Implementing and supporting 802.1X authentication on your network can be a challenge, but here are some tools that can help.
Stories by Eric Geier
Implementing and supporting 802.1X authentication on your network can be a challenge, but here are some tips that can help save you some time, money, and frustration.
Install one of these five apps on your Android phone or tablet, and you can manage your cloud infrastructure from anyplace where you can access the Internet.
Attempting to "hack" into your own wireless network can help you spot potential Wi-Fi security vulnerabilities and figure out ways to protect against them.
Wi-Fi stumblers are handy when checking for channel usage, signal strength, security status, and detecting rogue access points, in situations where enterprise-level tools aren't necessary. We recently reviewed stumblers for your PC or laptop. Here's a look at a few Wi-Fi stumblers for your Android smartphone or tablet, which makes it even more convenient for quick and simple wireless checks.
There's been much controversy over mobile OS security, especially where Android is concerned. With 47 per cent of the smartphone market in Q4 of 2011, according to ABI Research, it's no wonder that Android is getting attention.
Buying a router for a business isn't as simple as picking a consumer product with the best ratings from an online merchant or the best price on the shelf at a local electronics superstore. Your company has serious needs, such as supporting scores of users (including guests) on the network, and locking down company data to guard against snoops.
Even if you have an enterprise-level Wi-Fi spectrum analyzer, free Wi-Fi tools can also come in handy
Even if you have an enterprise-level Wi-Fi spectrum analyzer, like <a href="http://www.metageek.net/products/wi-spy/">Wi-Spy</a> or <a href="http://www.flukenetworks.com/enterprise-network/wlan-security-and-analysis">AirMagnet</a>, free Wi-Fi tools can also come in handy. You might use them during the planning or installation stages of your <a href="http://www.networkworld.com/topics/wireless.html">wireless</a> LAN, while troubleshooting, or when performing maintenance. They could even serve as your primarily tools in smaller and less-complex environments.
Wi-Fi is inherently susceptible to hacking and eavesdropping, but it can be secure if you use the right <a href="http://www.networkworld.com/topics/security.html">security</a> measures. Unfortunately, the Web is full of outdated advice and myths. But here are some do's and don'ts of Wi-Fi security, addressing some of these myths.