TITLE

It's default of the wireless LAN vendors

AUTHOR(S)
Henderson, Tom
PUB. DATE
July 2002
SOURCE
Network World;7/15/2002, Vol. 19 Issue 28, p40
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Comments on the security of wireless local area networks (LAN) in the U.S. as of July 15, 2002. Ways in accessing a wireless LAN; Views on the accessibility of wireless LAN; Problems in wireless networks.
ACCESSION #
6995581

 

Related Articles

  • WIRELESS LAN HOLES. Fisher, Dennis; Nobel, Carmen // eWeek;02/12/2001, Vol. 18 Issue 6, p11 

    Focuses on the flaws of the security protocol of the wireless local area network called the Wired Equivalency Piracy (WEP) in the United States. Opportunity provided to computer hackers; Concern over the continued manifestation of the oversight in attacks against wireless networks; Efforts of a...

  • Wireless for the Clueless. Overholt, Alison // Fast Company;Feb2003, Issue 67, p48 

    Presents guidelines for setting up a wireless network that is secure from infiltration by hackers. Growth of wireless networking; Definition of terms in the wireless sector; Advantages from wireless networks; Purpose of the numbers 802.ii in wireless networks; Factors to consider in buying...

  • JUMPSTART FOR WIRELESS OFFERS HIGHEST WLAN SECURITY.  // LAN Product News;Feb2005, pN.PAG 

    This article features JumpStart for Wireless, a way for consumers and small office home office users to install, configure and secure a wireless network, introduced by Atheros Communications Inc. With JumpStart, users can set up full wireless local area network (WLAN) security for a new network...

  • Products & Services for the Library WLAN. Breeding, Marshall // Library Technology Reports;Sep/Oct2005, Vol. 41 Issue 5, p37 

    The article discusses products and services for the library wireless LAN. One Open Source solution that's become popular for providing hotspots in a library setting is ZoneCD from PublicIP. ZoneCD works in conjunction with the access points of the wireless network to provide additional control...

  • Patients Get Wi-Fi. Page, Douglas // H&HN: Hospitals & Health Networks;Apr2005, Vol. 79 Issue 4, p28 

    Focuses on wireless services for patients being provided by several hospitals in the U.S. Importance of wireless Internet connectivity to patients, according to Bruce Robison of CoxHealth; Wireless local area network installed throughout Bronson Healthcare in Kalamazoo, Michigan; Potential...

  • Can rogue wireless LANs be eliminated? Yes. Chartoff, Marvin // Network World;1/12/2004, Vol. 21 Issue 2, p41 

    Explains the capability of the computer networking business to eliminate rogue access points in wireless local area networks (LAN). Need for companies to establish a strong policy against them and follow-through with compliance; Suggestions to combine wireless and wireline intrusion-detection...

  • Can rogue wireless LANs be eliminated? No. Boyland, Brian // Network World;1/12/2004, Vol. 21 Issue 2, p41 

    Explains why the computer networking business cannot totally eliminate rogue access points in wireless local area networks (LAN). Failure by the industry to come up with multiple-level security; Possibility to perform radio frequency scanning on weak points that the industry failed to do.

  • Substantiating Timing and Behavioral Anomalies in Wireless LANs Using GCL. Sithirasenan, Elankayer; Muthukkumarasamy, Vallipuram // Journal of Networks;Nov2008, Vol. 3 Issue 8, p2 

    With the increasing dependence on wireless LANs (WLANs), businesses, educational institutions and other organizations are in need of a reliable security mechanism. The latest security protocol, the IEEE 802.11i assures rigid security for WLANs with the support of IEEE 802.1x protocol for...

  • Save time (and headaches) managing your WLAN infrastructure. Henderson, Thomas // Network World;2/21/2005, Vol. 22 Issue 7, p59 

    The article focuses on the management of wireless LAN infrastructure. Mobile Manager Enterprise has an almost-surgical ability to manage a diverse set of access point brands and models in great detail by administrator-defined groups with pre-defined, articulate policies. Firmware upgrades and...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics