• Main Menu
  • Wireless Networks

    • WEP (Wired Equivalent Privacy)

      WEP (Wired Equivalent Privacy)

      Wired Equivalent Privacy (WEP) is the encryption algorithm built into the 802.11 (Wi-Fi) standard. WEP encryption uses the RC4 stream cipher with 40 or 104 bit keys and a 24 bit initialization vector. WEP Key Generation Most 802.11 devices allow WEP keys to be entered using an ASCII passphrase or in hexidecimal format. The conversion

    • Range Extender

      Range Extender

      A range extender is a device that can be placed between two connection points in order to bounce a wireless signal from one device to another. Range extenders work great for large offices and factories that need high-speed Internet throughout the premises without running cables or purchasing satellite Internet. Range extenders can be used with



      Once the popularity of WiFi started to take off in the early 2000s, a major issue that was identified with the inherent security included in the 802.11 standard was the weakness of WEP encryption. Although a number of competing security methods have emerged since this time, the EAP, LEAP, PEAP, EAP-TLS, and EAP-TTLS protocols were

    • How Does Wireless Networking Work?

      How Does Wireless Networking Work?

      Wireless networking has grown from only being a tool employed by academia and Fortune 500 companies to being deployed in locations such as McDonald’s, Starbucks, and gas stations for free consumer use over the past decade. Consumers can install a wireless network in the home for minimal cost today, and many home theater set-top boxes

    • CDMA-2000 1xRTT

      CDMA-2000 1xRTT

      CDMA-2000 1xRTT is a 3G wireless technology based on the CDMA platform. The 1x in 1xRTT refers to 1x the number of 1.25MHz channels. The RTT in 1xRTT stands for Radio Transmission Technology. The CDMA-2000 1xRTT protocol was developed by Qualcomm. CDMA-2000 1xRTT is a CDMA version of the IMT-2000 standard which was developed by

    • How to Access a Linksys Router

      How to Access a Linksys Router

      Users can connect to a Linksys router manually by attaching an Ethernet cable from the router to a computer and typing (the default IP address)  in the web browser. This kind of connection is used to setup a router for the first time or troubleshoot problems when a wireless connection is not available. By

    • How to Login to a SMC Router

      How to Login to a SMC Router

      SMC is a popular brand of wireless routers, but unlike most routers, SMC routers don’t have a universal username and passwords to access its configuration menu. The username and password varies depending on the model. If you want to gain access to your SMC router you can check your manual to see its default username,

    • Wi-Fi Software Tools

      Wi-Fi Software Tools

      A wide variety of Wi-Fi software tools are available. These tools for Wi-Fi perform functions such as: Wireless network discovery Wireless network mapping Wireless network traffic analysis Wireless network RF signal strength monitoring Wireless network encryption cracking Wireless network custom frame generation Dictionary or brute force attacks against wireless networks Denial of Service (DoS) attacks

    • WiFi Scanner

      WiFi Scanner

      There are many different products and services available, especially via the Internet, that allow users to detect and crack wireless computer networks. The majority of these programs are illegal, extremely complicated to use, or both. The WiFi Scanner, however, is easy to use and allows the user to detect networks that are further away while

    • How to Build a USB WiFi Antenna

      How to Build a USB WiFi Antenna

      A USB WiFi antenna is a device that provides a computer with access to the Internet when in range of a WiFi access point. It also refers to a USB-based wireless adapter that also provides a computer with Internet access but connects to specific wireless routers rather than public WiFi access points. USB WiFi antennas

    126 queries in 0.316 seconds.