Last Updated on 30 Sept. 2014, Total: 31 Articles and Tutorials
The term wireless networking refers to technology that enables two or more computers to communicate using standard network protocols, but without network cabling. The computers connect to the network using radio signals.
The articles in this section give an overview on how wireless networking functions, the different types of wireless networks available, and the new technologies being developed in the field.
There are many tools you can use when testing, monitoring, troubleshooting, or doing penetration testing on your RADIUS server and/or enterprise (802.1X) wireless network. Here I’ll share a couple with you and most are free and/or open source... Read More
This article will discuss the Wi-Fi eavesdropping issue and share some tips on how to protect the users on your private network and how to protect yourself when using public Wi-Fi hotspots... Read More
This article concludes the series on Windows Server 8 server management by examining how PowerShell cmdlets have been simplified and how the Integrated Scripting Environment has changed... Read More
In this article the author discusses some of the network-related interface, feature, and functionality changes in Windows 8 Consumer Preview... Read More
This article continues the discussion of Microsoft’s new management philosophy by discussing the newly redesigned PowerShell... Read More
This article continues the discussion of server management in Windows Server 8 by looking at Server Manager’s multi-server management capabilities... Read More
In this article the author points out some lesser known wireless security vulnerabilities and how you discover what they are, how they can affect your network, and how to protect against them... Read More
This article discusses the ways in which the very nature of server management will change in Windows Server 8... Read More
In this article the author will briefly introduce the enterprise mode (for those not familiar with it) and discuss one of the exploits hackers could use, and also show you how to protect against it and other vulnerabilities... Read More
In this article the author discusses some solutions to help distribute and configure Wireless clients in WPA2-Enterprise with 802.1X authentication implementations... Read More