Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 1: A Brief Overview of Wi-Fi
Figure 1-1: A hybrid wireless and Ethernet network
Figure 1-2: A wired Ethernet LAN
Figure 1-3: Wi-Fi and Ethernet speed comparison
Figure 1-4: A WLAN with an access point and adapters
Figure 1-5: Ad hoc mode
Figure 1-6: Different access point modes of operation
Figure 1-7: Types of wireless adapters
Figure 1-8: A Bluetooth piconet
Figure 1-9: A Bluetooth scatternet
Chapter 2: Network Fundamentals and Security Concerns
Figure 2-1: Interconnected networks
Figure 2-2: The OSI reference model
Figure 2-3: The TCP/IP reference model
Figure 2-4: The WLAN Layers
Figure 2-5: Packet switching versus circuit switching
Figure 2-6: Encapsulation within headers
Figure 2-7: Subnets
Figure 2-8: Subnet mask
Figure 2-9: DHCP services
Figure 2-10: A fully qualified domain name including the host
Figure 2-11: Wireless bridging using WDS
Figure 2-12: Network address translation
Chapter 3: The People Behind the Problem
Figure 3-1: The defaced Library of Congress Web site
Figure 3-2: Trashing
Chapter 4: Hijacking Wi-Fi
Figure 4-1: Authenticating with an access point
Figure 4-2: Sniffing network traffic
Figure 4-3: Session hijacking
Figure 4-4: Spoofing a MAC address and exploiting a race condition
Figure 4-5: A VPN
Figure 4-6: A VPN doesn’t secure Web browsing
Figure 4-7: An HTTP proxy server
Figure 4-8: Man-in-the-middle attack
Figure 4-9: A rogue access point
Figure 4-10: A denial of service attack
Figure 4-11: DoS attack against an access point as part of a spoof attack
Figure 4-12: Strong signal jamming
Figure 4-13: FakeAP flood attack
Chapter 5: More Wireless Attacks
Figure 5-1: Protecting a network from Internet attacks with a firewall
Figure 5-2: The User Accounts control panel
Figure 5-3: The Run dialog box
Figure 5-4: The command window
Figure 5-5: Configuring the Norton Antivirus live update feature
Figure 5-6: You can use devices like the Chrysalis WiFi Seeker to sniff out WLANs.
Figure 5-7: Roaming for targets
Chapter 6: Wardriving
Figure 6-1: Wardriving
Figure 6-2: NetStumbler detecting wireless networks
Figure 6-3: Connecting to an access point via a Web browser
Figure 6-4: Hobo symbols
Figure 6-5: Warchalking symbols
Chapter 7: Viruses and Wi-Fi
Figure 7-1: Possible vectors for infecting a WLAN
Figure 7-2: Cross-contamination between WLANs
Figure 7-3: A PDA as a vector for infection
Figure 7-4: A computer virus infecting executable programs
Figure 7-5: The life cycle of a computer virus
Figure 7-6: A document with its extension hidden
Figure 7-7: A double extension can be hidden by a long file name with blank spaces
Figure 7-8: A Trojan program
Figure 7-9: Computer worm infection cycle
Figure 7-10: Worms spread via alternate methods
Figure 7-11: Bot software
Chapter 8: Technical Pitfalls and Solutions
Figure 8-1: Multipath signal propagation
Figure 8-2: Multipath waveforms combining
Figure 8-3: Example of a ghost image
Figure 8.4: Objects causing multipath propagation in the QWLAN environment
Figure 8-5: A diversity antenna system
Figure 8-6: Wi-Fi channels
Figure 8-7: The Windows version of the NMAP port scanner
Figure 8-8: Sources of Wi-Fi interference
Figure 8-9: Consider making a floor plan for network planning
Figure 8-10: Wavelength
Figure 8-11: Wave cycle and frequency
Figure 8-12: Proper mounting of an antenna
Figure 8-13: Multipath interference created by improper mounting
Figure 8-14: Grounding an antenna
Figure 8-15: Manually discharging static
Figure 8-16: The Fresnel zone
Figure 8-17: The Fresnel zone must remain free of obstructions.
