Dell Wireless Adapter 3300 User Guide - Page 30

keys using a hashing algorithm and adds an integrity-checking feature that ensures the keys haven't been

Page 30 highlights

keys using a hashing algorithm and adds an integrity-checking feature that ensures the keys haven't been tampered with. WEP Wired Equivalency Protocol, a security protocol for wireless networks defined in the Wi-Fi standard. The wireless network may use anywhere from one to four WEP keys. WiFi Wireless Fidelity, used when referring to any 802.11 network. WPA Wi-Fi Protected Access, a security protocol for wireless networks defined in the Wi-Fi standard that was designed to imporove upon the WEP security protocol through improved data encryption and user authentication.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45

keys using a hashing algorithm and adds an integrity-checking feature that ensures the keys haven't been
tampered with.
WEP
Wired Equivalency Protocol, a security protocol for wireless networks defined in the Wi-Fi standard. The
wireless network may use anywhere from one to four WEP keys.
WiFi
Wireless Fidelity, used when referring to any 802.11 network.
WPA
Wi-Fi Protected Access, a security protocol for wireless networks defined in the Wi-Fi standard that was
designed to imporove upon the WEP security protocol through improved data encryption and user
authentication.