A Tale of
[March 5, 2008] Learn the secrets to savvy password creation.
March 4, 2008] In this new monthly column, Aaron Weiss, our resident Wi-Fi Guru, will answer your burning questions about small-scale Wi-Fi deployments. In this episode, he covers bridging robots, hotspot sharing, and DD-WRT repeaters.
[February 11, 2008] netstat gives you some of the tools you need to spot and eliminate any malicious software listening for network connections on your Windows hosts.
and Linux for Your WLAN
[February 5, 2008] Best of ENP: Part TwoRADIUS and Linux can be a potent combination for WLAN security. Here's how to get it configured.
Safety for Business Users
[February 1, 2008] The only reliable way for employers to manage the associated risk for mobile workers is to define, monitor, and enforce hotspot acceptable use policies. Here, we show you how.
Public Wi-Fi' Is Bad
[January 21, 2008] Just as you shouldn't accept a package from a stranger before boarding a plane, you shouldn't accept "free public Wi-Fi"--at least not without protecting yourself first.
Your WLAN with Aircrack-ng
[December 27, 2007] Rogue access points and weak passwords are the bane of any network administrator's life: all it takes is one user setting up a consumer-grade wireless router in the cube farm so he or she can use a PDA or whatever and you've got yourself a potentially serious security risk.
Guide to WPA
[December 13, 2007] To help you gain a better understanding of what WPA is, how it works, and why you should be using it, we've gathered together our best tutorials on the subject.
Latte Attack: How it Worksand How to Block It
[December 12, 2007] By exploiting driver flaws, exposed fileshares, and user mistakes, one can easily and invisibly attack Wi-Fi laptops and phones in public venues like airplanes, hotels, and cafes. We show you how to protect yourself.
Phished: Why SSID Spoofing (Still) Matters
[January 29, 2007] Phony access points (APs) that use spoofed service set identifiers (SSIDs) to lure wireless users are nothing new. Also called evil twin or honeypot rogue APs, these look-alikes have grown common in venues frequented by business executives, including airports and hotels. We show you how to guard against them
Adapted from Wi-FiPlanet.com.
|Do you have a comment or question about this article or other small business topics in general? Speak out in the SmallBusinessComputing.com Forums. Join the discussion today!|