Last Updated on 27 March 2015, Total: 34 Articles and Tutorials
The term wireless networking refers to technology that enables two or more computers to communicate using standard network protocols, but without network cabling. The computers connect to the network using radio signals.
The articles in this section give an overview on how wireless networking functions, the different types of wireless networks available, and the new technologies being developed in the field.
In this article the author will share some techniques you can use to help prevent wireless eavesdropping, attacks, and even unintentional security vulnerabilities... Read More
In this article I’ll discuss the main threats associated with using Wi-Fi connections, laptops, smartphones, and tablets, and how to combat them... Read More
In this article, the author reviews various settings of wireless routers or Access Points (APs)... Read More
There are many tools you can use when testing, monitoring, troubleshooting, or doing penetration testing on your RADIUS server and/or enterprise (802.1X) wireless network. Here I’ll share a couple with you and most are free and/or open source... Read More
This article will discuss the Wi-Fi eavesdropping issue and share some tips on how to protect the users on your private network and how to protect yourself when using public Wi-Fi hotspots... Read More
This article concludes the series on Windows Server 8 server management by examining how PowerShell cmdlets have been simplified and how the Integrated Scripting Environment has changed... Read More
In this article the author discusses some of the network-related interface, feature, and functionality changes in Windows 8 Consumer Preview... Read More
This article continues the discussion of Microsoft’s new management philosophy by discussing the newly redesigned PowerShell... Read More
This article continues the discussion of server management in Windows Server 8 by looking at Server Manager’s multi-server management capabilities... Read More
In this article the author points out some lesser known wireless security vulnerabilities and how you discover what they are, how they can affect your network, and how to protect against them... Read More