Sep 30

The client would first need to make a connection to the access point.

Sep 30

One can apply AES in many different ways. The way that the 802.11i standard has chosen to apply AES is with CCMP

Sep 30

The Temporal key Integrity Protocol (TKIP) was an interim solution developed to fix the key reuse problem of WEP.

Sep 27

A “fragmented” hard disk, in which large files are stored in discontiguous sectors, makes read and write heads work overtime and puts a drag on performance.

Sep 13

The IEEE, which is an acronym for Institute of Electrical and Electronics Engineers, is the group that created all the 802 standards.

Sep 13

On November 4, 2003, Robert Moskowitz found out that WPA and 802.11i suffer from an offline dictionary attack.

Sep 13

The 802.1x protocol had experienced a number of vulnerabilities when the industry decided to adapt it to wireless.

Sep 13

We will take a look at denial-of-service (DoS) attacks against wireless.

Sep 13

WEP has undergone major scrutiny and subsequently failed all three tenets of its original design.

Aug 07

The Global Positioning System (GPS) is a U.S. military space system operated by the U.S. Air Force.

Aug 07

The GSM security model is based on a shared secret that is located

Jul 19

Ever since DARPA (the Defense Advanced Research Projects Agency, which funded the research into and the construction of the early Internet)

Jul 19

Many people object vigorously to the content of pornographic, violent, and hate spam.

Jul 15

It’s sometimes very useful to share your computer’s existing Internet connection with another computer.

Jul 15

File Sharing
We tell our children that sharing is good, but when it comes to computers, running with sharing turned on can pose a security risk.

Jun 23

If you have been using e-mail for more than a few weeks, perhaps you have received an e-mail message like

Jun 23

One of the most confusing things about e-mail for many users these days is spoofed e-mail addresses.

Jun 23

Most home users use either a POP3 (Post Office Protocol) e-mail account or Webbased e-mail such as Hotmail or Yahoo.

Jun 23

When e-mail first began as a simple text-only command-line application to
exchange simple messages between computer engineers

Jun 23

Hand in hand with the preceding advice, you should also create a “dummy” Administrator account.

Jun 23

Having an intrusion detection system (IDS) on your computer or network is like having surveillance cameras or a motion sensor alarm in your home.

Jun 23

Obviously, having 70, 20, or even 5 different passwords at a given time can be difficult to keep track of.

Jun 20

Password-cracking utilities use three methods for attempting to break a password.

Jun 20

So what’s a person to do? You can’t even remember what you had for dinner last night or what time your son’s soccer practice is. How are you going to remember what your password is?

Jun 20

You may never have heard of the terms FAT32 and NTFS, or at least never cared enough to find out what they are, but they are file systems. When you format your hard drive, you can choose whether to format it using FAT32 or NTFS.

Jun 18

Use PayPal’s Seller Protection Policy to ensure that you don’t lose money to fraudulent payments.

Jun 15

You may have received an email in which you have received a warning that you can no longer use your eBay account, unless you verify it.

Jun 03

Websites can gather an astonishing amount of information about you.

May 27

In a word, no. Experts hardly expect the act to stop, or even slow the flow of spam, and evidence indicates that its not having much impact.

May 26

If your network hardware is more than a year or two old

Page 1 of 212