Securing Wireless Network Traffic (Part 2)
The Great Default Password Debate Almost every wireless access point and wireless router has a Web interface that an administrator can use to configure the device to work with their…
A Drink of Technology for the Thirsty Mind
The Great Default Password Debate Almost every wireless access point and wireless router has a Web interface that an administrator can use to configure the device to work with their…
Introduction In my previous article, I discussed the debate over whether or not you should change your wireless access point’s default password. In this article, I want to continue the…
Introduction In my previous article, I discussed the importance of a wireless access point’s SSID and I also talked about MAC address filtering. In this article, I want to continue…
Introduction So far in this article series, I have talked about some of the various security features that are commonly built into wireless access points. Now, I want to turn…
Introduction In my previous article, I explained that one of the best things that you can do to secure your wireless network is to avoid attaching wireless access points directly…
Introduction In my previous article, I explained that one of the best ways to secure wireless network traffic is to treat the wireless network as an unsecured medium. The idea…
Configuring the Network Policy Server The first step in the configuration process is to make the Network Policy Server aware of your wireless access point. To do so, make sure…
Introduction So far in this article series I have spent a lot of time talking about security settings that you can configure on your wireless access points, as well as…
Introduction There are endless free and open source software solutions and services out there for use in the network—for small, medium, and enterprise environments. You aren’t limited to Microsoft, Cisco,…
It’s amazing the way that time can go by. People tend to think of computers as being high tech, but the TCP/IP protocol has been around in one form or…