Monday, November 02, 2009

What is Wi-Fi Protected Access?

Wi-Fi Protected Access (WPA) is a security standard for users of computers equipped with Wi-Fi wireless connection. It is an improvement on and is expected to replace the original Wi-Fi security standard, Wired Equivalent Privacy (WEP). WPA provides more sophisticated data encryption than WEP and also provides user authentication (WEP's user authentication is considered insufficient). WEP is still considered useful for the casual home user, but insufficient for the corporate environment where the large flow of messages can enable eavesdroppers to discover encryption keys more quickly.

WPA's encryption method is the Temporal Key Integrity Protocol (TKIP). TKIP adddresses the weaknesses of WEP by including a per-packet mixing function, a message integrity check, an extended initialization vector, and a re-keying mechanism. WPA provides "strong" user authentication based on 802.1X and the Extensible Authentication Protocol (EAP). WPA depends on a central authentication server such as RADIUS to authenticate each user.

Wi-Fi Protected Access is a subset of and will be compatible with IEEE 802.11i (sometimes referred to as WPA2), a security standard under development. Software updates that will allow both server and client computers to implement WPA are expected to become widely available during 2003. Access points (see hot spots) can operate in mixed WEP/WPA mode to support both WEP and WPA clients. However, mixed mode effectively provides only WEP-level security for all users. Home users of access points that use only WPA can operate in a special home-mode in which the user need only enter a password to be connected to the access point. The password will trigger authentication and TKIP encryption.

Learn more about Mobile Basics
CDMA2000: A 3G mobile technology: CDMA2000 is a 3G mobile technology that includes 1xRTT, EV-DO Rev 0, EV-DO Rev A and EV-DO Rev B, and it competes with GSM technologies.
CDMA technology: An understanding of CDMA technology is critical for mobile managers when they are trying to select the best cellular solution for their enterprise mobile strategy.
An introduction to Android for mobile application development: Introducing Android, Chapter 1, from 'Android Wireless Application Development,' explores the benefits this open source platform brings to mobile application development.
Nokia versus Apple: Rumors are hot and heavy that Nokia will soon launch a competitor to iTunes. This raises some very interesting questions that are addressed in this analyst report.
The IT Guy: Mobility -- It's a beach: In this episode of "The IT Guy," a mobile worker finds that his devices (wireless laptop, glare-free screen and PDA) don't guarantee a seamless outdoor work experience.

1 comment:

Anonymous said...

I was scrolling through a binary option group ,then i saw a post by Robert Seaman about Forex and binary trading and how i could earn much more than i can imagine, i got in touch with him and he made every step clear to me and how his strategy would work magic. and it really did!! i got $16k my first week after i invested just $750 if you are having difficulties in trading, she can also manage your broker account,which you will also have your ACCESS LOGIN so as to enable you to check your trade records and balance daily  contact Sir Robert through Email: Robertseaman939@gmail.com

Explaining DNS Concepts - DNS Servers-DNS Queries-DNS Records

3 types of DNS queries— recursive, iterative, and non-recursive 3 types of DNS servers— DNS Resolver, DNS Root Server and Authoritative Name...