It’s common knowledge that when it comes to securing a wireless network, WEP, while still better than nothing, is only slightly better. In fact, using WEP is a lot like locking your car doors but ...
This issue, one in a short series of primers on deploying wireless LAN security, will begin discussing the task of selecting an authentication method to use in your Wi-Fi security scheme. WLAN ...
Hi,<BR><BR>Thanks everyone for helping me in the previous thread ("deploying 50 desktops").<BR><BR>Now the next thing on my to-do list: providing Wi-Fi service to students.<BR><BR>What I need to do is ...
The building where I work is blanketed by a shared wireless network that requires authentication through some Cisco system before you can access anything (but after you connect to it -- it's ...