My Account
Sites providing information on the practice of securing, and information on security of wireless networks. Wireless networks (or wireless LANs) are becoming more popular in homes around the world, and therefore there is more opportunity for hackers to steal information from your wireless networks now then there ever was. Securing your wireless network is essential, and the sites here will be able to help you in this practice.
More information

Subcategories 3

Related categories 1

Article covering basic 802.11b security, WEP, MAC address filtering, broadcast key rotation and EAP based standards.
Presents the Key Reinstallation Attack (KRACK) which breaks the WPA2 protocol by forcing nonce reuse in encryption algorithms used by Wi-Fi.
Tips for home users who want to get a network up quickly to secure their network against the most prevalent of threats.
Tips for home users to secure their wireless LAN, with detailed instructions on how to execute each step of the process.
A two part article on developing a security policy for wireless networks expressing key policy components in great detail.
A three part article on wireless penetration testing discussing the different types of attacks that can be used, how to protect against them, and walks through a typical attack on a network.
Article by Will Knight, discussing a new authentication approach that can combat the risks associated with connecting to a rogue access point. (February 20, 2005)
Tips for home users who want to get a network up quickly to secure their network against the most prevalent of threats.
Presents the Key Reinstallation Attack (KRACK) which breaks the WPA2 protocol by forcing nonce reuse in encryption algorithms used by Wi-Fi.
A two part article on developing a security policy for wireless networks expressing key policy components in great detail.
A three part article on wireless penetration testing discussing the different types of attacks that can be used, how to protect against them, and walks through a typical attack on a network.
Article covering basic 802.11b security, WEP, MAC address filtering, broadcast key rotation and EAP based standards.
Tips for home users to secure their wireless LAN, with detailed instructions on how to execute each step of the process.
Article by Will Knight, discussing a new authentication approach that can combat the risks associated with connecting to a rogue access point. (February 20, 2005)
Last update:
September 1, 2020 at 6:45:05 UTC
Computers
Games
Health
Home
News
Recreation
Reference
Regional
Science
Shopping
Society
Sports
All Languages
Arts
Business