• Main Menu
  • Wireless Networks

    • How to Change WEP to WPA

      How to Change WEP to WPA

      Changing WEP to WPA is a great way to increase a wireless network’s security. These are the two main types of protection available through modern wireless routers: WEP or Wired Equivalent Privacy is a security algorithm that wireless networks use. Hackers can break into wireless networks using WEP very easily with simple software that is

    • W-CDMA (Wideband Code Division Multiple Access)

      W-CDMA (Wideband Code Division Multiple Access)

      WCDMA (Wideband Code Division Multiple Access) is the radio access scheme used for third generation cellular systems that are being rolled out in various parts of the globe. The 3G systems support wide band services like high speed Internet access and video and high quality image transmission with the same quality as the fixed networks.

    • Cantenna


      A Cantenna is a waveguide antenna that is directional in nature, and is used to better detect or broaden a wireless network’s range. The original Cantenna was a 50 ohm resistive load that amateur radio enthusiasts used. It is a simple product that can be created with an empty Pringles can (and more recently, wider

    • WiFi Scanner

      WiFi Scanner

      There are many different products and services available, especially via the Internet, that allow users to detect and crack wireless computer networks. The majority of these programs are illegal, extremely complicated to use, or both. The WiFi Scanner, however, is easy to use and allows the user to detect networks that are further away while

    • How Does WiFi Work?

      How Does WiFi Work?

      Over the past decade, WiFi/wireless networking has become very popular. Low cost and simplicity are some of the reasons why WiFi is so popular. Today,  it is almost impossible to buy a laptop that doesn’t have a wireless card built into the screen, which is why WiFi’s popularity continues to grow. What Does WiFi Stand For?

    • MIC (Message Integrity Check)

      MIC (Message Integrity Check)

      A message integrity check (MIC), is a security improvement for WEP encryption found on wireless networks. The check helps network administrators avoid attacks that focus on using the bit-flip technique on encrypted network data packets. Unlike the older ICV (Integrity Check Value) method, MIC is able to protect both the data payload and header of

    • Wireless Access Point

      Wireless Access Point

      Wireless Access Point (WAP) is essentially hardware equipment that enables wireless devices to connect to wireless networks, via standards such as Wi-Fi, Bluetooth and so on. The WAP device typically connects to a wired network, and acts as a communication interface between the wireless devices and wired devices on the network. The WAP device enables

    • What is Intersymbol Interference?

      What is Intersymbol Interference?

      Intersymbol interference is a signal distortion in telecommunication. One or more symbols can interfere with other symbols causing noise or a less reliable signal. The main causes of intersymbol interference are multipath propagation or non-linear frequency in channels. This has the effect of a blur or mixture of symbols, which can reduce signal clarity. If

    • What is ZigBee?

      What is ZigBee?

      ZigBee is a wireless protocol that was developed as an International standard to enable wireless, machine to machine communication, and networks. It is considered the catalyst for constructing “Smart” enabled buildings and homes since it is based on reliable network communications, a pro-longed battery life, and can be simply operated. The ZigBee Alliance is the

    • 802.1X


      802.1x is an IEEE standard that provides the definition for the encapsulation of EAP (Extensible Authentication Protocol) and is also known as EAPOL (EAP over LAN). The standard was first defined in 2001 and later clarified in 2004 to be used with other IEEE 802 working group defined technologies such as the 802.11 wireless standard.

    548 queries in 0.893 seconds.