Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] W3C (World Wide Web Consortium) 2nd Wake on LAN (WOL) WANs (wide area networks) 2nd back doors forged email LAN comparing connections passwords PHY preventing attacks protocols routers security host computers network sniffers preventive measures spoofing training Tripwire updating virus-checking applications Trojan horses types of attacks viruses WAP wardriving WatchGuard SOHO Web archives browsers pages, saving Web sites ACPI Bluetooth Web-based printers folder WECA (Wireless Ethernet Compatibility Alliance) 2nd WEP (Wired Equivalent Privacy) 2nd WEPCrack WfM (Wired for Management) 2nd Wi-Fi [See 802.11b networks, decline of.] wide area networks [See WANs (wide area networks), LAN, comparing .] Wildpackets WILL command Windows 2000 Administration Tools auditing policies DHCP servers directories Event Viewer groups migrating from Novell Netware [See NetWare, decline Windows 2000 migration.] MMC [See MMC (Microsoft Management Console), DHCP.] name resolution printers, adding Professional Professional Client servers support Telnet user groups user-level permissions WINS 2000 Server ActiveState ActivePerl 5.6 DFS DNS Korn Shell command NetWare passwords Telnet Unix [See Unix, DNS servers.] upgrading user name mapping Windows 2003 Server upgrade 2003 Active Directory ActiveState ActivePerl 5.6 auditing policies BOOTP DFS DNS Event Viewer groups installing Korn Shell command NetWare operating systems passwords servers Telnet 2nd Unix [See Unix, NIS.] upgrading to user name mapping WINS 95 98 Components Wizard 2nd firewalls FTP command-line clients integrated Windows authentication Internet Naming Service [See WINS (Windows Internet Naming Service), NetBIOS.] ipconfig command Mobile devices netstat command NFS NT [See NT (Windows), domains, controllers .] NT 4.0 configuring Event Viewer migrating from Novell Netware printers permissions ping command print servers adding printers printers/printing devices Server 2003 DHCP DOS-mode, booting in Itanium servers upgrading to Windows 2000 SFU SOHO Vista XP 64-bit support DOS-mode, booting in network connection repair Windows 2000 and XP Professional auditing printing VPN connections Windows 2003 Server windows backup congestion offered sizes sliding WinDump command winipcfg command WINS (Windows Internet Naming Service) 2nd configuring NetBIOS Windows 2000 2003 Server wire-mapping Wired Equivalent Privacy (WEP) 2nd Wired for Management (WfM) 2nd Wired Protected Access [See WPA (Wired Protected Access), Personal certification.] wireless devices 2.4GHz devices PDAs Ethernets IEEE 802.11 routers APs, comparing features of integrated Ethernet switches topologies Wireless Equivalent Privacy (WEP) 2nd Wireless Ethernet Compatibility Alliance (WECA) 2nd wireless networks 802.11-based [See 802.11-based networks.] ad-hoc networks 2nd adapters, installing advantages 2nd AMA APs definition IEEE 2nd interference LANs, connecting to manual client configuration needs, determining PANs public places/spaces 2nd radio wave transmission security features/standards crossreference knowing your users neighbors overview 2nd SSIDs WEP wired networks, comparing WPA [See also WPA (Wired Protected Access), WPA2.] WPA2 2nd Service Pack 2 wireless network setup wizard setup wizard SOHO [See SOHO (small offices and home offices), routers.] spread-spectrum technologies 2nd topologies of Wireless-B [See also 802.11b networks, decline of.] Wireless-G broadband router installation LAN connections PCs, configuring 2nd properties sheet tabs saving configurations wireless access ports, configuring wiring drawings records reports structured backbone cabling system horizontal cabling system work area specification terminologies ACR attenuation 2nd bandwidth 2nd characteristic impedance cross-talk dialectic electromagnetic field EMI FEXT 2nd frequency 2nd full-duplex communication half-duplex communication impedance leakage minimal velocity of propagation NEXT 2nd Power SUM radio frequencies shields TDR 2nd twisted-pair 2nd work orders wizards Add Printer 2nd Administration Tools Setup Installation Windows Components 2nd WMM certification WOL (Wake on LAN) WON'T command word processors WordPerfect Office X3 work area specifications work patterns, assessing workgroups (Windows NT) domains controllers models replication between domain controllers trust relationships workstations backbones backups BOOTP client/server exchanges (DHCP) DHCP downloading operating systems options fields packet formats request/reply mechanisms Gigabit Ethernets limiting NIC World Wide Web Consortium (W3C) 2nd WPA (Wired Protected Access) Enterprise certification overview Personal Personal certification Pre-Shared Key with TKIP RADIUS vulnerabilities, overcoming WEP WPA2 2nd WPA2 Enterprise certification Personal Personal certification WRITE command |