<<< Date Index >>>     <<< Thread Index >>>

[IP] Cracking the wireless security code





Begin forwarded message:

From: Dewayne Hendricks <dewayne@xxxxxxxxxxxxx>
Date: October 26, 2004 5:51:14 AM EDT
To: Dewayne-Net Technology List <dewayne-net@xxxxxxxxxxxxx>
Subject: [Dewayne-Net] Cracking the wireless security code
Reply-To: dewayne@xxxxxxxxxxxxx



[Note:  This item comes from reader Monty Solomon.  DLH]

From: Monty Solomon <monty@xxxxxxxxxx>
Date: October 25, 2004 10:08:56 PM PDT
Subject: Cracking the wireless security code

Cracking the wireless security code

By Joel Snyder and Rodney Thayer
Network World, 10/04/04

Is it possible to deploy a secure wireless LAN with technology
available today? That question preys on the minds of IT executives
who are tempted to deploy enterprise WLANs, but are hesitant because
of security concerns.

So we assembled 23 wireless products from 17 vendors and ran them
through a battery of tests aimed at getting the answer.

Wired Equivalent Privacy (WEP) is very weak in many products, and we
don't recommend using it other than in very specialized cases. WEP's
successor, Wi-Fi Protected Access (WPA) has flaws but provides solid
security when combined with 802.1X authentication and deployed
carefully. Ultimately, 802.11i, the standard that replaces WEP and
WPA, will provide all the tools needed to protect WLANs.

To their credit, vendors are aggressively shipping products at all
prices that support enterprise-class security features. Two-thirds of
the products tested support 802.1X, and vendors are moving rapidly to
comply with 802.11i standards.

....

http://www.nwfusion.com/reviews/2004/1004wirelessmain.html




Archives at: <http://Wireless.Com/Dewayne-Net>
Weblog at: <http://weblog.warpspeed.com>

-------------------------------------
You are subscribed as roessler@xxxxxxxxxxxxxxxxxx
To manage your subscription, go to
 http://v2.listbox.com/member/?listname=ip

Archives at: http://www.interesting-people.org/archives/interesting-people/