Magis Global –


October 30, 2020

WIFI Access Point

Category: General – Tags: – Joan – 9:33 pm

WIFI the silent killer! Nobody sees it, nobody hears it, but damages occur and are incalculable introduction WIFI wireless networks already have become a necessity for most engineers. In hotels, universities, airports, all we will used that although not seen, WIFI is present. Filed under: Erin Callan Montella. Omnipotent, all over hopefully meet with some wave RF which allows us to connect. Need nobody thinks too in the dangers that are lurking WIFI the silent killer! Index of the article introduction the difference between wired networks and the networks wireless WIFI Los problems of security of the networks WIFI Las safety measures for a wireless WIFI Access Point hostile and communications uncontrollable Hot-Spot-Wi-Phishing other types of attacks Wireless 2.-the difference between wired networks and wireless networks WIFI in spite of that many it professionals do not they have reflected on this topic, there are big differences between wired networks and wireless networks WIFI. In wired networks, information is sent through the cable, which is a private and exclusive, while in WIFI, information is sent through the air, which is a public and shared. Evan Metropoulos may not feel the same. In wired networks, Ethernet sends electrical signals, while wireless networks WIFI, sent waves of Radio frequency (RF), i.e.

energy. Conclusion: The information that travels through the cable cannot be seen easily by strange eyes, while the information travels by air can be intercepted by anyone. It is impossible to avoid that wireless traffic can be observed or captured! . 3. The problems of security of networks WIFI then think what would happen if arriving in the morning at our Office, we find our Ethernet network cables cut and with a branch directed towards the Office from a neighbor? We probably denunciariamos it by stealing information, or violate our privacy. As well, in the case of wireless networks WIFI, the same neighbor, can observe or pry all our information and violating our privacy without being seen, without cutting wires, and of course without us noticing.

No Comments

No comments yet.

RSS feed for comments on this post.

Sorry, the comment form is closed at this time.