Saturday, March 8th, 2008
Years ago, in a strip drawn by the great cartoonist Walt Kelly, the characters were following a set of mysterious footprints through the swamp in which they lived. Finally, one of the characters, Pogo, a little opossum, realized that the footprints were their own. That's when he made his much ...
Posted in Hardware, Internet, Networking, Privacy, Security | No Comments
Saturday, March 8th, 2008
For the last three years, I?ve been meaning to put to rest once and for all the urban legends and myths on wireless LAN security. Every time I write an article or blog on wireless LAN security, someone has to come along and regurgitate one of these myths. If that ...
Posted in Internet, Networking, Privacy, Security | No Comments
Saturday, March 8th, 2008
Hacker tools are growing more sophisticated and automated. Hackers can now quickly adapt to new security vulnerabilities as they are uncovered and distribute the fruits of their exploits more widely with the help of automated toolkits. And they're employing an ever-increasing range of methods to find individuals' and companies' private ...
Posted in Networking, Security | No Comments
Saturday, March 8th, 2008
Wireless LANs utilize radio waves for transporting information, which results in security vulnerabilities that justifiably worry network managers. To assuage those worries, most companies implement authentication and encryption to harden security. However, WLANs have a whole host of other vulnerabilities that can be more difficult to completely smother such as ...
Posted in Internet, Networking, Privacy, Security | No Comments
Saturday, March 8th, 2008
A group of technology companies including Texas Instruments, Broadcom, and STMicroelectronics is pushing their proposal for the eventual 802.11n Wi-Fi standard that they claim will offer speeds "up to 10 times the speed of the current generation". Glenn Fleishman over at Wi-Fi Networking News cuts to the chase: "An array ...
Posted in Hardware, Internet, Networking | No Comments