Protect Yourself from WiFi Snoops (41 tags)
You needn't be at the mercy of WiFi snoops. There's a lot you can do to protect your home or business network, without spending a lot of time or even any money. Preston Gralla, author of Windows XP Hacks, 2nd Edition, shows you how with step-by-step guides to hiding your network SSID, filtering out MAC addresses, and using encryption.
Wireless Mesh Networking (40 tags)
Tomas Krag and Sebastian Büettrich take a look at some of the principles of wireless mesh networking, and they provide a simple test scenario for running a mesh routing protocol on a Linux-based computer. Tomas will discuss wireless networks as a low-cost, decentralized alternative for the developing world at the upcoming Emerging Technology Conference.
Secure Your Wireless with IPsec (16 tags)
Wireless can make your life much, much easier, but those pesky radio waves won't stay put. Sometimes this is good, but sometimes you want to lock down your network. WEP and MAC address filtering aren't secure enough. IPsec, the same approach used to secure VPNs, is much better. Dan Langille explains how to configure Wifi with IPsec.
Top Ten 802.11 Myths of 2005 (8 tags)
Are security and mobility really the keys to the design of wireless networks? Is 802.11n really on its way? Is 802.1X really too difficult to use? Matthew Gast debunks these and other 802.11 myths for 2005. Matthew is the author of 802.11 Wireless Networks: The Definitive Guide, 2nd Edition.
Recipe for a Linux 802.11b Home Network (8 tags)
Want to use your hard-wired home Internet connnection to surf wirelessly from your garden? Schuyler Erle shows you how to do it on even the tightest budget.