1 Out of Thin Air! An introduction to wireless security at home, on the road and on campus Sherry Callahan and Kyle Crane University of Kansas Medical Center October 5, 2009
2 Wireless Networking at Home Sherry Callahan, Information Security Officer
3 What is Wireless Networking? Wireless or Wi-Fi technology is another way of connecting your computer to a network without using wires. Wireless networks utilize radio waves and/or microwaves to maintain communication channels between computers. This gives people the freedom to connect computers anywhere in your home or office network. Wireless networking works similarly il l to how cordless phones work, through h radio signals to transmit data from one point A to point B. A basic wireless design typically consists of a wireless router that provides access to the Internet and/or network and a system that connects via a wireless adapter.
4 Typical home wireless network Home wireless networks typically consist of at least one Wireless Access Point/Router and one or more computers that connect to the wireless router. The Access Point/Router is the device that systems connect to for access to the internet or to another computer sharing the signal.
5 Wireless Hardware Here we see a typical wireless router with 4 available ports to plug computers directly into, the wireless antenna and one WAN port. Computers need an adapter that is compatible with the router in order to connect. Most newer laptops and PDAs already contain a wireless adapter. There are many different kinds of adapters. PCMIA, PCI, USB, and Firewire are a few shown below. Wireless Router with 4 port switch Wireless Network Adapters
6 A, B..G? Current Wireless Standards A Supports bandwidth up to 54 Mbps. It has a very limited range and has more difficulty penetrating walls and other obstructions. These devices should considered outdated and is not typically found in common retail stores B Supports bandwidth up to 11 Mbps. It has a much better range than a and is not as easily obstructed by walls or other objects. Devices that use this protocol can suffer from more interference from other electronic devices such as microwaves. These devices are quickly becoming scarce at retail stores as they are replaced by the newer G devices G Supports up to 54 Mbps and has a range that will cover most average homes. These devices are still typically common in retail stores but are quickly being replaced by the newer technologies such as N N One of the newest types of wireless devices found in retail stores. Supports up to 600 Mbps and can cover an extremely large home or small business.
7 Before you head for the store Prior to purchasing a wireless network there a few things that you can look for to ensure that the equipment will provide an adequate amount of security. Gather as much information about your wireless hardware s security as possible. Advanced firewall protection, strong encryption protocols, web filtering, and MAC filtering are just a few items you should look for in a wireless router. Ensure you have access to phone, , or knowledgebase support from the manufacturer. Check the documentation that comes with the router/network adapter. Verify that configuration and securing of the router is simple and easily understood.
8 That was easy! Wireless networks have become extremely easy to setup these days. Many people find that they can simply plug the hardware in and in just a few minutes they can be surfing the web or transferring files to other computers with no wires attached. But perhaps it was TOO easy. Many people fail to setup appropriate security measures on their wireless once they are connected. If you simply plugged in your network adapter, connected your laptop or PDA to your network, there s nothing to prevent your neighbor or someone else from connecting just as easily as you did!
9 Recommendations for Securing Your Wireless Network at Home 1. Change the router s default passwords. 2. Change the SSID name and disable SSID broadcast. 3. Setup MAC filters to limit which computers can connect. 4. Turn on WPA2 encryption use a strong key. 5. Review your wireless logs. 6. Watch for upgrades from the manufacturer. 7. Practice good computer security.
10 Step 1. Change the router s default passwords. Most wireless router manufacturers provide Web pages that allow owners to enter their network address and account information. These Web tools are protected with a login screen (username and password) so that only the rightful owner can do this. Right out of the box, however, they are usually configured with a default password that simple and very well-known to hackers on the Internet. Change these settings immediately.
11 Step 2. Change the SSID name and disable SSID broadcast. Access points and routers all use a network name called the SSID. Manufacturers normally ship their products with the same SSID set. For example, the SSID for Linksys devices is normally "Linksys." When someone finds a default SSID, they see it is a poorly configured network and are much more likely to want to snoop around. In Wi-Fi networking, the access point or router typically broadcasts the network name (SSID) over the air at regular intervals. In the home, this feature may be unnecessary, and it increases the likelihood an unwelcome person will try to log in to your home network.
12 Step 3. Setup MAC Filters. All network communication devices have unique hard coded numbers assigned to them. This number is called the MAC address. If your router is capable of MAC filtering you should only allow devices that you expect to appear connect to your wireless network and deny all others.
