Amazines Free Article Archive
www.amazines.com - Sunday, May 12, 2024
Read about the most recent changes and happenings at Amazines.com
Log into your account or register as a new author. Start submitting your articles right now!
Search our database for articles.
Subscribe to receive articles emailed straight to your email account. You may choose multiple categories.
View our newest articles submitted by our authors.
View our most top rated articles rated by our visitors.
* Please note that this is NOT the ARTICLE manager
Add a new EZINE, or manage your EZINE submission.
Add fresh, free web content to your site such as newest articles, web tools, and quotes with a single piece of code!
Home What's New? Submit/Manage Articles Latest Posts Top Rated Article Search
Google
Subscriptions Manage Ezines
CATEGORIES
 Article Archive
 Advertising (133573)
 Advice (161671)
 Affiliate Programs (34799)
 Art and Culture (73857)
 Automotive (145712)
 Blogs (75615)
 Boating (9851)
 Books (17223)
 Buddhism (4130)
 Business (1330657)
 Business News (426453)
 Business Opportunities (366518)
 Camping (10973)
 Career (72795)
 Christianity (15848)
 Collecting (11638)
 Communication (115089)
 Computers (241954)
 Construction (38962)
 Consumer (49953)
 Cooking (17080)
 Copywriting (6733)
 Crafts (18203)
 Cuisine (7549)
 Current Affairs (20320)
 Dating (45907)
 EBooks (19703)
 E-Commerce (48258)
 Education (185523)
 Electronics (83524)
 Email (6438)
 Entertainment (159856)
 Environment (28973)
 Ezine (3040)
 Ezine Publishing (5454)
 Ezine Sites (1551)
 Family & Parenting (111009)
 Fashion & Cosmetics (196608)
 Female Entrepreneurs (11853)
 Feng Shui (134)
 Finance & Investment (310616)
 Fitness (106469)
 Food & Beverages (63046)
 Free Web Resources (7941)
 Gambling (30227)
 Gardening (25202)
 Government (10519)
 Health (630139)
 Hinduism (2206)
 Hobbies (44083)
 Home Business (91664)
 Home Improvement (251213)
 Home Repair (46246)
 Humor (4724)
 Import - Export (5459)
 Insurance (45104)
 Interior Design (29616)
 International Property (3488)
 Internet (191031)
 Internet Marketing (146687)
 Investment (22861)
 Islam (1161)
 Judaism (1352)
 Law (80507)
 Link Popularity (4596)
 Manufacturing (20914)
 Marketing (99318)
 MLM (14140)
 Motivation (18233)
 Music (27000)
 New to the Internet (9496)
 Non-Profit Organizations (4048)
 Online Shopping (129734)
 Organizing (7813)
 Party Ideas (11855)
 Pets (38165)
 Poetry (2229)
 Press Release (12689)
 Public Speaking (5643)
 Publishing (7566)
 Quotes (2407)
 Real Estate (126707)
 Recreation & Leisure (95495)
 Relationships (87674)
 Research (16182)
 Sales (80351)
 Science & Technology (110294)
 Search Engines (23514)
 Self Improvement (153300)
 Seniors (6220)
 Sexuality (36010)
 Small Business (49312)
 Software (83034)
 Spiritual (23517)
 Sports (116155)
 Tax (7663)
 Telecommuting (34070)
 Travel & Tourism (308306)
 UK Property Investment (3123)
 Video Games (13382)
 Web Traffic (11790)
 Website Design (56919)
 Website Promotion (36663)
 World News (1000+)
 Writing (35843)
Author Spotlight
CURTIS ENGLAND

I'm a full-time Writer, dreamer and chief executive manager. I write to release my true stories in t...more
MARTIN ADAM

Working in this organization from last 10 years. I did my graduation from the University of Texas, U...more
DESIGNPLUZ DIGITALAGENCY

Designpluz has steadily matured from a passionate graphics design start-up, into a full service digi...more
ELLIOT CHANG

Financial analyst and author writing on economy and business. ...more
TAL BARNEA

Tal is an electrical engineer with over 25 years of expertise with hardware, software, mechanical an...more


