Security

Security of information, systems, and data; explanation of approaches, concepts, and ways to enhance your security


How to set up and configure WPA-PSK in Windows?

Setting up and configuring WPA security depends on the scale of your network and the robustness of security that is sought to be implemented. Setting up WPA for a large corporation that most likely involves also authentication services is a different story than setting up WPA for a small business or home network. Enabling WPA for your home or small business network can be accomplished relatively easy. This page describes setting up WPA-TKIP in Windows with emphasis on Windows XP.

.


Secure your WLAN (wireless security tutorial - part 4)

Implementing the proper wireless security standard, devising a sound wireless architecture plan, and setting up a VPN and tunneling protocols is a very good way to tackle the task of keeping your wireless network and data secure. There are even more wireless security configurations that can be done to strengthen your security even further.

.


IPSec, VPN, architecture (wireless security tutorial - part 3)

IPSec, VPN, and wireless architecture are the words that take wireless network security to the next level. Securing your wireless network is as important as having a good lock on your office door. Getting data or services from unsecured (open) networks is very easy, and breaking into WEP secured networks is fairly accomplishable. The current wireless security WPA and WPA2 standards provide relatively good security layer; however, it is only a matter of time before the community of hackers develops approaches to get into WPA networks as well.

.


WPA and WPA2 (Wi-Fi security tutorial - part 2)

WPA (or Wi-Fi Protected Access) is today the security standard in wireless networking that is rapidly replacing the older WEP (Wired Equivalency Privacy) standard. WPA and its younger sibling WPA2 are newer standards based on the IEEE 802.11i ratified amendment set out to improve some of the disadvantages of WEP. This wireless security standard is playing today a vital role in the security of wireless networks.

.


Wireless Wi-Fi network security tutorial 101 (part 1)

Even though wireless or Wi-Fi network security is the bread and butter of today's IT Wi-Fi infrastructure, many networking specialists still fear wireless networks because of horror stories from around the world. However, these horror stories happen only in unprotected and unsecure wireless networks. Protected and well managed wireless networks can be almost as reliable as physical wired networks, and we hope this wireless network security tutorial can help you to achieve your security goals.

.


How to crack WEP with Intel PRO/Wireless 3945ABG

How to crack WEP with Intel PRO/Wireless 3945ABG is a task that can employ you for a long time. The Intel PRO/Wireless 3945ABG network adapter driver that comes from the manufacturer does not provide packet injection and network monitoring capabilities which are needed to crack WEP, and therefore before you attempt WEP cracking efforts, you have to update your driver first which can be a daunting task.

.


How to break MAC filtering (wifi security)

How to break MAC filtering was probably the first question that followed the invention of the MAC filtering concept and was asked in the same minute when MAC filtering was introduced as a security concept. Many people still use MAC filtering or MAC addressing as a security measure for their wireless networks, but the sad truth is that MAC filtering is very easy to break; it might even be the easiest security measure to break. Luckily, the population of such wireless users has been rapidly decreasing. This page describes the concept of MAC filtering and demonstrates how easily broken it can be.

.


How to crack WEP encryption (wifi security)

Efforts to crack WEP encryption have been around and even publicly discussed since the inception of the WEP protocol, and this page brings you information about how to discover and calculate a WEP key from network traffic. This introduction to WEP cracking may be useful to anyone who intends to investigate network security.

.
.