Wireless security: Harder than you think

Monday, 4 August 2003, 12:16 AM EST

Once more I sat at the control console and went through the D-Link wireless access pointís forms to enable WEP (Wired Equivalent Privacy) encryption. I knew it wasn't exactly the best encryption on the planet, but it was better than nothing at all, and the network I was working with didn't handle much sensitive information anyway.

I entered the key in hex and clicked the submit button. Next, I went to a laptop computer that already had 802.11g built in. Until I'd enabled encryption on the access point, everything had been (in technical terms) hunky-dory. Now, of course, the access point couldn't be reached.

So I went through the configuration for the 802.11g hardware (designed for the laptop by Hewlett-Packard), entered the same hex key as I'd entered into the access point, and confirmed that the rest of the settings were correct.

Again I submitted the changes. And again the laptop wouldn't communicate with the access point.

[ Read more ]

Comment:

For all your wireless security information needs, visit the Wireless outside articles section of HNS.

Related items




Spotlight

Behavioral analysis and information security

Posted on 22 September 2014.  |  In this interview, Kevin Watkins, Chief Architect at Appthority, talks about the benefits of using behavioral analysis in information security and how behavioral analysis can influence the evolution of security technologies.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Sep 23rd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //