Security Wireless Data Communications


A three part article on wireless penetration testing discussing the different types of attacks that can be used, how to protect against them, and walks through a typical attack on a network.








    Top: Computers: Data Communications: Wireless: Security


See Also:
  • The Unofficial 802.11 Security Web Page - Collection of papers and links covering the major security wireless standards and their associated vulnerabilities.
  • LucidLink WiFi Client - A software application designed to provide a clear interface to wireless security options enabled in surrounding wireless networks. Intended for use in laptops.
  • Keeping Wireless Intruders Away - Article raising awareness about the risk of unprotected wireless wireless networks, and how a worldwide test yielded wireless shocking results about the amount homes left unprotected wireless to network attacks.
  • Securityfocus - A three part article on wireless penetration testing discussing the data communications different types of attacks that can be used, how to data communications protect against them, and walks through a typical attack on data communications a network.
  • asleap - Tool for penetration testing Cisco LEAP wireless access security points, can recover weak passwords by passively monitoring security wireless traffic. Includes documentation and downloads.
  • Wi-Fi Alliance: WPA2 standard - Information on the WPA2 security standard designed to meet the data communications 802.11i criteria. Includes FAQ and media briefing presentation in English data communications and Japanese.
  • New Scientist - Article by Will Knight, discussing a new authentication approach that data communications can combat the risks associated with connecting to a rogue data communications access point.
  • 802.11x Wireless LAN Security & Software - Offers security alerts and articles based on specific wireless LAN hardware and mirrored multi-platform software helpful for wireless security.
  • Securing Your Wireless Network - Tips for home users to secure their wireless wireless LAN, with wireless detailed instructions on how to execute wireless each step of the wireless process.
  • Wireless Home Network Security Tips - Tips for home users who want to get security a network up quickly to secure their network security against the most prevalent of threats.
  • Ars Technica: Wireless Security Blackpaper - Article covering basic 802.11b security, WEP, MAC address filtering, broadcast security key rotation and EAP based standards.


   MySQL - Cache Direct


  
Twitter