Xiang Jie Comprehensive Analysis of WLAN Security Overview-WLAN, wireless local area network, WPA-c by e55he swrzsnb





Article Author Biography
Xiang Jie Comprehensive Analysis of WLAN Security Overview-WLAN, wireless local area network, WPA-c by
Article Posted: 03/20/2011
Article Views: 98
Articles Written: 2033
Word Count: 1049
Article Votes: 0
AddThis Social Bookmark Button

Xiang Jie Comprehensive Analysis of WLAN Security Overview-WLAN, wireless local area network, WPA-c


 
Business,Business News,Business Opportunities
Have to Mobile Resistance, simple installation, high flexibility and scalability, as an extension of traditional wired networks, in many special environment has been widely used. With the wireless data network solutions has introduced, "whether you are at any time, anywhere can easily access," that goal was easily achieved.

  As wireless local area network as a carrier of electromagnetic waves by the public, any person who has a condition eavesdropping or interference information, and therefore the behavior of unauthorized access and eavesdropping more difficult to prepare. In 2001, a hacker conference in Las Vegas, security experts point out that wireless networks will become another piece of land of hacker attacks. General hacking tool box Package Including a computer with a wireless network card and a wireless network card detection software known as Netstumbler (download). Therefore, we at the beginning of wireless networks, it should give full consideration to their safety. Common wireless Network Security Technology are the following:

Service Set Identifier (SSID) Through multiple wireless access points AP (AccessPoint) to set a different SSID, the wireless station and asked to produce the correct SSID to access the AP, so that you can allow different groups of users to access, and resources access permissions to different restrictions. So that the SSID is a simple password, providing some security, but if the field configuration AP Broadcasting Its SSID, then the safety will decline. As the general case, the user's own client system configuration, so many people know the SSID, it is easy for unauthorized users to share. Some manufacturers now support "to any (ANY)" SSID way, as long as the wireless station in range of any AP, the client will automatically connect to the AP, it will skip the SSID security.

Physical Address Filter (MAC) Workstation as each wireless network card has a unique physical address, so you can manually maintain a set of AP allows access to the MAC address list, to achieve physical address filtering. This program requires a list of AP's MAC address must be updated, scalability is poor; and MAC addresses can be forged, in theory, it is also lower-level certification authority. Physical Address filtering is hardware certification, rather than user authentication. This approach requires the MAC address of AP in the list must be updated, are currently manual; if the user increases, scalability is poor, it is only suitable for small network size.

Connection Equivalent Privacy (WEP) Link layer in the RC4 symmetric encryption, the user's encryption key to key with the same AP will be permitted to access network resources, thus preventing eavesdropping and unauthorized users access to unauthorized users. WEP provides 40-bit (sometimes called 64-bit) and 128-bit length key mechanism, but it still has many defects, such as a service area for all users share the same key, a user will lose the key the entire network insecure. And 40-bit key in today's very easy to crack; key is static, to manual maintenance, expansion and processing. Now to improve security, recommended 128-bit encryption key.

Wi-Fi Protected Access (W PA ) WPA (Wi-Fi ProtectedAccess) is inherited yet solved the basic principles of WEP WEP weaknesses of a new technology. A result of increased algorithm for generating the encryption key, so even if the group gathered information and its parsing, it is almost impossible to calculate General Key. The principle of the common key basis, with that Computer MAC address and packet sequence number of the number of information were generated for each packet of information in different keys. Then with the same WEP key for the RC4 encryption this. With this treatment, all clients of all packet data exchanged information by the encryption key is not made of the same. No matter how much such data collected, in order to break out of the original common key is almost impossible. WPA is also an additional way to prevent data tampering and authentication features. As with these features, WEP has been criticized in the previous shortcomings of all the solution. WPA is not only a more powerful encryption than WEP methods, but also more rich in substance. As a subset of 802.11i standard, WPA includes authentication, encryption and data integrity check of the three components, is a complete security plan.

