YURTSEVEN.ORG is completely for sale, including entire Databases and Domainname.    Price: USD 49.900,-    Phone: +49(176)74919078
     
     
Yurtseven.ORG
 Yurtseven.ORG
     
HOME Data Communications Data Communications Wireless Wireless Security Security
 
Sort by Sort by          Date Sort by       Alphabetical Sort by

Showing  1 - 10  of total  12  results  [ 0.094  seconds ]  


 
   
  07-January-2012 
Offers security alerts and articles based on specific wireless LAN hardware and mirrored multi-platform software helpful for wireless security.



 
   
  07-January-2012 
Article covering basic 802.11b security, WEP, MAC address filtering, broadcast key rotation and EAP based standards.



 
   
  07-January-2012 
Tool for penetration testing Cisco LEAP wireless access points, can recover weak passwords by passively monitoring wireless traffic. Includes documentation and downloads.



 
   
  07-January-2012 
Article raising awareness about the risk of unprotected wireless networks, and how a worldwide test yielded shocking results about the amount homes left unprotected to network attacks.



 
   
  07-January-2012 
A software application designed to provide a clear interface to wireless security options enabled in surrounding wireless networks. Intended for use in laptops.



 
 6 - New Scientist Browse Website open in new window
   
  07-January-2012 
Article by Will Knight, discussing a new authentication approach that can combat the risks associated with connecting to a rogue access point.



 
   
  07-January-2012 
Tips for home users to secure their wireless LAN, with detailed instructions on how to execute each step of the process.



 
 8 - Securityfocus Browse Website open in new window
   
  07-January-2012 
A three part article on wireless penetration testing discussing the different types of attacks that can be used, how to protect against them, and walks through a typical attack on a network.



 
 9 - Securityfocus Browse Website open in new window
   
  07-January-2012 
A two part article on developing a security policy for wireless networks expressing key policy components in great detail.



 
   
  07-January-2012 
Collection of papers and links covering the major wireless standards and their associated vulnerabilities.


1  2  Next »


Easy Web Admin


Add URL  |  My Sites  |  My Account  |  Login  |  Contact Us