• Main Menu
  • Wireless Networks

    • How to Send Text Messages Free

      How to Send Text Messages Free

      Cell phone text messages typically use the SMS (Short Message Service) protocol. Most cellular service providers charge fees to send and receive text messages. There are numerous ways to send text messages for free, but they vary among cell service providers. Send Free Text Messages by Purchasing the Right Service Plan Some cell service plans

    • How to Secure a Linksys Wireless Router

      How to Secure a Linksys Wireless Router

      A Linksys wireless router is a device that converts digital information into wireless radio waves and vice versa. Linksys wireless routers, like other wireless routers, are used for wireless computer networking. They use an antenna and an Ethernet or coaxial cable connection to allow computers to connect to a wireless network that is within range.

    • EAP, LEAP, PEAP and EAP-TLS and EAP-TTLS

      EAP, LEAP, PEAP and EAP-TLS and EAP-TTLS

      Once the popularity of WiFi started to take off in the early 2000s, a major issue that was identified with the inherent security included in the 802.11 standard was the weakness of WEP encryption. Although a number of competing security methods have emerged since this time, the EAP, LEAP, PEAP, EAP-TLS, and EAP-TTLS protocols were

    • Wireless Routers

      Wireless Routers

      A wireless router is a wireless device that connects one computer or a whole network to another computer or network. It is possible to have a wireless network in a home or office. Travelers definitely come across wireless networks at most international airports. A wireless router, which is responsible for sending information from one computer

    • How to Change WEP to WPA

      How to Change WEP to WPA

      Changing WEP to WPA is a great way to increase a wireless network’s security. These are the two main types of protection available through modern wireless routers: WEP or Wired Equivalent Privacy is a security algorithm that wireless networks use. Hackers can break into wireless networks using WEP very easily with simple software that is

    • How Does Wireless Networking Work?

      How Does Wireless Networking Work?

      Wireless networking has grown from only being a tool employed by academia and Fortune 500 companies to being deployed in locations such as McDonald’s, Starbucks, and gas stations for free consumer use over the past decade. Consumers can install a wireless network in the home for minimal cost today, and many home theater set-top boxes

    • Netopia Default Password

      Netopia Default Password

      Netopia is a popular broadband product company that produces Internet routers and other WiFi devices. Motorola acquired the company in 2007 and made partnerships with wireless providers around the world. Such providers include AT&T, Swisscom, and NextGen Tel in Norway. Unlike other router brands, Netopia’s default password is the 6 digit serial number located on

    • SMS Shortcuts

      SMS Shortcuts

      SMS (Short Message Service) is a protocol for sending and receiving brief text messaging over digital cellular networks. Most people send SMS messages from the very small keypads on their mobile phones, and most people who receive SMS messages read them on the tiny screens of their mobile phones. Because of those considerations, and because

    • How to Make Wireless Internet Faster

      How to Make Wireless Internet Faster

      Wireless Internet has numerous advantages, but there are also certain limitations. For example,  your computer has to be within the range of wireless broadcasters like routers and WiFi hotspots. Sometimes your computer may be in the range of one of these broadcasters, known as “wireless access points”, but it may not be getting much of

    • CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol)

      CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol)

      CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) is the preferred encryption protocol in the 802.11i standard. CCMP Cryptography CCMP is based upon the CCM mode of the AES encryption algorithm. CCMP utilizes 128-bit keys, with a 48-bit initialization vector (IV) for replay detection. The Components of CCMP The Counter Mode (CM)

    130 queries in 0.406 seconds.