Search
Related Links

 

 

Informative Articles

All about the new SCMAD Certification Exam
Introduction The mobile market is envisioned as the next technological wave by leading industry experts. With approximately 150 million mobile phones – roughly 3 times the user base as that of desktop computers – it might well be...

Overcoming Small Business Networks Sales Objections
Learn how you can overcome the most common sales objections heard when selling networks to small business prospects, customers, and clients. Do you need help overcoming sales objections? Do you sell computer networks, or other...

Reasons to Start a Wireless Network.
As far as I'm concerned, wireless networks would have to rank as one of the best inventions in history. They really are the best thing since sliced bread. I mean, really, bread is easy enough to cut yourself, but have you ever tried to wire up a...

The Power of the BLOG
Can a Blog earn you a prison sentence? Ask Mojtaba Saminejad. He is an Iranian whose Blog, published in the Farsi language, earned him a two-year prison sentence in June 2005. The online community is fast waking up to the power of blogs which...

Wireless Shopping with RFID
So wireless networking has got rid of your network cables and your USB cables... what can it do next? Well, the answer might surprise you: wireless is going shopping. There is a small army of uses for this technology and many are in use at this...

 
The security risks and ways to decrease vulnerabilities in a 802.11b wireless environment

This document explains topics relating to wireless networks. The main topics discussed include, what type of vulnerabilities exist today in 802.11 networks and ways that you can help prevent these vulnerabilities from happening. Wireless networks have not been around for many years. Federal Express has been using a type of wireless networks, common to the 802.11 networks used today, but the general public has recently just started to use wireless networking technology. Because of weak security that exists in wireless networks, companies such as Best Buy have decided to postpone the roll-out of wireless technology. The United States Government has done likewise and is suspending the use of wireless until a more universal, secure solution is available.

Background

What is Wireless?

Wireless LANs or Wi-Fi is a technology used to connect computers and devices together. Wireless LANs give persons more mobility and flexibility by allowing workers to stay connected to the Internet and to the network as they roam from one coverage area to another. This increases efficiency by allowing data to be entered and accessed on site.

Besides being very simple to install, WLANs are easy to understand and use. With few exceptions, everything to do with wired LANs applies to wireless LANs. They function like, and are commonly connected to, wired Ethernet networks.

The Wireless Ethernet Compatibility Alliance [WECA] is the industry organization that certifies 802.11 products that are deemed to meet a base standard of interoperability. The first family of products to be certified by WECA is that based on the 802.11b standard. This set of products is what we will be studying. Also more standards exist such as 802.11a and 802.11g.

The original 802.11 standard was published in 1999 and provides for data rates at up to 2 Mbps at 2.4 GHz, using either FHSS or DSSS. Since that time many task groups have been formed to create supplements and enhancements to the original 802.11 standard.

The 802.11b TG created a supplement to the original 802.11 standard, called 802.11b, which has become the industry standard for WLANs. It uses DSSS and provides data rates up to 11 Mbps at 2.4 Ghz. 802.11b will eventually be replaced by standards which have better QoS features, and better security.

Network Topology

There are two main topologies in wireless networks which can be configured:
Peer-to-peer (ad hoc mode) – This configuration is identical to its wired counterpart, except without the wires. Two or more devices can talk to each other without an AP.

Client/Server (infrastructure networking) – This configuration is identical to its wired counterpart, except without the wires. This is the most common wireless network used today, and what most of the concepts in this paper apply to.

Benefits of Wireless LANs

WLANs can be used to replace wired LANs, or as an extension of a wired infrastructure. It costs far less to deploy a wireless LAN than to deploy a wired one. A major cost of installing and modifying a wired network is the expense to run network and power cables, all in accordance with local building codes. Example of additional applications where the decision to deploy WLANs include:
Additions or moves of computers.
Installation of temporary networks
Installation of hard-to-wire locations

Wireless LANs give you more mobility and flexibility by allowing you to stay connected to the Internet and to the network as you roam.

