Re: What this kind of device called?
> [Are you really sure you want to do this? IMNSHO, wired Ethernet is
> far faster and more reliable (to say nothing of more secure) than
> wireless, and it's probably cheaper to run wires than build out a
> whole wireless infrastructure...]
It's not necessarily to do with cost but flexibility. We're also looking at
wireless telephony as well. We fully realise that this is the edge of
technology right now but we're a forward looking company.
Speed isn't primary importance to us - we use Citrix so bandwidth
requirements are a) low and b) predictable.
- Re: Wifi Security
... Then add in good practices and secure those endpoints! ... I have changed the security to WPA2 with a 128bit ... and attempt to break into her wireless internet connection. ... part of her network cannot do WPA2 but you actually want her network to ...
- Re: [Full-Disclosure] Wireless ISPs
... > I do understand the implications but yes wireless is> totally legal to eavesdrop. ... > The bottom 6 channels run on HAM frequencies and that> is specifically mentioned as legal to eavesdrop. ... >>>>>All transactions done via secure websites are>>>>secure,>>>>>however the auto mailing feature to confirm orders>>>sometimes contains sensitive data. ... >>>>>When the customer>>>is on a wireless connection, be it ISP or home LAN>>>that data is broadcasted in the clear for anyone>>>within range to eavesdrop. ...
- Re: Setting up secure wireless in your house.
... when they talk about a "secure network" what they really mean is that ... inasmuch as anyone listening in on a wireless ... there is no traffic on my network that I ... and it SHOULD allow me to access and share other devices on my LAN, ...
- Re: can they hack into my computer?
... The whole issue of responsibility for wireless ... encryption and the time allowed. ... relatively secure if I had a limited amount of time to recover the ... The major difference between Linux and Windoze security is philosophy. ...
- RE: [Full-Disclosure] Wireless ISPs
... If they put WEP in, that's one more thing for customer to do and they'll ... Therefore end-user security ... Im using this venue to influence several wireless ISPs ... >> All transactions done via secure websites are ...