13 Step 4. Turn on WPA2 Encryption. All Wi-Fi equipment supports some form of "encryption, which scrambles the information sent over the wireless network so that it can t be easily read. WEP or WPA are the most common encryption schemes found on home wireless systems. For most routers, you will provide a passphrase that your router uses to generate several keys. Make sure your passphrase is unique, not a dictionary word and at least 10 characters long the longer, the better! Understanding WEP vs. WPA2 WEP (wired equivalent privacy) was the encryption scheme included with the first generation of wireless networking equipment. It was found to contain some serious flaws which make it relatively easy to crack, or break into within a matter of minutes. However, even WEP is better than nothing and will keep casual snoopers and novice hackers out of your wireless network. Using encryption with a longer key length will provide stronger security, but with a slight performance impact. WPA2 (WIFI protected access) is a much stronger security protocol than WEP and should be used instead of WEP if your wireless router and network adapters will support it. Some routers may refer to this as WPA-PSK. You should always consider using the router s strongest encryption mechanism.
14 Step 5. Review wireless logs. Most routers will keep track of what systems have been successful or have failed to connect to your router. Reviewing your logs can help identify a possible intruder or misconfiguration in your routers security.
15 Step 6. Watch for firmware upgrades for devices. Network hardware is run by software called firmware. Just like computers, flaws may be found in y p y the software that would allow people to bypass security mechanisms built into your router or network adapter. You should regularly check your wireless manufacturer s website for updates and apply when appropriate.
16 Step 7. Practice good computer security. Don t rely only on your router/access point to protect your computers inside your wireless network. Even the most secure wireless network typically won t stop a determined hacker. Enable System Firewalls Use accounts protected with a strong password Apply security patches to your OS in a timely manner Ensure you have antivirus up to date on your system Avoid using open shares on your computers to share files Be on the lookout for malicious websites, spyware/adware, phishing and scams Windows Users Mac
17 How can I confirm my setup is secure? When connecting to your wireless network. Look for Security-enabled enabled wireless connection. If your home network connection is listed as Unsecured, you may be a sitting duck to individuals free-loading off your Internet connection or snooping around on your computer.
18 Demonstration Hacking an Unsecured Home Wireless Network
19 Wireless Networking On the Road Kyle Crane, Network Security Specialist
20 Free Wireless On The Road Many businesses now provide some form of free wireless internet access. Airports Cafés McDonalds Starbucks Panera Bread Even some gas stations??
21 Can I connect? Generally (but not always) the network will have a name that matches the business. If in doubt, ASK! There are examples of places that have open access but never intended to provide that to the public. The laws on access to networks are strict and don t fit well to the grey areas in wireless access but may well be applied to you anyway.
22 How to Find an Open Wireless Network with Windows XP Windows normally provides notification of wireless networks in range and lists the names. You can then select the network you wish to connect with and click Select
23 How to Find an Open Wireless Network with Windows Vista Windows normally provides notification of wireless networks in range and lists the names. You can then select the network you wish to connect with and click Select
24 How to Find an Open Wireless Network with Mac OS X MAC OS X provides a similar notice when the Airport icon is available and the airport is on. Click the Airport icon and select the network from the list to connect to it.
26 Wireless on the Road: The good Convenient It s always nice to be able to stay connected on the road. It is becoming more widespread and almost expected in hotels and other travel locations. More freedom when working on the road Allows a teleworker the freedom to get out of the house. Allows for easier use of vacation even if critical actions need to occur while you are away.
27 Wireless on the Road: The bad Legal grey areas Some businesses can be vague about what the terms are to use the access. Often times can be poor quality Many locations implement wireless poorly and the signal is weak in the intended areas. This makes it much easier for a hacker to setup a fake wireless router and fool you into thinking you are connecting to a legitimate wireless network. You have no idea who your neighbors are Open wireless is by nature uncontrolled and any one with any intentions ti can be there with you. Are you sure that McDonalds is really McDonalds?
28 Wireless on the Road: The Downright Ugly Really nasty stuff: Large open WiFi networks are just like being on the Internet There can be hundreds of people p with unknown intent who are all on the same physical network as you, just as though they were inside your house. Your system is wide open to anything if not using a firewall. Detection and identification of the offender are harder than it would be on the net Automated tools are emerging to take advantage of systems on wireless networks While not necessarily simple today, they will improve with time. Moving towards automatic discovery and exploitation of systems.