Cons of Wireless LANs

Wireless LANs are a relatively new technology which has only been around since 1999. With any new technology, standards are always improving, but in the beginning are unreliable and insecure. Wired networks send traffic over a dedicated line that is physically private; WLANs send their traffic over shared space, airwaves. This introduces interference from other traffic and the need for additional security. Besides interference from other wireless LAN devices, the 2.4 GHz is also used by cordless phones and microwaves.

Security Issues of WLANs

War-driving
War-driving is a process in which an individual uses a wireless device such as a laptop or PDA to drive around looking for wireless networks. Some people do this as a hobby and map out different wireless networks which they find. Other people, who can be considered hackers, will look for wireless networks and then break into the networks. If a wireless is not secure, it can be fairly easy to break into the network and obtain confidential information. Even with security, hackers can break the security and hack. One of the most prevalent tools used on PDAs and Microsoft windows devices is, Network Stumbler, which can be downloaded at http://www.netstumbler.com. Equipped with the software and device, a person can map out wireless access points if a GPS unit is attached. Adding an antenna to the wireless card increases the capabilities of Wi-Fi. More information can be found at: http://www.wardriving.info and http://www.wardriving.com to name a few.

War-chalking
War-chalking is a method of marking wireless networks by using chalk most commonly. War-driving is usually the method used to search for networks, and then the person will mark the network with chalk that gives information about the network. Some of the information would include, what the network name is, whether the network has security, and possibly the contact information of who owns the network. If your wireless network is War-chalked and you don't realize it, your network can be used and/or broken into faster, because of information shown about your network.

Eavesdropping & Espionage
Because wireless communication is broadcast over radio waves, eavesdroppers who just listen over the airwaves can easily pick up unencrypted messages. These intruders put businesses at risk of exposing sensitive information to corporate espionage. Wireless LAN Security – What Hackers Know That You Don't www.airdefense.net Copyright 2002

Internal Vulnerabilities
Within an organization network security can be compromised by ways such as, Rouge WLANs (or Rouge Aps), Insecure Network Configuration, and Accidental Associations to name a few.

Rouge Access Points – An employee of an organization might hook up an access point without the permission or even knowledge of IT. This is simple to do, all a person has to do is plug an Access point or wireless router into an existing live LAN jack and they are on the network. One statistic in 2001 by Gartner said that, “at least 20 percent of enterprises already have rouge access points.” Another type of attack would be if, someone from outside the organization, enters into the


workplace and adds an Access Point by means of Social Engineering.

Insecure Network Configurations- Many companies think that if they are using a firewall or a technology such as VPN, they are automatically secure. This is not necessarily true because all security holes, big and small, can be exploited. Also if devices and technologies, such as VPNs, firewalls or routers, are mis-configured, the network can be compromised.

Accidental Associations – This can happen if a wireless network is setup using the same SSID as your network and within range of your wireless device. You may accidentally associate with their network without your knowledge. Connecting to another wireless LAN can divulge passwords or sensitive document to anyone on the neighboring network. Wireless LAN Security – What Hackers Know That You Don't www.airdefense.net Copyright 2002

Social Engineering – Social Engineering is one of the most effective and scariest types of attacks that can be done. This type of attack really scares me and can be done for many other purposes besides compromising security in wireless networks. A scenario: Someone dressed up as a support person from Cisco enters the workplace. The secretary sees his fake credentials and lets him get pass the front desk. The impersonator walks from cubicle to cubicle, collecting user names and passwords as he/she goes. After finding a hidden corner, which seems to be lightly traveled, he plugs an insecure Access Point into the network. At the same time he configures the Access Point to not broadcast its SSID and modifies a few other settings to make it hard for the IT department to find this Rouge Access Point. He then leaves without ever being questioned by anyone because it looks like he just fits in. Now, all he has to do is be within 300 feet from the access point, (more if he added an antenna), and now has access to all kinds of secure documents and data. This can be a devastating blow to any corporation and could eventually lead to bankruptcy if the secrets of the company were revealed to competitors.
Bruce Schneier came to my classroom and said the following about Social Engineering, “Someone is just trying to do their job, and be nice. Someone takes advantage of that by targeting this human nature. Social Engineering is unsolvable.”

