• Main Menu
  • Wireless Networks

    • 802.11i

      802.11i

      The 802.11i wireless standard was released by the IEEE on June of 2004 and implements improved encryption for wireless networks than realized on past standards released. Commonly referred to as the WPA2 implementation, the 802.11i implementation requires newer encryption standards than seen with the WEP implementation by requiring TKIP (Temporal Key Integrity Protocol) and AES

    • How to Secure a Linksys Wireless Router

      How to Secure a Linksys Wireless Router

      A Linksys wireless router is a device that converts digital information into wireless radio waves and vice versa. Linksys wireless routers, like other wireless routers, are used for wireless computer networking. They use an antenna and an Ethernet or coaxial cable connection to allow computers to connect to a wireless network that is within range.

    • Wi-Fi Software Tools

      Wi-Fi Software Tools

      A wide variety of Wi-Fi software tools are available. These tools for Wi-Fi perform functions such as: Wireless network discovery Wireless network mapping Wireless network traffic analysis Wireless network RF signal strength monitoring Wireless network encryption cracking Wireless network custom frame generation Dictionary or brute force attacks against wireless networks Denial of Service (DoS) attacks

    • How to Replace Your Wireless Router Antenna

      How to Replace Your Wireless Router Antenna

      A wireless router is a computer networking device that routes data packets across another computer or across a wireless IP network. The wireless router comes with an 802.11 interface card and antenna. The wireless router antenna is generally what determines the signal strength of the wireless router. If your signal strength is weak, then you

    • Cantenna

      Cantenna

      A Cantenna is a waveguide antenna that is directional in nature, and is used to better detect or broaden a wireless network’s range. The original Cantenna was a 50 ohm resistive load that amateur radio enthusiasts used. It is a simple product that can be created with an empty Pringles can (and more recently, wider

    • WAP (Wireless Application Protocol)

      WAP (Wireless Application Protocol)

      Wireless Application Protocol (WAP) is a technical standard for accessing information over a mobile wireless network. A WAP browser is a web browser for mobile devices that use the protocol. Before the introduction of WAP, mobile service providers had limited opportunities to offer interactive data services, but required interactivity to support Internet and applications such

    • Wireless Networks

      Wireless Networks

      Wireless networks are those computer networks that use electromagnetic waves instead of wires in order to carry signals over the various parts of the network. Wireless networks which run over other wireless networks often utilize the lower layer networks to provide security and encryption. Stand-alone wireless networks either provide their own security and encryption features

    • What is ZigBee?

      What is ZigBee?

      ZigBee is a wireless protocol that was developed as an International standard to enable wireless, machine to machine communication, and networks. It is considered the catalyst for constructing “Smart” enabled buildings and homes since it is based on reliable network communications, a pro-longed battery life, and can be simply operated. The ZigBee Alliance is the

    • How to Connect a Wireless Router

      How to Connect a Wireless Router

      Wireless routers are network devices that combine the functionalities of a router and a wireless access point. Wireless routers can be connected to broadband modems to provide wireless access to the Internet to two or more computers or laptops within a home environment. They enable greater mobility for laptops and other portable computers. They can

    • EAP, LEAP, PEAP and EAP-TLS and EAP-TTLS

      EAP, LEAP, PEAP and EAP-TLS and EAP-TTLS

      Once the popularity of WiFi started to take off in the early 2000s, a major issue that was identified with the inherent security included in the 802.11 standard was the weakness of WEP encryption. Although a number of competing security methods have emerged since this time, the EAP, LEAP, PEAP, EAP-TLS, and EAP-TTLS protocols were

    wireless-networks
    394 queries in 0.652 seconds.