29 Recommendations for Using Wireless on the Road Disable automatic connections even to preferred networks. This prevents scanners from gathering the list of wireless networks that windows will automatically connect to. Keep Antivirus products installed and up to date. This is pretty general advice but it holds here too. Enable the windows firewall whenever you are working with public wireless. All but the most determined attacker will be seriously frustrated in attempts to attack a firewall enabled system. It raises the bar.
30 Recommendations for Using Wireless on the Road Turn off or disable your wireless card when not in use. Ensure your system is patched and up to date. Use the auto update features of your OS to reduce the number of possible exploits available to an attacker. Don t access personal or sensitive information while on a public wireless network (e.g., banking sites.)
31 Pushing the Limits: Wireless and the Law
32 So many unsecured networks!
34 Look, but don t touch! Wardriving, i warflying or war-anything is NOT illegal. Capturing traffic is also not illegal but, in some states, intent is the key. Just because a wireless network is unsecured, it s not an invitation to use them. If you connect to a wireless network without permission, you are committing a felony under Kansas law.
Article ID: 5035 5 Tips to Fortify your Wireless Network Objective Although Wi-Fi networks are convenient for you and your employees, there may be unwanted clients using up the bandwidth you pay for. In
NDSU Wireless Bruce Curtis David Dahl Valerie Nordsletten Wireless Security Acronyms WEP = Wired Equivalent Privacy WPA = Wi-Fi Protected Access WEP is broken WEP really means Won t Even Protect WPA is
Karthik Pinnamaneni COEN 150 Wireless Network Security Dr. Joan Holliday 5/21/03 Introduction Although a variety of wireless network technologies have or will soon reach the general business market, wireless
How to Stay Safe on Public Wi-Fi Networks Starbucks is now offering free Wi-Fi to all customers at every location. Whether you re clicking connect on Starbucks Wi-Fi or some other unsecured, public Wi-Fi
Wi-Fi Frequently Asked Questions Wi-Fi Basics... 2 The connection process... 2 What is an IP address?... 2 IP address changes... 2 Wi-Fi coverage and signal strength... 3 Wi-Fi terminology... 4 General...
Security Analysis of Common Wireless Networking Implementations Brian Cavanagh CMPT 585 12/12/2005 The use of wireless networking to connect to the internet has grown by leaps and bounds in recent years.
Digital Entertainment 2003 by TiVo Inc. Reproduction in whole or in part without written permission is prohibited. All rights reserved. Printed in the USA. TiVo, TiVo Central, and TiVolution are registered
Wireless Networking Chapter 23 Overview In this chapter, you will learn how to Discuss wireless networking components Analyze and explain wireless networking standards Install and configure wireless networks
GETTING THE MOST OUT OF EVIL TWIN B-SIDES ATHENS 2016 GEORGE CHATZISOFRONIOU (@_sophron) email@example.com www.census-labs.com > WHOAMI Security Engineer at CENSUS S.A. Cryptography, Wi-Fi hacking,
Fix Home Network Thousands of satisfied users! Easy steps to setup Wireless router with Cable or DSL internet service provider. Copyright, Legal Notice and Disclaimer: This publication is protected under
Wi-Fi User Guide Welcome to Fetch Welcome 3 Connect Fetch to your home Wi-Fi 4 Tips to improve Wi-Fi in your home 8 Can t connect to Wi-Fi 10 Advanced Wi-Fi troubleshooting 1 Welcome This guide will help
VAR11N Datasheet VAR11N is the professional mini WiFi repeater, and together with mini WiFi router and WiFi intelligent bridge that is elaborately developed by HouTian Network, the original creation D/A
Peter C. Cronas How do you connect to the Internet (WWW)? Internet connection alternatives: Dial Up Modem 56Kb (a joke right?) Satellite (HughesNet) Modem 10-15 Mbps?? Cable (Cablevision) Cable Modem 1.5-20