Securing Wireless Networks

According to Bruce Schneier and others such as Kevin Mitnick, you can never have a totally secure computing environment. What is often suggested is to try and control the damage which can be done if security is breached. One can try many different tools on the market which can help prevent security breaches.

WEP – WEP supports both 64 and 128-bit keys. Both are vulnerable, however, because the initialization vector is only 24-bits long in each case. Its RC4 algorithm, which is used securely in other implementations, such as SSL, is quite vulnerable in WEP. Http://www.infosecuritymag.com/2002/jan/cover.shtml Wireless Insecurities By Dale Gardner. Different tools exist to break WEP keys, including AirSnort, which can be found at www.airsnort.net. Although this method is not a secure solution, it can be used to help slowdown an attacker if other means are not possible financially or otherwise.

VPN and IPSec- IPSec VPNs let companies connect remote offices or wireless connections using the public Internet rather than expensive leased lines or a managed data service. Encryption and authentication systems protect the data as it crosses the public network, so companies don't have to sacrifice data privacy and integrity for lower costs. A lot of VPN's exist on the market today. An important note about VPNs is, interoperability does not really exist, and whatever you use for your server has to be the same brand as your clients most of the time. Some VPNs include:
Borderware
BroadConnex Networks
CheckPoint
Cisco
Computer Associates

DMZ – Adding this to your network enables you to put your wireless network on an untrusted segment of your network.

Firewalls – Firewalls are all over the place. Firewalls range from hardware to software versions. By adding a firewall between the wireless network and wired network helps prevent hackers from accessing your wired network. This paper doesn't go into specifics about different firewalls and how to set them up, but there are many. Some of the firewalls include:
- ZoneAlarm (an inexpensive based software firewall) Zonelabs.com
- Symantec has many different firewalls depending what you require.

PKI - Public-key infrastructure (PKI) is the combination of software, encryption technologies, and services that enables enterprises to protect the security of their communications and business transactions on the Internet. What is PKI? http://verisign.netscape.com/security/pki/understanding.html

Site Surveys – Site Surveys involve using a software package and a wireless device to probe your network for Access Points and security risks.

Proactive Approaches
Since wireless technology is insecure, companies or anyone can take a proactive approach to try and identify hackers trying to gain access via wireless networks.

Honeypots – are fake networks setup to try and lure in hackers. This enables administrators to find out more about what type of techniques hackers are using to gain access. One product is Mantrap created by Symantec.
“ManTrap has the unique ability to detect both host- and network-based attacks, providing hybrid detection in a single solution. No matter how an internal or external attacker tries to compromise the system, Symantec ManTrap's decoy sensors will deliver holistic detection and response and provide detailed information through its system of data collection modules.”
http://enterprisesecurity.symantec.com/products/products.cfm?ProductID=157

Intrusion Detection – Intrusion Detection is software that monitors traffic on the network. It sounds out a warning if a hacker it trying to access the network. One such free product is Snort.
“Before we proceed, there are a few basic concepts you should understand about Snort. There are three main modes in which Snort can be configured: sniffer, packet logger, and network intrusion detection system. Sniffer mode simply reads the packets off of the network and displays them for you in a continuous stream on the console. Packet logger mode logs the packets to the disk. Network intrusion detection mode is the most complex and configurable configuration, allowing Snort to analyze network traffic for matches against a user defined rule set and perform several actions based upon

About the Author

RJ Computer Consulting
http://rjcomputerconsulting.com
Richard@johnsorichard.com

 

Computer networking - Wikipedia, the free encyclopedia
Network cards such as this one can transmit data at high rates over Ethernet cables. ... Computer networking is sometimes considered a sub-discipline of ...
en.wikipedia.org
 
