• Main Menu
  • Wireless Networks

    • Wireless Routers

      Wireless Routers

      A wireless router is a wireless device that connects one computer or a whole network to another computer or network. It is possible to have a wireless network in a home or office. Travelers definitely come across wireless networks at most international airports. A wireless router, which is responsible for sending information from one computer

    • WiMAX

      WiMAX

      WiMAX stands for Worldwide Interoperability for Microwave Access. WiMAX is a broadband wireless point-to-multipoint specification from the IEEE 802.16 working group. Unlike wireless LAN technologies such as Wi-Fi (802.11), WiMAX is designed to operate as a wireless MAN (Metropolitan Area Network). This places WiMAX in the same class as the earlier 802.16 standards, MMDS and

    • Rogue Wireless Access Point

      Rogue Wireless Access Point

      A Rogue Access Point is a Wi-Fi Access Point which is setup by an attacker for the purpose of sniffing wireless network traffic. 802.11 (Wi-Fi) utilizes SSIDs (Service Set IDentifiers) to authenticate NICs to wireless access points. There is no similar protocol for authenticating wireless access points. It is possible to place a rogue wireless

    • Wireless Networks

      Wireless Networks

      Wireless networks are those computer networks that use electromagnetic waves instead of wires in order to carry signals over the various parts of the network. Wireless networks which run over other wireless networks often utilize the lower layer networks to provide security and encryption. Stand-alone wireless networks either provide their own security and encryption features

    • CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol)

      CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol)

      CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) is the preferred encryption protocol in the 802.11i standard. CCMP Cryptography CCMP is based upon the CCM mode of the AES encryption algorithm. CCMP utilizes 128-bit keys, with a 48-bit initialization vector (IV) for replay detection. The Components of CCMP The Counter Mode (CM)

    • WEP (Wired Equivalent Privacy)

      WEP (Wired Equivalent Privacy)

      Wired Equivalent Privacy (WEP) is the encryption algorithm built into the 802.11 (Wi-Fi) standard. WEP encryption uses the RC4 stream cipher with 40 or 104 bit keys and a 24 bit initialization vector. WEP Key Generation Most 802.11 devices allow WEP keys to be entered using an ASCII passphrase or in hexidecimal format. The conversion

    • Wi-Fi Software Tools

      Wi-Fi Software Tools

      A wide variety of Wi-Fi software tools are available. These tools for Wi-Fi perform functions such as: Wireless network discovery Wireless network mapping Wireless network traffic analysis Wireless network RF signal strength monitoring Wireless network encryption cracking Wireless network custom frame generation Dictionary or brute force attacks against wireless networks Denial of Service (DoS) attacks

    • How to Make Wireless Internet Faster

      How to Make Wireless Internet Faster

      Wireless Internet has numerous advantages, but there are also certain limitations. For example, ¬†your computer has to be within the range of wireless broadcasters like routers and WiFi hotspots. Sometimes your computer may be in the range of one of these broadcasters, known as “wireless access points”, but it may not be getting much of

    • Wireless Access Point

      Wireless Access Point

      Wireless Access Point (WAP) is essentially hardware equipment that enables wireless devices to connect to wireless networks, via standards such as Wi-Fi, Bluetooth and so on. The WAP device typically connects to a wired network, and acts as a communication interface between the wireless devices and wired devices on the network. The WAP device enables

    • WiFi Scanner

      WiFi Scanner

      There are many different products and services available, especially via the Internet, that allow users to detect and crack wireless computer networks. The majority of these programs are illegal, extremely complicated to use, or both. The WiFi Scanner, however, is easy to use and allows the user to detect networks that are further away while

    129 queries in 0.439 seconds.