• Main Menu
  • Wireless Networks

    • MIC (Message Integrity Check)

      MIC (Message Integrity Check)

      A message integrity check (MIC), is a security improvement for WEP encryption found on wireless networks. The check helps network administrators avoid attacks that focus on using the bit-flip technique on encrypted network data packets. Unlike the older ICV (Integrity Check Value) method, MIC is able to protect both the data payload and header of

    • How to Change a WEP Key

      How to Change a WEP Key

      A WEP (Wired Equivalent Privacy) key is a type of security algorithm for wireless devices that protects a computer from hackers and people who are trying to access someone else’s Internet connection. It consists of the numbers 0-9 and the letters A-F and can be 10, 26, or 58 characters long. For devices within the

    • WiFi Signal Strength Meter

      WiFi Signal Strength Meter

      Windows and other operating systems have a WiFi signal strength meter, but this is usually basic software and does not really tell the user much about the wireless signal. Fortunately, there are many other programs that do the same thing, but show the user more details about the wireless connection. We will describe some of

    • Wireless Mesh Network

      Wireless Mesh Network

      A wireless mesh network relies on radio signals to allow several devices within a coverage area to communicate with each other. Wireless mesh networks are often used in conjunction with other networks in order to give users reliability and stability. This is because wireless mesh networks communicate with each other through any device within the

    • Wireless Routers

      Wireless Routers

      A wireless router is a wireless device that connects one computer or a whole network to another computer or network. It is possible to have a wireless network in a home or office. Travelers definitely come across wireless networks at most international airports. A wireless router, which is responsible for sending information from one computer

    • WiMAX

      WiMAX

      WiMAX stands for Worldwide Interoperability for Microwave Access. WiMAX is a broadband wireless point-to-multipoint specification from the IEEE 802.16 working group. Unlike wireless LAN technologies such as Wi-Fi (802.11), WiMAX is designed to operate as a wireless MAN (Metropolitan Area Network). This places WiMAX in the same class as the earlier 802.16 standards, MMDS and

    • 802.11n

      802.11n

      Information technology group Wi-Fi Alliance or WFA has been testing a next generation, yet still pre-standard wireless networking program that would define wireless Internet of the future. Much ado has been tackled about the technology called 802.11n. For the average Internet user, who knows not too much about the standards and technicalities of the information

    • Rogue Wireless Access Point

      Rogue Wireless Access Point

      A Rogue Access Point is a Wi-Fi Access Point which is setup by an attacker for the purpose of sniffing wireless network traffic. 802.11 (Wi-Fi) utilizes SSIDs (Service Set IDentifiers) to authenticate NICs to wireless access points. There is no similar protocol for authenticating wireless access points. It is possible to place a rogue wireless

    • How to Send Text Messages Free

      How to Send Text Messages Free

      Cell phone text messages typically use the SMS (Short Message Service) protocol. Most cellular service providers charge fees to send and receive text messages. There are numerous ways to send text messages for free, but they vary among cell service providers. Send Free Text Messages by Purchasing the Right Service Plan Some cell service plans

    • Wireless Networks

      Wireless Networks

      Wireless networks are those computer networks that use electromagnetic waves instead of wires in order to carry signals over the various parts of the network. Wireless networks which run over other wireless networks often utilize the lower layer networks to provide security and encryption. Stand-alone wireless networks either provide their own security and encryption features

    127 queries in 0.563 seconds.