Dell Wireless Adapter 3300 User Guide - Page 30
keys using a hashing algorithm and adds an integrity-checking feature that ensures the keys haven't been
View all Dell Wireless Adapter 3300 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 30 highlights
keys using a hashing algorithm and adds an integrity-checking feature that ensures the keys haven't been tampered with. WEP Wired Equivalency Protocol, a security protocol for wireless networks defined in the Wi-Fi standard. The wireless network may use anywhere from one to four WEP keys. WiFi Wireless Fidelity, used when referring to any 802.11 network. WPA Wi-Fi Protected Access, a security protocol for wireless networks defined in the Wi-Fi standard that was designed to imporove upon the WEP security protocol through improved data encryption and user authentication.
keys using a hashing algorithm and adds an integrity-checking feature that ensures the keys haven't been
tampered with.
WEP
Wired Equivalency Protocol, a security protocol for wireless networks defined in the Wi-Fi standard. The
wireless network may use anywhere from one to four WEP keys.
WiFi
Wireless Fidelity, used when referring to any 802.11 network.
WPA
Wi-Fi Protected Access, a security protocol for wireless networks defined in the Wi-Fi standard that was
designed to imporove upon the WEP security protocol through improved data encryption and user
authentication.