Wireless networking
Wireless networking has freed IT users from the confines of their desk and the wired network. Technologies such as 802.11 Wi-FI, Bluetooth and even satellite links have opened up new opportunities for IT innovation. We analyse the latest trends and technologies.
-
News
25 Apr 2024
Extreme Connect 2024: AI in networks to live or die by trust
Cloud networking provider unveils hub for research, development and innovation in networking previews, tapping AI to offer a new way to design, optimise and deploy networks Continue Reading
-
News
24 Apr 2024
HPE looks to go beyond standards requirements with Wi-Fi 7 access points
HPE announces Wi-Fi 7 wireless access points to provide managed ‘comprehensive’ edge IT solution to provide extended user and IoT connectivity, in-line processing, enhanced security and maximised performance Continue Reading
-
Tip
18 Dec 2006
What are the fundamentals of ATM and ISDN?
Lisa Phifer explains the fundamentals of ATM and ISDN and why they are used. Continue Reading
-
News
11 Dec 2006
SIP desktop phone blends functionality, style
VoIP desktop phones are no longer the clunky hunks of plastic that take up space on your desk. Siemens yesterday launched a new family of SIP phones that are as slick as they are functional. Continue Reading
-
Tip
03 Dec 2006
Access your ISA and Exchange Server from outside the office
Learn how to configure your Linksys router so that you can access your ISA and Exchange Server from outside the office in this expert response by Lisa Phifer. Continue Reading
-
News
28 Nov 2006
Effective wireless security is available, but holes exist
Specialist vendors offer products that allow even small businesses to run a secure wireless network without paying a high price, but that doesn't mean companies are using it. Continue Reading
-
Tip
22 Nov 2006
Wireless connections with ad hoc networks
Ad hoc wireless networking in Windows Vista with the IPv6 protocol has its risks, but it also has several built-in security mechanisms. In this tip, Brien Posey explains how these security features help counteract some risks of wireless networks. Continue Reading
-
News
30 Oct 2006
Wireless network security testing
The abundance of wireless devices is making wireless networks -- both authorised and unauthorised -- more common. Attack your own wireless networks to find vulnerabilities before malicious hackers do. Security testing expert Kevin Beaver covers the tools and techniques you'll need to find and exploit insecure wireless networks. Continue Reading
-
Feature
17 Oct 2006
Nokia E62 thin mobile productivity device
In this product review, John Shepler weighs in on Nokia's new E62 mobile device for Cingular Wireless. Continue Reading
-
Tip
15 Oct 2006
Creating a WPA2 compliant network
Our expert, Lisa Phifer, goes through the basic principles of creating a WPA2 compliant network. Continue Reading
-
Tip
15 Oct 2006
High-gain antennas and the near field effect
In this response, Lisa Phifer explains the use of a high-gain antenna and what the near field effect is. Continue Reading
-
Tip
15 Oct 2006
Wireless connection in the wilderness
Lisa Phifer explains how to connect office buildings wirelessly where laying cable is not an option due to trees and rocky terrain. Continue Reading
-
News
15 Oct 2006
Flaw found in Toshiba wireless device driver
Attackers could exploit a flaw in the Toshiba Bluetooth wireless device driver to cause a denial of service or launch malicious code on victims' machines. Continue Reading
-
News
03 Oct 2006
Cisco, Cognio team up on Wi-Fi interference detection
Cisco and Cognio have partnered to troubleshoot and diagnose problems on the Wi-Fi network. Continue Reading
-
News
03 Oct 2006
Cisco, Cognio team up on Wi-Fi interference detection
Cisco and Cognio have partnered to troubleshoot and diagnose problems on the Wi-Fi network. Continue Reading
-
News
14 Sep 2006
Set up an ad hoc WiFi network
What if you wanted to do pretty much everything you can do on a network, but didn't have a router? You can set up an ad hoc network, in which you can connect on a peer-to-peer basis with other computers and PDAs. You don't need any extra software; the capability to do this is built right in XP. Continue Reading
-
News
06 Sep 2006
VoIP startup untethers would-be mobile workers from wireline office phones
VoIP startup DiVitas Networks has voice-over-WiFi-to-cellular technology in the works that gives endusers access to enterprise apps and puts dual-mode handset management in the hands of network administrators. Continue Reading
-
