An Easier Way To Secure Wireless Networks

    Date23 May 2005
    9463
    Posted ByBrittany Day
    Best Buy reports that its most frequently returned products are Wi-Fi networking gear. While many end users want the benefits of Wi-Fi, apparently very few can figure out how to set the wireless security features and get them working properly. Even experienced networking pros have trouble configuring security on today's Wi-Fi networks.

    If you set up Wi-Fi networks for your clients with any degree of regularity, you've probably come across security set-up issues of your own. Sometimes, WPA (Wi-Fi Protected Access) won't set-up properly, so you reduce the level of security to WEP (Wired Equivalent Privacy), the older, more easily crack-able scheme. Or maybe you've thrown in the towel altogether to run wireless networks without any protection at all--a dangerous setup.

    Combine lax security with Wi-Fi security threats--such as drive-by spamming, man-in-the-middle attacks, and network snooping, sniffing and spoofing--and you're leading your users into trouble. They could lose intellectual property, suffer privacy breaches, or fall prey to malicious network attacks.

    Fortunately, wiress equipment makers are improving their security set-up wizards and interfaces, though that does nothing for users of existing equipment. In this TechBuilder Recipe, I'll show you how secure existing wireless networks by choosing and positioning the Wi-Fi hardware, understanding important options (like 802.11a, b, g and n), installing the equipment, and locking down security settings.

    You are not authorised to post comments.

    LinuxSecurity Poll

    Have you used our RSS feeds?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 4 answer(s).
    /component/communitypolls/?task=poll.vote&format=json
    21
    radio
    [{"id":"77","title":"Yes, for articles","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"78","title":"Yes, for advisories","votes":"0","type":"x","order":"2","pct":0,"resources":[]},{"id":"79","title":"Hybrid that contains both","votes":"0","type":"x","order":"3","pct":0,"resources":[]},{"id":"80","title":"No","votes":"0","type":"x","order":"4","pct":0,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.