How can I use non-WPA compliant devices on a network without making it unsecure?
dthomas 1 year ago
My daughter has a handheld game system that doesn't support WPA security for wireless connections. How would you set up a wireless network to allow it access without throwing security out the window? It is WEP compliant, but I would just as soon not have my wireless network security downgraded from WPA2 to WEP.
Topic: NetworkingAnswer this Question
Ask a question
Analyst firm lowers tablet forecast due to increased popularity of 5-in. or larger smartphones.
Next year will see demonstrable evidence of the Internet of Things, real-time communications on the Web, and SDN-enabled platforms with killer applications for them.
SlideShare, a site for posting, sharing, viewing, rating and commenting primarily on business presentations, has given a makeover to its homepage.
The growing popularity of 10 Gigabit and 40 Gigabit Ethernet in data centers helped propel the entire Ethernet switch market during the third quarter, according to IDC.
Microsoft moved to reassure business and government customers worldwide that it is committed to informing them of legal orders related to their data, and will fight in court any 'gag order' that prevents it from sharing such information with customers.
The U.S. is collecting nearly 5 billion records a day on the location of cellphones around the world to feed a large database of the location of "at least hundreds of millions of devices," according to a newspaper report.
Intel has beefed up its networking silicon in a bid to capture a bigger share of enterprise, carrier and cloud-provider networks for its chip architecture.
The top product results in Google's Shopping service frequently feature products with higher prices than those listed on competing online shopping services, according to a complaint filed by longtime Google critic Consumer Watchdog.
Recognizing the growing popularity of Node.js for building distributed Web applications, cloud provider Joyent will soon offer a commercial support package for managing the platform, wherever it is run.
A security researcher has released software and technical instructions for modifying a drone so that it can identify and hijack other drones.
White Papers & Webcasts