WLAN Security

Email Alerts

Register now to receive SearchNetworking.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Challenges posed by 802.11 wireless

    802.11 challenges have changed, from satisfying basic necessities like security and coverage, to addressing broader deployment issues like management and quality. Our Wireless Advisor tips have tracked that evolution, serving as an on-going resource... 

  • Chasing away your wireless blues

    While Wi-Fi security has been grabbing headlines, Bluetooth has been creeping quietly into corporate networks -- often under IT's security radar. Given increasing deployment and broader usage, Bluetooth really deserves more attention and in this tip... 

  • Hacking Wireless Networks For Dummies

    This chapter download, "Still at War," covers installing and using network discovery and wardriving tools Kismet and Wellenreiter and discusses wardriving countermeasures. 

  • Wireless LAN deployment and federal regulations

    A look at the bare minimum requirements to keep your WLAN compliant with federal regulations. 

  • Secure WLAN best practices and topology

    Expert Michael Martin provides a list of wireless security "dos and don'ts" and a sample topology for a secure WLAN. 

  • Upgrading your WLAN to WPA2

    This month Lisa Phifer examines WPA2 and gives us insight into its new security features, fast roaming options and explains how to enable coexistence. 

  • Combining VPN and wireless links

    Learn two approaches for combining VPNs and wireless access points to boost security. 

  • 10 Tactics to build a secure wireless network

    Learn how to build and deploy secure wireless networks -- regardless of the size of your organization. 

  • Creating a wireless security policy

    This tip explains what WLAN security policies are, the kinds of information they should contain, and where to find policy templates and further guidance. 

  • Router Expert: Secure WLANs - Understanding the protocols

    This tip reviews the 802.11 architecture and the PHY standards for 802.11a, b, and g and performance expectations.