Network Security Now org

              Wireless Network Security 101

Download the Wireless Security Power Point Presentation
created for Cirrus Engineering's presentation to the MWEA


US Government Information Security Publications
Homeland Security
NIST Computer Security Special Publications

IT Security Industry Experts
The six dumbest ways to secure a wireless LAN  George Ou
Wireless LAN security guide - By George Ou
Understanding the updated WPA and WPA2 standards  George Ou
NZWireless - Securing the WLAN Are the Alphabet Standards Finally Soup
Schneier on Security Wireless Interception Distance Records
Bruce Schneier
Kevin Mitnick
Mark Russinovich SysInternals
O'Reily ONLamp Security DevCenter

broadband ¯ Forums ¯ Wireless Security ¯ WPA TKIP or AES
Even AES Will Not Last Forever - But It Is Quite Good Enough For Now

WPA2 - WiFi Protected Access version 2
Wi-Finally Security that works - IEEE 802.11i and wireless security
WiFi Industry Alliance - Certified Products Listing
WiFi Industry Alliance - WPA and WPA2 Implementation White Paper
WPA versus 802.11i (WPA2) How your Choice Affects your Wireless NetworkSecurity
broadband ¯ Forums ¯ Wireless Security ¯ Are AES and WPA2 compatible

MS Windows Operating System Updates for WPA2 & WPA
The Wi-Fi Protected Access 2 (WPA2)- update for Windows XP with Sp2
Overview of the WPA wireless security update in Windows XP

VPN - Virtual Private Networking & Secure Remote Desktop
iPIG  iOpus Private Internet Gateway
JiWire SpotLock Wi-Fi security on any hotspot network
Check Point Software Safe@Office
LogMeIn & LogMeIn Free
Secure Random Password & Pass Phrase Generation Utilities
Whether you use WPA2 or only have WPA always be sure to use a long passphrase
Gibson Research Corporation
Security Guide for Windows - Random Password Generator
WinGuides Secure Password Generator

Distance Enhancement Techniques
How to build a tin can waveguide antenna
14Km 802.11B link test
Use a Surplus Primestar Dish as an IEEE 802.11 Wireless Networking Antenna
Schneier on Security Wireless Interception Distance Records
Wi-Fi Toys
3rd Annual Defcon Wifi Shootout Contest
Authentication Issues
Understanding the updated WPA and WPA2 standards  George Ou
Using RADIUS For WLAN Authentication, Part III
Radio & Path Utilities
Radio Link Planning and Power Budget
Radio theory and link planning for Wireless LAN (WLAN)
Low Cost Wireless Network How-To - Perl Scripts - Interactive Design - Software
Wardriving, Penetration Testing and Cracking Tools - Cracking Wi-Fi Protected Access (WPA), Part 2
Airmagnet WLAN_Hacker_White_Paper
Wardriving Tools, Wardriving Software, Wardriving Utilities
Wireless LAN Security & Wardriving - 802.11 Security
Point Blank Security - Wardriving tools and wireless utilities
. A E R O S O L .

WiMAX - Is Due In Early 2007 -
So for now if you need more than WiFi and less than EVDO
D-Link Wireless Draft-N Router
Belkin Wireless Pre-N Router
Pre-N Wireless Hardware Roundup
Linksys Wireless-G / SRX Broadband Router

Comprehensive Wireless Issues - In Depth Reading
Wireless LAN Security Site
FierceWiFi Table of Contents.pdf

Miscellaneous Wireless Links
802.11 wireless networking Featured Topics
Introduction to Wireless Networking Part 3 - Security, General Tips and Tricks
Wireless security 802.11i promises much, but doesn't deliver all of it -- yet
TomsNetworking #235
TomsNetworking Product Reviews
U.S. Robotics USR5411 802.11G MAX PC CARD 125MBPS
WPA2 802.11 i review dlink linksys US Robotics - Google Search
World of Windows Networking
Crossbow Technology - Wireless Sensor Networks, Inertial & Gyro Systems, Smart Dust, AdvancedSensors
broadband ¯ Forums ¯ Belkin ¯ FIOS On The Way - Belkin F5D7230-4
broadband ¯ Forums ¯ Belkin ¯ Success with WRT54GX Firmware on Belkin Pre-N!
broadband ¯ Forums ¯ Wireless Security ¯ Using two routers for security without double NAT
Test double-nat
Most of the links above reflect the current state of Wireless Security today. However, please be aware that achieving useful Wireless Security is an exercise in tracking a constantly moving target. Having assimilated a good part of the above information please do not go to sleep. Hacker and cracker threats are presently evolving from the casual actions of script kiddies into threat scenarios entailing serious potential harm and financial loss. I am not one to promote fear, uncertainty and doubt, but it is very important to always be paying attention.
...And now for a helpful word from our most excellent sponsors

NOD32 Antivirus  STOPS Viruses, Worms, Trojans, SpyWare, AdWare, Phishing and other Malware

CLICK HERE for your FREE 30-day evaluation license - then click on "Download" at the bottom of the page.

My Personal Recommendation - I have previously used Norton Anti Virus by Symantec for over 20 years and now instead recommend NOD32 to all of my customers. It delivers the world's best proactive protection, the highest number of 100% Virus Bulletin tests passed for the last seven years and the best performance and compatibility that I have seen for quite some time. Disclosure: If you click and buy I make a few per cent on the sale. I have chosen to offer NOD32 for sale here because I use it myself and having done the research believe that it offers the best protection.

        Thanks for visiting! Please remember to bookmark our site and come back soon.

Net Sec Now .org   Net Sec Now .net  
 Free IT Security Info                You @Your