance

    Find out the security threats that need to be addressed to make your network compliant with security regulations. 

  • Router Expert: Initial configuration of a Cisco 1200 802.11g WLAN access point

    Our router expert continues his series on building a secure wireless LAN with a Linux base. This article explains how to utilize a single Cisco 1200 series access point to provide access to three different IP network segments using VLANs and multiple...