WIRELESS N USB ADAPTER USER MANUAL MAN-525503/525534-UM-0413-01 INTRODUCTION Thank you for purchasing this Manhattan Wireless N USB Adapter. Because many netbooks and laptops (especially those more than
Point Model WAC104 User Manual October 2016 202-11698-01 350 E. Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. You can visit www.netgear.com/support to register
Outline 18-759: Wireless Networks Lecture 10: 802.11 Management Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2016 http://www.cs.cmu.edu/~prs/wirelesss16/
Wireless Technologies Networking for Home and Small Businesses Chapter 7 Manju. V. Sankar 1 Objectives Describe wireless technologies. Describe the various components and structure of a WLAN Describe wireless
N300 Wireless Gigabit ADSL2+ Modem Router DGN3500 User Manual 350 East Plumeria Drive San Jose, CA 95134 USA June 2010 202-10487-02 v1.0 2010 NETGEAR, Inc. All rights reserved. No part of this publication
Internet User Guide For the ZTE H298N routers Power WAN LAN1 Internet LAN3 LAN2 LAN4 WLAN WPS Phone USB1 Reset WPS USB2 LAN4 LAN3 LAN2 LAN1 WAN Phone On/Off Power WLAN Internet seethelight.co.uk User Guide,
A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G USB Network Adapter User Guide Model No. WUSB54G Copyright and Trademarks Specifications are subject to change without notice. Linksys
LevelOne WAP-0005 108Mbps PoE Wireless AP User Manual V3.0.0 i TABLE OF CONTENTS CHAPTER 1 INTRODUCTION... 1 FIGURE 1: WIRELESS ACCESS POINT... 1 FEATURES OF YOUR WIRELESS ACCESS POINT... 1 Security Features...
Wireless G Travel Router Share your hotel broadband Internet connection User Manual F5D72 Table of Contents 1. Introduction............................................ 1 Advantages of a Wireless Network.........................
Introduction to Wireless Networking and Security Chino Information Technology Center Steve Siedschlag, Associate Professor What is a Wireless LAN? The wireless telegraph is not difficult to understand.
WAP3205 v3 Wireless N300 Access Point Version 1.0 Edition 1, 05/2016 Quick Start Guide User s Guide Default Login Details LAN IP Address http://192.168.1.2 User Name www.zyxel.com admin Password 1234 Copyright
Manually Enable Wireless Windows 7 Network Connections Not Showing Up Wireless Network Connection Enabled but Not connected Fix Windows 7 repair. This article explains how to manually set up your Windows
Performance & Use AC1900 1900 DUAL BAND 600+1300 RANGE AC1900 WiFi 600+1300 Mbps speeds 1GHz dual core processor Advanced features for lag-free gaming Prioritized bandwidth for streaming videos or music
User Guide 450Mbps/300Mbps Wireless N Access Point TL-WA901ND/TL-WA801ND REV4.0.0 1910011930 Contents About This Guide...1 Chapter 1. Get to Know About Your Access Point.................... 2 1. 1. Product
Performance & Use AC1900 AC1900 WiFi 600+1300 Mbps speeds 1GHz Dual Core Processor 1900 DUAL BAND 600+1300 RANGE Advanced features for lag-free gaming Prioritized bandwidth for streaming videos or music
Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses 1 Peer-to-Peer Networks Nodes communicate with each other Peers Share peripheral
Multi-Protocol On-board Ethernet Multi-function Print Server and Wireless Ethernet Multi-function Print Server NETWORK USER S GUIDE This Network User's Guide provides useful information of wired and wireless
WAP6405 5GHz AC1750 Gigabit Wireless Bridge Version 1.00 Edition 1, 06/2016 Quick Start Guide User s Guide Default Login Details LAN IP Address http://192.168.1.2 (AP Mode) http://192.168.1.5 (Repeater
Performance & Use AC1900 Extreme WiFi speed Up to 1900 Mbps 1GHz dual-core processor 1900 DUAL BAND 600+1300 RANGE Fast VDSL modem for fibre broadband Built-in VDSL is also compatible with ADSL2+ connections
A Division of Cisco Systems, Inc. GHz 2,4 802.11g WIRELESS Wireless-G PCI Adapter with SpeedBooster User Guide Model No. WMP54GS (EU/UK/LA) Copyright and Trademarks Specifications are subject to change
FAQs 10010410NC-RR Frequently Asked Questions Connecting Your Valet to the Internet 1 What computer operating systems does the Valet/Valet Plus support? 1 Why can t I connect my computer or device to my
WRE6505 v2 Wireless AC750 Range Extender Version 1.00 Edition 1, 10/2016 Quick Start Guide User s Guide Default Login Details Web Address http://zyxelsetup http://dhcp-assigned IP www.zyxel.comhttp://192.168.1.2
AC750 Dual Band Wireless-AC Access Point, Router and Repeater - Wall Plug Product ID: WFRAP433ACD This dual-band wireless access point, router, and repeater makes it easy to create a wireless network from
How to get the Internet to every room of your home Can t get your wireless signal all over your house? Wireless too slow? Then read on! Wireless networking is all well and good if you are close to your
Wireless FAQs 1 Why am I not getting advertised speeds on my Wi-Fi network? 2 What factors affect the speed of my Internet access? 3 What is the difference when using a Wired vs. Wireless connection? 4
Performance & Use AC1900 1900 DUAL BAND 600+1300 RANGE AC1900 WiFi 600+1300 Mbps speeds 1GHz Dual Core Processor Advanced features for lag-free gaming Prioritized bandwidth for streaming videos or music
: Advanced Security IT Essentials: PC Hardware and Software v4.0 1 Purpose of this Presentation To provide to instructors an overview of : List of chapter objectives Overview of the chapter contents, including
A Guide to Routers Besides enabling wireless internet connections, routers also keep sensitive data private by safeguarding networks. Wireless routers are increasingly common, even in public spaces. This
Today s challenge on Wireless Networking David Leung, CISM Solution Consultant, Security Datacraft China/Hong Kong Ltd. Agenda How Popular is Wireless Network? Threats Associated with Wireless Networking
Chapter 3 Configuring the Internet and Wireless Settings This chapter describes how to use the Smart Wizard Installation Assistant on the Resource CD to configure your wireless router s Internet connection
HACKING & INFORMATION SECURITY Presents: - With TechNext We Are The Speakers Sudarshan Pawar Cer.fied Security Expert(C.S.E.) Cer.fied Informa.on Security Specialist (C.I.S.S.) Security Xplained (TechNext
THE 123 OF WIRELESS SECURITY AT HOME 家居 WIFI 保安 123 CONFIGURING YOUR HOME WIRELESS NETWORK Presented by: Au Shun Yi, Choi Kai San and Ngan Tsz Him of Hong Kong Institute of Vocational Education (Chai Wan)
Security: More Than a Thumb and a Blanket IT Security is one of those things difficult subjects to discuss, like Or Or Or IT Security Goal: Make it difficult enough to deter hacking so its not worth their
Cable Modem/Router with Wireless-N U S E R M A N U A L NOTICE This document contains proprietary information protected by copyright, and this Manual and all the accompanying hardware, software, and documentation
Wireless Security and Monitoring Training materials for wireless trainers Goals to understand which security issues are important to consider when designing WiFi networks to be introduced to encryption,
QUICK INSTALLATION GUIDE Hi-Gain TM USB Wireless-150N Window Adapter with Range Amplifier Mac OS X Windows XP Windows 7 & Vista START HERE HAWNU2 OVERVIEW Check Package Contents - One Hi-Gain USB Wireless-150N
How to Set Up a Secure Home Wireless Network What you don t know about setting up a home wireless network can hurt you. 2008 APCUG Convention Session Tom Jones, P.E., RCDD-NTS CQS-CWLSS AGENDA Some Terms
Improving Security in Wireless Networks Introduction Wireless networking provides many advantages over conventional wired networks. For instance the ability to connect to your network resources without
V50.02 Model: FI8918W Quick Installation Guide Indoor Pan/Tilt Wireless IP Camera Black White For Windows OS ------- Page 1 For MAC OS ------- Page 14 Quick Installation Guide For Windows OS Package Contents
A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G PCI Adapter with SpeedBooster User Guide Model No. WMP54GS Copyright and Trademarks Specifications are subject to change without notice.
Cable Modem/Router with N600 Dual-band Wireless U S E R M A N U A L NOTICE This document contains proprietary information protected by copyright, and this Manual and all the accompanying hardware, software,
WiFi-Repeater User Manual Quick Installation Guide(Q.I.G.) REV.1.2 Introduction: The WiFi Repeater is a combined wired/wireless network connection device designed specifically for small business, office,
Performance & Use AC1750 WiFi 450+1300Mbps speeds Dual core 1GHz processor boosts performance Advanced features for lag-free gaming Prioritized bandwidth for streaming videos or music Up to 100% faster
WI-FI HUB+ TROUBLESHOOTING GUIDE Overview This guide is here to provide some answers to some commonly asked questions about your Wi-Fi Hub+. Tip: you can connect to your Wi-Fi Hub+ using an Ethernet cable
Wireless Attacks and Defense By: Dan Schade April 9, 2006 Schade - 2 As more and more home and business users adapt wireless technologies because of their ease of use and affordability, these devices are
GET STARTED Coredy CX-E120 Mini Range Extender/Aessess Point/Router Quick Installation Guide Preparing... Setup Process... Web-Browser Method... - Method... 1 1 1 2 User Manual Overview... 3 Using as a
Chapter 11: Networks Devices in a Small Network Small Network A small network can comprise a few users, one router, one switch. A Typical Small Network Topology looks like this: Device Selection Factors
WL-5420AP User s Guide Table of contents INTRODUCTION... 1 About the Operation Modes...2 LED Indicators...5 Solid...5 Ports on the Rear Panel...7 GETTING CONNECTED... 8 WPA AP -CONFIGURATION VIA WEB...
WIRELESS DUAL-BAND Travel Router User Manual F9K1107au 8820au00920 Rev. A00 TABLE OF CONTENTS Getting Started.... 1 What s in the Box...1 Initial Setup...1 Getting to Know Your Router.... 4 Front Panel...4
Last Modified: 10/20/15 Wireless Network Standard Purpose The standard and guidelines described in this document will ensure the uniformity of wireless network access points at the University of Georgia.
AC750 WiFi Range Extender Model EX6100 User Manual January 2014 202-11307-02 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products. After installing your device,
WAP3205 v2 Wireless N300 Access Point Version 1.00 Edition 2, 12/2012 Quick Start Guide User s Guide Default Login Details LAN IP Address http://192.168.1.2 Password 1234 www.zyxel.com Copyright 2012 ZyXEL
A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G Access Point User Guide Model No. WAP54G v2 Copyright and Trademarks Specifications are subject to change without notice. Linksys is
Yealink T46S Wireless Settings Wireless Network Yealink T46S Wireless Settings Overview Wi-Fi is a popular wireless networking technology that uses radio waves to provide wireless High speed Internet and
Chancen und Risiken im Bereich von WLAN's FGSec - Vorabendveranstaltung 20. Juni 2002 Uwe B. Kissmann Leader IT- Security Services. IBM Global Services Switzerland UKIS@CH.IBM.COM Currently, we are working
Performance & Use AC1900 Extreme combined WiFi speed Up to 1900 Mbps 1GHz dual-core processor 1900 DUAL BAND 600+1300 RANGE Fast VDSL/ADSL modem for fibre broadband Compatible with VDSL, VDSL2, ADSL, ADSL2,
Integrating Wireless into Campus Networks This document is a result of work by the Network Startup Resource Center (NSRC at http://www.nsrc.org). This document may be freely copied, modified, and otherwise
Welcome to Cogeco UltraFibre Internet UltraFibre Internet User Guide Hi there. Thanks for joining us. Welcome to your new UltraFibre Internet service from Cogeco. This User Guide is a reference tool for
Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or
Wireless Setup Guide (for Windows XP, Windows Vista, Windows 7, Windows 8 and Mac OSx) Wireless Setup Guide The following steps will take you through the process of setting up and connecting to your wireless
VIVACOM NET WI-FI NETWORK SECURED WI-FI NETWORK Instructions for users of Windows Vista & Vista SP1/SP2 Before you go through the steps in this manual, make sure to press the «submit» button in http://my.contact.bg
A Wireless Dual Band Gigabit Router Upgrade to Faster AC Wi-Fi and Gigabit Connections 300Mbps + 867Mbps Dual Band Wi-Fi Gigabit Ports USB 2.0 Port Highlights Household Wi-Fi at Streaming Speeds Optimum
A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e Chapter 10 Networking Essentials Objectives Learn about hardware devices used for networking Learn about the different types of networks
GlobeSurfer III Quick Start Guide GlobeSurfer III User guide 2 Welcome to GlobeSurfer III Welcome to the GlobeSurfer III, your 3G wireless gateway router that connects you to the internet, allows you to