Index_W


W

walkie-talkies, interference and, 134

walls, interference and, 127

warchalking

definition, 254

GPS and, 98

hobo symbols, 97

wardriving

beacon frames, 91

default settings, protection and, 92–94

defense software, 99

definition, 254

DHCP and, 94–95

encryption and, 95–96

equipment needed, 91

filtering and, 95

GPS and, 98

IP addresses and, 94

legal issues, 90, 96–97

MAC addresses and, 95

network hiding, 91–92

passwords and, 93

SSID broadcast and, 91, 188–190

usernames and, 93

viruses and, 102

wardialers and, 89

Web sites, 100

WUGs and, 89

WWWD (Worldwide Wardrive), 54

warspying, 98–99

wave cycle, electromagnetic waves, 139

wavelengths, electromagnetic waves, 139

WDS (Wireless Distribution System)

bridging and, 41

definition, 255

Web sites

accessory manufacturers, 240–241

antivirus resources, 238–239

PC manufacturers, 240–241

PDA manufacturers, 240–241

privacy resources, 238–239

security resources, 238–239

software, 241–242

wardriving, 100

wireless users, 237–238

WEP (Wired Equivalent Privacy)

802.11i and, 17

definition, 255

encryption and, 96, 181

encryption key and, 181

failures, 179–180

firmware and, 181

IV (initialization vector), 180

passwords and, 181

pseudo-random key, 180

reasons to use, 180–181

rogue access points and, 70

security and, 205–206

video camera encryption, 163

wetware, crackers and, 55

white hats, security and, 46

Wi-Fi

definition, 254

equipment costs, 7

installation, 8

mobility and, 8

speed, 6

Wi-Fi Alliance

definition, 255

introduction, 3

overview, 20–21

Wi-Fi layers

Media access control, 31

Network infrastructure, 31

Physical control, 31

WiMAX standard, 246

WiMedia standard, 248

Windows Update, 212–213

Windows XP Home Edition

clients, static IP address assignment, 195–197

firewall setup, 208–210

Guest account password assignment, 82

ICF (Internet Connection Firewall), 208–210

ICS (Internet Connection Sharing), 214

lockdown, 208–213

NTFS, security and, 214

passwords and, 214

physical security, 214

Simple File Sharing, 81

wireless adapters

clients and, 9

definition, 255

wireless bridges, 255

wireless cameras, interference and, 134

wireless networking

Ethernet network comparison, 5–8

hybrid network diagram, 5

overview, 4–5

wireless NICs, clients and, 9

wireless repeaters, 255

wireless sniffers, 255

wireless speakers, interference and, 134

Wireless-G, 802.11a and, 18

WLAN (Wireless Local Area Networking)

accidental connections and, 129

ad hoc mode, 10

attacks, 77

definition, 4, 255

infrastructure mode, 10

multipath interference and, 127

session hijacking, 59

signal strength, FCC regulation, 135

SSID settings, 188–190

urban locations, 188

vulnerabilities, 187–188

worm protection, 115–116

WMAN (Wireless Metropolitan Area Networks), 255

workstations, 4, 27

World Wide Web, 256

worms

bots and, 116

CodeRed, 115

infection cycle, 112

introduction, 101

Morris Internet Worm, 111

Nimda worm blended threat, 115

protection, 114

spread methods, 113

virus comparison, 111

WLAN security, 115–116

WPA (Wi-Fi Protected Access), 15

definition, 255

denial of service, 72–73

DoS attacks, 182–183

encryption and, 96, 182

firmware upgrades, 206

rogue access points and, 70

weaknesses in, 206

WEP and, 182

WPAN (wireless personal area network)

Bluetooth and, 18

definition, 255

WPS (Wi-Fi positioning system), 150

WSP (Wireless Service Provider), 255

WUGs (Wireless User Groups), 89, 256

WWWD (Worldwide Wardrive), 54




Caution. Wireless Networking. Preventing a Data Disaster
Caution! Wireless Networking: Preventing a Data Disaster
ISBN: 076457213X
EAN: 2147483647
Year: 2003
Pages: 145

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net