Social network - Wikipedia, the free encyclopedia
Social network analysis (related to network theory) has emerged as a key ... Social networking also refers to a category of Internet applications to help ...
en.wikipedia.org
 
Networking on the Network
Here, then, are some of the fundamentals of professional networking. ... Asking advice from the people in your network is part of the process. ...
polaris.gseis.ucla.edu
 
Computer Networking - Wireless Networks - Home and Wireless ...
Site offers coverage of computer network technology in basic networks, VPN, Web servers, Intranets and Extranets, tutorials, and troubleshooting.
compnetworking.about.com
 
ITtoolbox Networking Knowledge Base
A networking community for IT professionals. Focusing on connectivity, network management, network operating systems, security, and other aspects of ...
networking.ittoolbox.com
 
Howstuffworks "How Home Networking Works"
How home networking works and the different methods to create a home network.
www.howstuffworks.com
 
SmallNetBuilder
SmallNetBuilder provides networking and IT news, reviews, help and information for professional and "prosumer" SOHO and SMB users.
www.smallnetbuilder.com
 
Network Computing - Computer Networking, Network Security and ...
Network Computing - Computer Networking, Network Security & Management news. Enterprise product reviews, comparisons and analysis built by IT professionals ...
www.networkcomputing.com
 
CareerJournal | Career Networking - Professional Network ...
Professional Network - Career networking news and advice from The Wall Street ... Networking tips that will help you advance your job search or career.
www.careerjournal.com
 
Trail: Custom Networking (The Java™ Tutorials)
The first describes the networking capabilities of the Java platform that you ... The second provides a brief overview of networking to familiarize you with ...
java.sun.com
 
Windows Server 2003, Longhorn Server & Vista Networking Articles
Features a wealth of tutorials on various Windows networking related topics such as setting up Windows NT/XP/2000/2003 networks, troubleshooting, ...
www.windowsnetworking.com
 
IBM Networking | IBM Networking
The era of e-business on demand requires superlative networking capability. ... IBM Networking Services provides e-business solutions anywhere in the ...
www.networking.ibm.com
 
Computerworld - Networking - Voip - Bluetooth - Firewall - Wireless
Computerworld, the 'Voice of IT Management' is your information source for computer networking. Access up to date information on LAN/WAN, hardware/devices, ...
www.computerworld.com
 
HP Networking products and solutions
HP ProLiant networking products provide high-powered, simple solutions for enterprise, business, or home networking environments, including ProLiant and ...
www.hp.com
 
Monster: Networking
Networking Networking Timeline. Networking Timeline · Making New Contacts · How to Set Up and Run an Informational Interview · Nurturing and Keeping ...
content.monster.com
 
Access | CNET News.com
Phone company shrugs off competition concerns over Verizon's Fios network, saying existing copper is doing the bandwidth trick. ...
news.com.com
 
Network Management: Covering today's Network topics
Find the latest information on Network Management, Network Security, Network Design and more.
searchnetworking.techtarget.com
 
cisco networking academy program
cisco.netacad.net/ - 1k - Cached - Similar pages
 
Networking and Your Job Search: The Riley Guide
Networking starts long before a job search, and you probably don't even realize you are doing it. ... In Terms of a Job Search, Networking is the way to Go! ...
www.rileyguide.com
 
NetworkWorld.com
Networking news, reviews, opinions and forums from the Leader in Network Knowledge.
www.networkworld.com
 
 

 

