Kamis, 15 Agustus 2013

Are You Prepared For A Wi Fi Network In Your Home

http://adf.ly/pd1Z6

Are You Prepared For A Wi Fi Network In Your Home


One of the quickest growing segments of net property these days is Wireless net. Wi-Fi, or wireless local area network, is net property over twin band networks that ar classified by a collection of standards most typically named as 802.11, 802.11a, and 802.11b. though there ar many different standards, these 3 ar the foremost common at this point. Access over these sorts of networks is accessible in most major cities within the u.  s., and therefore the technological standards accustomed outline Wi-Fi access ar in use in several different countries.
The 802.11 standards will be classified by many distinctive options, moreover because the potential speed obtainable. 802.11a and 802.11b ar presently thought-about the 2 quickest wireless network standards giving uploads up to 11mbps and downloads at a brisk 54mbps. Clearly these speeds will vie with any satellite or line net giving, and lots of cable services ar considerably slower.
Security Issues:
The convenience and simple use of Wi-Fi property additionally comes with many security problems. beside the quality security issues inherent in a very wired association, information sent and received via a wireless association will be intercepted and received nearly anyplace at intervals a given vary. With the introduction of Wired Equivalent Privacy, or WEP, cryptography has become a typical security live with nearly each wireless high speed net association. Even with a WEP key in situ the wireless information will be captured, it's merely unlikely that the knowledge would be helpful. after all a determined hacker may eventually access the info, however this may be the exception not the rule.
A a lot of common Wi-Fi security drawback is named as AN Evil Twin Attack. this kind of attack takes place once a hacker hijacks a wireless network signal. The hijacker creates a wireless access purpose in their own laptop computer, essentially giving a wireless network to anyone at intervals vary of their signal. The hacker then enters a preferred wireless access space like a cafe or mall and makes their network obtainable. once a user tries to log into the network offered by their favorite cafe, it's attainable they erroneously opt for the hacker’s wireless access purpose. usually|this will be} the way a hacker can bypass several security measures often together with cryptography. each packet of knowledge sent or received via AN Evil Twin is accessible to the hijacker. There ar many security measures which will be taken to avoid AN Evil Twin attack moreover as different dangers.