News
05 Sep 2006
ControlGuard targets rogue devices
ControlGuard Access Manager is an effective tool for controlling what devices users can add to their workstations and how they are used. Continue Reading
-
Feature
04 Sep 2006
Protecting wireless networks: Step 3
Security testing expert Kevin Beaver covers the tools and techniques needed to find and exploit insecure wireless networks. Continue Reading
-
Feature
04 Sep 2006
Protecting wireless networks: Step 2
Security testing expert Kevin Beaver covers the tools and techniques you'll need to find and exploit insecure wireless networks. Continue Reading
-
Feature
04 Sep 2006
Wireless network security testing
Attack your own wireless networks to find vulnerabilities before malicious hackers do. Continue Reading
-
Tip
20 Aug 2006
Secure network against illegal users
Lisa Phifer gives advice on how to handle illegal users on a network. Continue Reading
-
News
14 Aug 2006
Wireless security boost for laptops outside the office
>Most companies do a pretty good job with wireless security within the office walls, but what happens when end users take their laptops home -- or to Starbucks? Continue Reading
-
News
02 Aug 2006
RFID security issues are cause for corporate concern
Although small in nature, RFID tags could be used to attack databases and corrupt critical information. It's a growing concern as corporate RFID use skyrockets, yet experts say there are reasonable ways to mitigate the risks and gain the business benefits. Continue Reading
-
News
26 Jul 2006
Blue Cross bears burden of 'no wireless' policy
Blue Cross of Idaho had a "no wireless" policy on paper but never really enforced it. That is, until a team of auditors said the company had better do something. Continue Reading
-
News
28 Nov 2005
Step 6: Configuring wireless clients
With wireless networks proliferating it is a good idea to understand what it takes to build a VPN for a wireless gateway. Contributor and Microsoft MVP Brien Posey details the necessary steps in this step-by-step guide. Continue Reading
-
News
21 Nov 2005
Wireless security: Public Wi-Fi could open security holes
A Michigan county is working to give everyone within its borders wireless Internet access. But when it comes to security, users are on their own. Continue Reading
-
News
20 Nov 2005
Wireless security crucial to railway safety
A transportation firm uses wireless technology to keep the trains running on time. But securing mobile devices isn't easy when they're spread across the globe. Continue Reading
-
News
16 Nov 2005
Wireless security: Companies deal with software updates
A health care provider found it could use wireless technology to dramatically boost patient care. But first it had to figure out how to deploy security updates over a wireless network. Continue Reading
-
News
05 Sep 2005
Extending perimeters
The news that, up until 2006, 70% of successful wireless local area network (WLAN) attacks will be because of the misconfiguration of WLAN access points and client software is disquieting on a number of levels. Continue Reading
-
News
11 May 2005
A new era of computer worms: Wireless mobile worms
In this excerpt of Chapter 9 from "The Art of Computer Virus Research and Defense," author Peter Szor dissects the Cabir worm. Continue Reading
-
Feature
15 Apr 2005
The acceptable rules of the mobile game
Mobile networks allow you to connect to your network from almost anywhere by the appropriate methodology. Yet that may also mean... Continue Reading
- News 08 Mar 2005
-
News
01 Dec 2004
Phreaks love Bluetooth
Bluetooth is becoming the vector of choice for next-generation phone phreakers to swipe files from other users, make calls or render mobile phones completely useless. Continue Reading
-
News
23 May 2004
Hacking for Dummies: Chapter 10 -- Wireless LANs
Read Chapter 10, Wireless LANs, from the book "Hacking for Dummies" written by Kevin Beaver. Continue Reading
-
Feature
13 Nov 2003
How to secure a wireless Lan
Stuart Okin and Ian Hellen at Microsoft UK give their opinion on how different forms of data encryption can protect wireless Lan... Continue Reading
-
News
15 Nov 2000
Wap usage: Planes, phones and automobiles
So your globe-trotting executives want to change their itineraries in mid-journey and need to check that their revised schedules still fit with corporate... Continue Reading -
Feature
01 Nov 2000
Tags take on the barcode
Radio frequency tags could be the technology that kills off the barcode. Bill Goodwin explains how they work and what is holding... Continue Reading
- Feature 12 Jul 2000