Content Menu
  • 10 effective ways to reduce your business costs

  • 10 secret ways of getting your website listed on google

  • 10 simple ways to expand your subscriber list

  • 10 successful strategies to site promotion

  • 10 things to ponder before moving your office network

  • 13 point business development plan for it professionals

  • 15 ways to promote elearning programs

  • 2much hosts webmaster access blow out

  • 2much success delays livecamnetwork upgrade

  • 3 quick and easy steps to earn money online now

  • 3 simple steps to internet home business promotion

  • 3 summer computer tips

  • 3 tips to fix unreliable wireless connections

  • 4 computer money saving tips

  • 5 reasons why you need a wireless network

  • 5 simple ways to increase your computer speed

  • 5 stress reducing computer tips

  • 5 things you need to know before deciding on a certification training

  • 5 ways to make your resume shine on line

  • 6 essential steps to protect your computer on the internet for free

  • 7 key items to include in your email signature file

  • 9 steps to protect your ms windows system from viruses

  • 9 ways to get an mcse or cne without wasting 5000

  • about centralized computer systems

  • advanced wireless networking

  • advance online networking getting others to read your emails

  • adware is it safe

  • affiliates need to read their newspaper

  • affiliate profits 101 how to earn your first dollars as an affiliate

  • all about the new scmad certification exam

  • an introduction to text messaging

  • aoe adult online europe amsterdam is calling

  • apple mac mini it fits anywhere it is the most affordable mac ever

  • are affiliate programs the buried treasure of the internet

  • are you overlooking the gold in your email folders

  • article banks and google alerts harness your publishing power

  • a graphic designers top ten resolutions for 2005

  • a graphic designer s top ten resolutions for 2005

  • a toolbar for each

  • band promotion book your garage band some shows or gigs

  • basic diagnosis guidelines for your pc

  • basic problem in a pc

  • becoming a truly valuable ccna

  • beware of spyware

  • bigsquid rfid leading rfid solution in india

  • blogging for personal benefits

  • blogging your way to benefits

  • blogs i wanna have my blogs

  • bluetooth personal wireless networking

  • boost your websites search engine rankings in 5 simple steps

  • bring your visitors back clamoring for more

  • bring your visitors back clamoring for more maintain and improve your web site weekly

  • broadband and internet 101

  • building a wireless network in your home

  • business needs vs network performance critical challenges facing network managers

  • buying a laptop computer

  • buying a laptop that you can use as a personal assistant

  • bypass proxy firewall 100 java http tunnel for anonymous surfing

  • ccna 640 801 certification primer

  • ccna 640 801 preparation and exam review

  • ccna 640 801 preparation exam review

  • ccna icnd ccna intro or 640 801 how to choose

  • certwatch 2006

  • cisco ccna ccnp home labs developing troubleshooting skills

  • cisco ccna ccnp home lab how to configure reverse telnet

  • cisco ccna ccnp home lab setup how to configure reverse telnet

  • cisco ccna certification becoming a truly valuable ccna

  • cisco ccna certification broadcasts unicasts and multicasts

  • cisco ccna certification should you take the one exam or two exam approach

  • cisco certification becoming a real ccna

  • cisco certification becoming a truly valuable ccna

  • cisco certification cabling cisco devices

  • cisco certification ccna candidate faq

  • cisco certification in what order should you take your ccnp exams

  • cisco certification taking your first certification exam

  • cisco certification the cisco three layered hierarchical model

  • cisco certification the osi model isnt just for exams anymore

  • cleaning your computer

  • computers and web cams are taking communication to levels only imagined in sci fi novels

  • computer networking consultants

  • computer network designing

  • computer network installation

  • computer phone voip pathology is preventable

  • computer tips that help small businesses operate profitably

  • connecting linux to the internet

  • creating a wireless home network

  • cut the wires

  • data security are your assets secure

  • dealing with digital disease

  • design matters in our visual culture

  • desktop security software risks part 1

  • digital dispatch is the internet safe

  • disgusted with dialup compare dsl providers cable and satellite internet to see if one is right for you

