Showing posts with label wireless configuration. Show all posts
Showing posts with label wireless configuration. Show all posts

Monday, November 24, 2014

Millimetre-wave WiFi devices.


Samsung preps 4.6Gbps millimetre-wave WiFi devices.




Known as WiGig, the 802.11ad standard transmits in the unlicensed 60GHz frequency band for high performance up to 4.6 gigabits per second in Samsung's designs, while remaining backwards compatible with the previous 2.4GHz and 5GHz Wi-Fi standards.

Compared to today's 802.11ac which provides a maximum throughput of 867 megabits per second per stream under ideal conditions, 802.11ad devices can reach speeds as fast as 7 gigabit/s.

The high frequency used for WiGig results in path loss and poor wall and floor penetration of the signal, leading to shorter reach than existing Wi-Fi.

Samsung said it has solved these issues with millimetre-wave circuit design, improved transmission technology and a wide-coverage beam-shaping aerials. This, the company said, would make WiGig commercially viable in retail devices.



Read more: http://www.itnews.com.au/News/396733,wigig-coming-to-samsung-devices.aspx#ixzz3G6aWIlAc




Get eBook


Tuesday, December 10, 2013

Keep your Networks and Data Safe.


Home Wireless Devices: 


Most wireless access points are ready-to-go right out of the box, but from a security perspective, they are wide open and insecure. This means that anyone driving (or walking) by your house or living in close proximity to your house can instantly connect to your wireless access point. Without proper security configurations enabled, your neighbors can even connect to the Internet through your network at no cost to them and could possibly access files on your home systems which reside on your PC or network.


We urge you to follow and apply the guidelines below where possible.


Protect Your Personal Information:


•Remember that everyone can view data in the airspace. Protect it appropriately by encrypting the data by using Wi-Fi Protected Access (WPA and preferably WPA2).
•Install personal firewalls and Anti-Malware software on all devices and have the most up-to-date signature files installed. You should also have the latest security patches (such as Microsoft Windows updates and Adobe Reader updates) installed on your system.
•Change the administration password on the Access Point to something other than the default one assigned by the manufacturer.
•The Service Set ID (SSID) is the name of your wireless network. For example, a Linksys router most commonly has a default SSID of "linksys." You should change your SSID from the manufacturer default, but not to something that is easily guessable.  Avoid using mailing addresses, street names, or your last name.  This can give away too much information about your physical location or identity. Suggestions might include: "homenet8273" or "h563."

Keep a Clean Machine:

•Make sure you’re using the latest firmware update for your specific Access Point / Wireless Router. Not only will you benefit from hardware bug fixes, you may also gain improved security features as well. Firmware updates are usually freely available from the manufacturer’s website and include instructions on how to perform the upgrade.
•Using Internet Security all-in-one tools are also recommended as they usually have Host Intrusion Prevention tools which are not dependent on signature files and are more behavior based.

Connect with Care:

•For the more technically savvy, you can filter, by Media Access Control (MAC) address, what devices/computers can connect and obtain an IP address from your wireless Access Point. There is a table where you can enter the MAC address from each device/computer on your network that you want to allow to communicate.
•Disable "remote administration" for the Access Point (usually the default setting). This is different from local administration, which is always enabled. Remote administration can potentially allow untrusted users on the Internet to connect to your wireless access point and administer it.



LearnSecurityOnline.com is a highly interactive online security training experience. We do this by utilizing simulators, security games, challenge servers, and hacking competitions to give you both the technical knowledge and hands-on experience required to be a competent IT & IT Security Professional all in a safe and legal environment.