Kodak Kodak Theatre Extended User Guide - Page 84

TCP/IP, A text string used for WEP security on a Wi Fi wireless network. A WEP key with 10 or - eastman

Page 84 highlights

Appendix name that identifies a wireless network. The identifier is attached to the wireless local area network (WLAN) and acts as an identifier when a device tries to connect to the system. A device is not permitted to join the network unless it can provide the unique SSID. An SSID can be broadcast by the network router, allowing devices to detect it as an available network. An SSID does not supply security to the network. SSL-Secure Sockets Layer: a commonly used encryption scheme used by many online retail and banking sites to protect the financial integrity of transactions. TCP/IP-Transmission control Protocol/Internet Protocol: the underlying technology behind the Internet and communications between computers in a network. URL-Uniform Resource Locator: also referred to as a Web address, since it identifies the location of a file or resource on the Web. For example, the URL for the Eastman Kodak company Web site is http://www.kodak.com. WEP-Wired Equivalent Privacy: basic wireless security provided by Wi Fi. In some instances, WEP may be all a home or small business user needs to protect wireless data. WEP is available in 40 bit (also called 64 bit), or in 108 bit (also called 128 bit) encryption modes. As 108 bit encryption provides a longer algorithm that takes longer to decode, it can provide better security than basic 40 bit (64 bit) encryption. WEP key A text string used for WEP security on a Wi Fi wireless network. A WEP key with 10 or 23 characters can include numbers and the letters A F and are not case sensitive. 5and 13-character WEP keys can include numbers and all letters (as well as some special characters) and are case sensitive. WPA-Wi Fi Protected Access: a Wi Fi security standard that provides a high level of wireless network security. It uses data encryption through the Temporal Key Integrity Protocol (TKIP). TKIP scrambles the keys and ensures that the keys have not been 84 www.kodak.com/go/easysharecenter

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91

Appendix
84
www.kodak.com/go/easysharecenter
name that identifies a wireless network. The identifier is attached to the wireless local
area network (WLAN) and acts as an identifier when a device tries to connect to the
system. A device is not permitted to join the network unless it can provide the unique
SSID. An SSID can be broadcast by the network router, allowing devices to detect it as
an available network. An SSID does not supply security to the network.
SSL—
Secure Sockets Layer: a commonly used encryption scheme used by many online
retail and banking sites to protect the financial integrity of transactions.
TCP/IP—
Transmission control Protocol/Internet Protocol: the underlying technology
behind the Internet and communications between computers in a network.
URL—
Uniform Resource Locator: also referred to as a Web address, since it identifies
the location of a file or resource on the Web. For example, the URL for the Eastman
Kodak company Web site is http://www.kodak.com.
WEP—
Wired Equivalent Privacy: basic wireless security provided by Wi Fi. In some
instances, WEP may be all a home or small business user needs to protect wireless
data. WEP is available in 40 bit (also called 64 bit), or in 108 bit (also called 128 bit)
encryption modes. As 108 bit encryption provides a longer algorithm that takes longer
to decode, it can provide better security than basic 40 bit (64 bit) encryption. WEP key
A text string used for WEP security on a Wi Fi wireless network. A WEP key with 10 or
23 characters can include numbers and the letters A F and are not case sensitive. 5-
and 13-character WEP keys can include numbers and all letters (as well as some special
characters) and are case sensitive.
WPA—
Wi Fi Protected Access: a Wi Fi security standard that provides a high level of
wireless network security. It uses data encryption through the Temporal Key Integrity
Protocol (TKIP). TKIP scrambles the keys and ensures that the keys have not been