The practice of tagging pavement near an open Wi-Fi network to alert others that wireless access is available at that location.
The practice of probing wireless networks and cataloging them for possible future use by a third party.
A program used to retrieve and display magazine-like information pages from the World Wide Web.
Computers that contain websites and make them available to computers on a network such as the Internet.
Programs that scan the Web seeking emails for inclusion in lists that are sold to purveyors of spam.
Wired Equivalent Privacy. One of the most common security features on wireless routers. WEP is a way of scrambling information as it flies through the air between a computer and a router.
A computer hacker with altruistic motives who breaks into computers to test their security and reveal vulnerabilities to the computer's owner.
Wireless Fidelity. A wireless technology that enables a computer to connect to a network using radio waves.
People who connect to a wireless network and steal banking access information, identity, or other valuable data on a personal or corporate network.
A number of computers and other devices with wireless capabilities that are connected together so they can share files, access to the Internet, and printers.
A self-contained computer virus that can sometimes spread across a network without human intervention.
Wi-Fi Protected Access. A wireless network security measure that is much more secure than WEP, yet is simpler to use.