Real 802.11 Security

Scott writes “After the initial thrill of setting up your own wireless network is gone, you try looking into the ways of making it more secure. Common sense tells you that following the manuals on securing the network widely available on the Internet should help, but what if your responsibilities include managing an array of enterprise-level WLANs? Moreover, what if you want to understand the internals and perhaps code your own tools in the future instead of following the “point and click†or “enter this command†paradigm? story



  • Security