Collection of papers and links covering the major wireless standards and their associated vulnerabilities.
Details key security weaknesses in the 802.11b standard and how to secure against them.
Article covering basic 802.11b security, WEP, MAC address filtering, broadcast key rotation and EAP based standards.
Tool for penetration testing Cisco LEAP wireless access points, can recover weak passwords by passively monitoring wireless traffic. Includes documentation and downloads.
A two part article on developing a security policy for wireless networks expressing key policy components in great detail.
A three part article on wireless penetration testing discussing the different types of attacks that can be used, how to protect against them, and walks through a typical attack on a network.
Article by Will Knight, discussing a new authentication approach that can combat the risks associated with connecting to a rogue access point.
Offers security alerts and articles based on specific wireless LAN hardware and mirrored multi-platform software helpful for wireless security.
Tips for home users to secure their wireless LAN, with detailed instructions on how to execute each step of the process.
Easy tips for home users who want to get their network up quickly to secure their network against the most prevalent of threats.
Computers /
Security
|