  • does your event need to be live

  • domains your friendly address on the internet

  • domain registration for great search engine ranking

  • do you know that spyware nuker is a malware itself

  • email marketing lesson starbucks a sexy lady and my search for the ezine

  • erp implementation success factors

  • ez link trading

  • e merging books

  • fast ways to reduce business costs

  • finding a good pc remote control solution

  • finding what you need

  • find the online business made for you 7 steps to set you free

  • five proven methods for increased internet sales

  • five proven methods for internet marketing success

  • five proven ways to increase internet sales

  • five reasons to do wireless networking

  • fleet maintenance software reviews

  • fraud not taken seriously

  • freedom and responsibility on the internet

  • freight broker software

  • freight software

  • get the boot a birds eye look into mcse boot camps

  • good computer maintenance part two

  • google the next step in im

  • got spyware tips for detection removal and prevention

  • hetman will help you conquer your files quickly and effectively

  • how do wireless networks work

  • how to become an internet marketing guru

  • how to bridge the digital divide

  • how to choose the best laptop accessories

  • how to combat spyware

  • how to eliminate spyware adware and pop up ads for free

  • how to obtain free advertising for your online business

  • how to pass ccna 6 steps to success

  • how to protect yourself from viruses adware spyware and hackers

  • how to really install a modem

  • how to stop spyware from infecting your system

  • hpc systems inc announces first 8 way processor amd opterone server

  • ideal connection builder for small businesses

  • improve your profile make more friends

  • increasing the range of your wireless access points

  • index

  • information technology degrees

  • internet2 a future so bright

  • internetworking overview

  • internet a medium or a message

  • internet a whole new world wide web including video and audio

  • intranet

  • introduction to cisco networking the osi model part i

  • introduction to isdn part iii pap

  • iscsi vs fc for meeting mission critical requirements

  • is it still good to share

  • is spyware watching you

  • is your computer sick

  • is your computer slow and sluggish take these steps to speed it up

  • is your laptop or home computer wireless enabled

  • is your network security and user access in the right balance

  • it skills and certification

  • i dont need a website do i

  • join the internet shopping bandwagon

  • keeping it clean virus removal basics

  • keeping your pc healthy at little or no cost

  • keeping your website in top condition 5 easy tips for maintaining a streamline site

  • kill the messenger service

  • laptop computers and the pvp effect

  • laptop computer extras for the mobile traveler

  • lavasfot ad aware free spyware removal

  • life in cyberspace

  • link building for a new web site

  • linux web hosting

  • living life loud

  • maximizing email security roi stop spam and save

  • maybe you already have wireless and dont know it

  • mcse 70 290 certification primer

  • microsoft and history of windows

  • microsoft business solutions var partner selection overview for it director manager controller

  • microsoft great plains implementation tailoring local versus remote support

  • microsoft great plains partner selection overview

  • modern scams online

  • my space is your space myspace com

  • my top 5 stock pick sources for 2005

  • networking basics

  • networking structures explained access point or ad hoc

  • network marketing success starts with you

  • network to find experts and insider tips

  • network wiring standards

  • overcoming small business networks sales objections

  • passing ciscos ccna and ccnp exams ping and extended ping

  • personal wireless with bluetooth

  • photo plus 2005

  • preparing for a career in information technology

  • printing troubleshooting guide

  • product reviews windows xp

  • protection for your computer system painless and free

  • protection for your pc painless and free

  • protect your system from the internet evils

  • qarea announces its wireless casino ready for stress testing on pda and cell phones

  • quick guide to computer training

  • read up on dial up

  • real estate investments that increase your net worth

  • reasons to start a wireless network

  • recognizing a pc with malware

  • remove rogue desktop icons created by spyware

  • report on growth and economic impact of the it industry

  • rf engineering for 802 11 wlan

  • risks of desktop software 1

  • risks of desktop software part 1

  • road warrior at risk the dangers of ad hoc wireless networking

  • rotator

  • sci fi communications at home

  • screenshots vista windows

  • search engine marketing john alexander interviews seo author susan oneil about the early days

