walkie-talkies, interference and, 134
walls, interference and, 127
warchalking
definition, 254
GPS and, 98
hobo symbols, 97
wardriving
beacon frames, 91
default settings, protection and, 92–94
defense software, 99
definition, 254
DHCP and, 94–95
encryption and, 95–96
equipment needed, 91
filtering and, 95
GPS and, 98
IP addresses and, 94
legal issues, 90, 96–97
MAC addresses and, 95
network hiding, 91–92
passwords and, 93
SSID broadcast and, 91, 188–190
usernames and, 93
viruses and, 102
wardialers and, 89
Web sites, 100
WUGs and, 89
WWWD (Worldwide Wardrive), 54
warspying, 98–99
wave cycle, electromagnetic waves, 139
wavelengths, electromagnetic waves, 139
WDS (Wireless Distribution System)
bridging and, 41
definition, 255
Web sites
accessory manufacturers, 240–241
antivirus resources, 238–239
PC manufacturers, 240–241
PDA manufacturers, 240–241
privacy resources, 238–239
security resources, 238–239
software, 241–242
wardriving, 100
wireless users, 237–238
WEP (Wired Equivalent Privacy)
802.11i and, 17
definition, 255
encryption and, 96, 181
encryption key and, 181
failures, 179–180
firmware and, 181
IV (initialization vector), 180
passwords and, 181
pseudo-random key, 180
reasons to use, 180–181
rogue access points and, 70
security and, 205–206
video camera encryption, 163
wetware, crackers and, 55
white hats, security and, 46
Wi-Fi
definition, 254
equipment costs, 7
installation, 8
mobility and, 8
speed, 6
Wi-Fi Alliance
definition, 255
introduction, 3
overview, 20–21
Wi-Fi layers
Media access control, 31
Network infrastructure, 31
Physical control, 31
WiMAX standard, 246
WiMedia standard, 248
Windows Update, 212–213
Windows XP Home Edition
clients, static IP address assignment, 195–197
firewall setup, 208–210
Guest account password assignment, 82
ICF (Internet Connection Firewall), 208–210
ICS (Internet Connection Sharing), 214
lockdown, 208–213
NTFS, security and, 214
passwords and, 214
physical security, 214
Simple File Sharing, 81
wireless adapters
clients and, 9
definition, 255
wireless bridges, 255
wireless cameras, interference and, 134
wireless networking
Ethernet network comparison, 5–8
hybrid network diagram, 5
overview, 4–5
wireless NICs, clients and, 9
wireless repeaters, 255
wireless sniffers, 255
wireless speakers, interference and, 134
Wireless-G, 802.11a and, 18
WLAN (Wireless Local Area Networking)
accidental connections and, 129
ad hoc mode, 10
attacks, 77
definition, 4, 255
infrastructure mode, 10
multipath interference and, 127
session hijacking, 59
signal strength, FCC regulation, 135
SSID settings, 188–190
urban locations, 188
vulnerabilities, 187–188
worm protection, 115–116
WMAN (Wireless Metropolitan Area Networks), 255
workstations, 4, 27
World Wide Web, 256
worms
bots and, 116
CodeRed, 115
infection cycle, 112
introduction, 101
Morris Internet Worm, 111
Nimda worm blended threat, 115
protection, 114
spread methods, 113
virus comparison, 111
WLAN security, 115–116
WPA (Wi-Fi Protected Access), 15
definition, 255
denial of service, 72–73
DoS attacks, 182–183
encryption and, 96, 182
firmware upgrades, 206
rogue access points and, 70
weaknesses in, 206
WEP and, 182
WPAN (wireless personal area network)
Bluetooth and, 18
definition, 255
WPS (Wi-Fi positioning system), 150
WSP (Wireless Service Provider), 255
WUGs (Wireless User Groups), 89, 256
WWWD (Worldwide Wardrive), 54