National standards ( WAPI ) WAPI (WLAN Authenticationand PrivacyInfrastructure), the WLAN Authentication and Privacy Infrastructure, which is against the IEEE802.11 protocol in WEP security, wireless local area network in China, raised the national standard GB15629.11 WLAN security solutions . At the same time the program has been ISO / IEC authorized agencies IEEERegistrationAuthority review and recognition. Its main feature is the use of certificates based on public key cryptography system, truly a mobile terminal (MT) and the wireless access point (AP) between the two-way identification. Users only need to install a certificate can be in different areas covered by WLAN, roaming, user-friendly. Technology is compatible with the existing billing services, billing can be achieved on time, according to traffic accounting, billing and other monthly. AP set up the certificate, no longer on the back of the AAA Server Set, installation, network convenient, easy expansion to meet the families, businesses, Operation Business models and other applications.

Port Access Control (802.1x) The technology is also used for wireless local area network of an enhanced network security solutions. When the wireless station STA associated with the wireless access point AP, the AP's service can use 802.1x authentication depends on the results. If certified, the AP for the STA to open the logical port, or not allow users to access. Required to install 802.1x 802.1x wireless workstation client software embedded in wireless access point to 802.1x authentication proxy, and also as a Radius client, the user authentication information transmitted to the Radius server. In addition to 802.1x port access control, but also provides user-based authentication and billing system, particularly suitable for public wireless access solution.

Wireless LAN security measures 1, using port access technology (802.1x) to control and prevent illegal access and unauthorized access.

2, using 128-bit WEP encryption, does not use the manufacturer's own WEP key. <B

I am an expert from healthy-e-cigarette.com, while we provides the quality product, such as Health Cigarette Lady Pipe Manufacturer , E Cigarette Accessories Manufacturer, Pcc Electronic Cigarette,and more.

Related Articles - Health Cigarette Lady Pipe Manufacturer, E Cigarette Accessories Manufacturer,

Email this Article to a Friend!

Receive Articles like this one direct to your email box!
Subscribe for free today!

 Rate This Article  
Completely useless, should be removed from directory.
Minimal useful information.
Decent and informative.
Great article, very informative and helpful.
A 'Must Read'.

 

Do you Agree or Disagree? Have a Comment? POST IT!

 Reader Opinions 
Submit your comments and they will be posted here.
Make this comment or to the Author only:
Name:
Email:
*Your email will NOT be posted. This is for administrative purposes only.
Comments: *Your Comments WILL be posted to the AUTHOR ONLY if you select PRIVATE and to this PUBLIC PAGE if you select PUBLIC, so write accordingly.
 
Please enter the code in the image:



 Author Login 
LOGIN
Register for Author Account

 

Advertiser Login

 

ADVERTISE HERE NOW!
   Limited Time $60 Offer!
   90  Days-1.5 Million Views  

 

Great Paranormal Romance


TIM FAY

After 60-plus years of living, I am just trying to pass down some of the information that I have lea...more
GENE MYERS

Author of four books and two screenplays; frequent magazine contributor. I have four other books "in...more
LAURA JEEVES

At LeadGenerators, we specialise in content-led Online Marketing Strategies for our clients in the t...more
ALEX BELSEY

I am the editor of QUAY Magazine, a B2B publication based in the South West of the UK. I am also the...more
SUSAN FRIESEN

Located in the lower mainland of B.C., Susan Friesen is a visionary brand strategist, entrepreneur, ...more
STEVERT MCKENZIE

Stevert Mckenzie, Travel Enthusiast. ...more
STEPHEN BYE

Steve Bye is currently a fiction writer, who published his first novel, ‘Looking Forward Through the...more
SHALINI MITTAL

A postgraduate in Fashion Technology. Shalini is a writer at heart! Writing for her is an expression...more
ADRIAN JOELE

I have been involved in nutrition and weight management for over 12 years and I like to share my kn...more
JAMES KENNY

James is a Research Enthusiast that focuses on the understanding of how things work and can be impro...more

HomeLinksAbout UsContact UsTerms of UsePrivacy PolicyFAQResources
Copyright © 2024, All rights reserved.
Some pages may contain portions of text relating to certain topics obtained from wikipedia.org under the GNU FDL license