  • secrets to spyproofing your computer in four easy steps

  • secure your data windows data backup computer software

  • selecting a cell phone

  • selecting a laptop

  • selecting a personal digital assistant

  • setting up a home network

  • setting up a network wired or wireless

  • setup a home wireless network a short tutorial

  • seven ways to speed up your pc

  • shop surf or send wireless home networks deliver the internet

  • simple tricks to maximize the reach of your marketing message

  • small business server business tips

  • software consulting

  • spam free marketing

  • spybot com spybot search destroy version 1 4

  • spys in cyberworld

  • spyware is hiding in your computer

  • spyware versus adware the difference impacts your privacy

  • spyware what it is and how to combat it

  • strategic internet marketing

  • successful myspace strategies

  • surfing searching networking 101

  • ten great careers for computer geeks

  • that darned old internet gateway

  • the advantages of becoming a master networker

  • the apple mac mini it fits anywhere and it is the most affordable mac ever

  • the best help desks on the internet

  • the birth of incident response the story of the first internet worm

  • the complete guide to spotting computer spies recording devices

  • the dark side of p2p file sharing

  • the evolution of technology the history of computers

  • the future of the web

  • the future of wireless networking

  • the google feedback loop for quality traffic

  • the history of computer

  • the importance of forum participation in promoting an internet business

  • the importance of protecting your pc from viruses and spam

  • the ins and outs of banner networking

  • the medium and the message

  • the metaphors of the net

  • the metaphors of the net part ii

  • the missing link of the internet

  • the next internet marketing gold rush

  • the perils of wireless networking

  • the power of the blog

  • the security risks and ways to decrease vulnerabilities in a 802 11b wireless environment

  • the solow paradox

  • the story of the first internet worm

  • three pronged trojan attack threatens security on the internet

  • time to redefine telecom

  • top 10 ways for web designers to find new clients

  • top 15 affiliate programs that pays top money

  • top 5 reasons to go wireless

  • transportation management software

  • transportation software

  • two enter internet battle

  • understanding the operation of mobile phone networks

  • using fiber patch cables

  • using the internet in your job search

  • verilan successfully interconnects seven carrier labs worldwide into one secure private network for optical internetworking forum oif worldwide interop demo at supercomm 2004

  • visual sciences an analysis software

  • voip a global telecommunications revolution

  • voip phone home

  • vulnerability assessment and network security

  • wardriving ethics

  • webcams science fiction becomes reality

  • web cams sci fi communication at home

  • weight loss for webmasters

  • whats your iq on basic pc phone voip knowledge

  • what certification should you pursue after the ccna

  • what exactly is an intel centrino mobile notebook

  • what is contract programming an alternative to the conformity of everyday employment

  • what is wireless networking

  • what is xbox360

  • what sms users are telling telcos

  • what will google do with 4 billion

  • when trade and community freedom starts to cost click on

  • which notebook computer has your name on it

  • why blog

  • why get a microsoft mcse certification

  • why join the information system security association

  • why learning the osi model is important and not just for exams

  • why over 90 of voip computer phone services are vulnerable to attack

  • wifi range what are the limits

  • wilibox launches embedded linux platform supporting ieee 802 11 ap and sta modes simultaneously

  • wilibox launches embedded linux wireless platform with industrys first 802 11 stack supporting access point and client modes simultaneously

  • windows task manager an overview

  • wired network working into wireless access points

  • wireless alphabet soup whats the difference anyway

  • wireless home networking choosing the right one

  • wireless home networking what you should know

  • wireless installation checklist

  • wireless internet comes to lasvegas net

  • wireless internet terminology confusion or clarity

  • wireless jargon glossary

  • wireless network

  • wireless networking basics

  • wireless networking cards a closer look

  • wireless networking explained

  • wireless networks how do they work

  • wireless shopping with rfid

  • wireless the future of connecting to the internet

  • wireless the new trend in computer rentals and projector rentals

  • wireless wonders and waterfall watches

  • wi fi networking what to look for range speed and standards

  • wi fi wireless fidelity description

  • women entrepreneurs in internet marketing

  • yawna yet another wireless networking article

  • your affiliate business peripherals software computers