Wireless Mesh Networking (72 tags)
Tomas Krag and Sebastian Büettrich take a look at some of the principles of wireless mesh networking, and they provide a simple test scenario for running a mesh routing protocol on a Linux-based computer. Tomas will discuss wireless networks as a low-cost, decentralized alternative for the developing world at the upcoming Emerging Technology Conference.
Protect Yourself from WiFi Snoops (23 tags)
You needn't be at the mercy of WiFi snoops. There's a lot you can do to protect your home or business network, without spending a lot of time or even any money. Preston Gralla, author of Windows XP Hacks, 2nd Edition, shows you how with step-by-step guides to hiding your network SSID, filtering out MAC addresses, and using encryption.
Secure Your Wireless with IPsec (20 tags)
Wireless can make your life much, much easier, but those pesky radio waves won't stay put. Sometimes this is good, but sometimes you want to lock down your network. WEP and MAC address filtering aren't secure enough. IPsec, the same approach used to secure VPNs, is much better. Dan Langille explains how to configure Wifi with IPsec.
Mapping the 802.11 Protocol (8 tags)
A trip to London and a bit of unique inspiration gave Matthew Gast the ideas that would lead to the first draft of a visual map describing the relationship between the various components of the 802.11 standard and related security standards. Matthew details the road he took to the final version of his 802.11 protocol map. Matthew is the author of 802.11: The Definitive Guide, 2nd Edition.
Top Ten 802.11 Myths of 2005 (8 tags)
Are security and mobility really the keys to the design of wireless networks? Is 802.11n really on its way? Is 802.1X really too difficult to use? Matthew Gast debunks these and other 802.11 myths for 2005. Matthew is the author of 802.11 Wireless Networks: The Definitive Guide, 2nd Edition.