Kodak Kodak Theatre Extended User Guide - Page 84
TCP/IP, A text string used for WEP security on a Wi Fi wireless network. A WEP key with 10 or - eastman
UPC - 041778032183
View all Kodak Kodak Theatre manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 84 highlights
Appendix name that identifies a wireless network. The identifier is attached to the wireless local area network (WLAN) and acts as an identifier when a device tries to connect to the system. A device is not permitted to join the network unless it can provide the unique SSID. An SSID can be broadcast by the network router, allowing devices to detect it as an available network. An SSID does not supply security to the network. SSL-Secure Sockets Layer: a commonly used encryption scheme used by many online retail and banking sites to protect the financial integrity of transactions. TCP/IP-Transmission control Protocol/Internet Protocol: the underlying technology behind the Internet and communications between computers in a network. URL-Uniform Resource Locator: also referred to as a Web address, since it identifies the location of a file or resource on the Web. For example, the URL for the Eastman Kodak company Web site is http://www.kodak.com. WEP-Wired Equivalent Privacy: basic wireless security provided by Wi Fi. In some instances, WEP may be all a home or small business user needs to protect wireless data. WEP is available in 40 bit (also called 64 bit), or in 108 bit (also called 128 bit) encryption modes. As 108 bit encryption provides a longer algorithm that takes longer to decode, it can provide better security than basic 40 bit (64 bit) encryption. WEP key A text string used for WEP security on a Wi Fi wireless network. A WEP key with 10 or 23 characters can include numbers and the letters A F and are not case sensitive. 5and 13-character WEP keys can include numbers and all letters (as well as some special characters) and are case sensitive. WPA-Wi Fi Protected Access: a Wi Fi security standard that provides a high level of wireless network security. It uses data encryption through the Temporal Key Integrity Protocol (TKIP). TKIP scrambles the keys and ensures that the keys have not been 84 www.kodak.com/go/easysharecenter