Figure 8-18: Interference from trees
Chapter 9: Wireless Privacy Concerns
Figure 9-1: Triangulating a wireless customer’s position
Figure 9-2: Location-based ad delivery
Figure 9-3: The Internet Options dialog box
Figure 9-4: The Internet Options Privacy tab
Figure 9-5: The Per Site Privacy Actions dialog box
Figure 9-6: Automating your home with X10 devices
Figure 9-7: Setting an X10 device’s code
Figure 9-8: Intercepting an X10 video signal
Figure 9-9: Intercepting a Wi-Fi video signal
Chapter 10: Encryption and Wi-Fi
Figure 10-1: Internet Explorer displays a padlock icon in the lower menu bar to indicate a secure connection.
Figure 10-2: Encrypting and decrypting data with an encryption key
Figure 10-3: A simple substitution table
Figure 10-4: The Spartan scytale
Figure 10-5: Using a public key system to encrypt and decrypt a message
Figure 10-6: Key distribution with public key cryptography
Figure 10-7: One method of using a digital signature
Figure 10-8: A one-way-hash of a message
Figure 10-9: A digital certificate warning
Figure 10-10: WPA DoS attack
Figure 10-11: Using PGP to encrypt a message
Chapter 11: Securing Your WLAN
Figure 11-1: Discovering an SSID with NetStumbler
Figure 11-2: Changing the default SSID
Figure 11-3: Changing the default administrative username
Figure 11-4: Connecting to an access point via a Web browser
Figure 11-5: Changing network settings on an access point
Figure 11-6: Disabling DHCP
Figure 11-7: Using configuration software to assign a static IP address
Figure 11-8: The Wireless Network Connection Properties dialog box
Figure 11-9: The Internet Protocol (TCP/IP) Properties dialog box
Figure 11-10: MAC and IP address filtering
Figure 11-11: Spoofing a MAC address to get past MAC filtering
Figure 11-12: Implementing MAC filtering through a Web interface
Figure 11-13: The Run dialog box
Figure 11-14: The command window displaying IP and MAC addresses
Figure 11-15: Configuring IP address filtering
Figure 11-16: The command window displaying a wireless adapter’s IP address
Figure 11-17: An inline attenuator
Figure 11-18: Wi-Fi adapter utility in site-survey mode
Figure 11-19: A hybrid network composed of Ethernet and Wi-Fi segments
Figure 11-20: The Network Connections window
Figure 11-21: The Properties dialog box showing the Advanced tab
Figure 11-22: The Advanced Settings dialog box
Figure 11-23: A WLAN setup in a DMZ
Figure 11-24: The System Properties window
Chapter 12: Protecting Your Wi-Fi Data
Figure 12-1: Online backups
Figure 12-2: RAID controller
Figure 12-3: Nearline storage
Figure 12-4: Drive Image is a powerful backup solution for home and small-office users with a simple user-friendly interface.
Figure 12-5: Ghost’s simple interface will get you underway quickly.
Figure 12-6: A lightning arrestor helps prevent damage due to lightning-induced surges or static electricity.
Previous page
Table of content
Next page
Caution! Wireless Networking: Preventing a Data Disaster
ISBN: 076457213X
EAN: 2147483647
Year: 2003
Pages: 145
Authors:
Jack McCullough
BUY ON AMAZON
The Java Tutorial: A Short Course on the Basics, 4th Edition
Expressions, Statements, and Blocks
Code Samples
Code Samples
Appendix A. Common Problems and Their Solutions
Getting Started Problems
Lotus Notes Developers Toolbox: Tips for Rapid and Successful Deployment
Hide Text and Design Elements Based on a Users Role
Using Static Popups to Display Help Messages
Hiding a Database Design
Application Deployment and Maintenance
Common Database Problems
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Unauthorized Activity II
Tcpdump
Internet Security Systems RealSecure
Policy and Procedures
The Future of Intrusion Detection and Prevention
Sap Bw: a Step By Step Guide for Bw 2.0
Summary
Checking InfoCube Contents
Organizing Workbooks Using BEx Browser
Integrating Profile Generator and BEx Browser
Appendix B. SAP Basis Overview
Comparing, Designing, and Deploying VPNs
Summary
The Inter-Autonomous System/Interprovider MPLS VPN Architecture
Review Questions
Review Questions
GDI+ Programming with C#
Color Mapping Using Color Objects
Miscellaneous Advanced 2D Topics
Transformation Types
Printing Graphics
Marginal Printing: A Caution
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies