[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] FCC Electronic Communications Privacy Act (ECPA) radio spectrum frequencies 2nd FHSS standard (Frequency Hopping Spread Spectrum) 2nd HomeRF protocol 2nd files infector viruses filtering MAC addresses 2nd 3rd 4th 5th filters Ethereal setting 2nd 3rd finger utility (NetForce) finger utility (vxUtil) firewalls DMZ (demilitarized zone) 2nd 3rd 4th WLANs implementing 2nd Follow TCP stream option Ethereal setting 2nd forms Web-based malicious hacker exploits 2nd forwarding data (VPNs) fragmentation IDS hacker attacks frequency jamming radio spectrum (FCC) 2nd 3rd 4th 5th Funk Steel-Belted Server software (RADIUS) 2nd 3rd accounting methods authentication methods 2nd 3rd hardware administration features 2nd rogue access point regulation system requirements 2nd typical server configuraiton user administration features 2nd Funk.com Web site 2nd |