антенна

BYTE.com > Antennas Enhance WLAN Security BYTE.comRSS feed ArchivesColumnsFeaturesPrint Archives 1994-1998SpecialMichael Abrash's Graphics Programming Black Book101 Perl ArticlesAbout UsWrite to BYTE.comAdvertise with BYTE.comNewsletterFree E-mail Newsletter from BYTE.comEmail AddressFirst NameLast Name Jump to...Columns:Research Papers and ReportsAdvanced Software and TechnologiesBYTE Media LabChaos ManorConference ReportsFeaturesFree FeaturesGigglebytesLetters to BYTE.comMr. Computer Language PersonNew ProductsOp/EdPortable ComputingServing with LinuxThe Upgrade Advisor HOME ABOUT US ARCHIVES CONTACT US ADVERTISE BYTE.com > Features > 2001 > OctoberAntennas Enhance WLAN SecurityBy Trevor Marshall October 1, 2001(Antennas Enhance WLAN Security: Page 1 of 1 ) Antennas are most often used to increase the range of WLAN (wireless LAN) systems, but proper antenna selection can also enhance the security of your WLAN. A properly chosen and positionedantenna can reduce the signal leaking out of your workspace, and make interception extremely difficult.In this article, I analyze the signal of differentantenna designs, and how the positioning of the user's antennamakes a difference in signal reception.The 2.4-GHz ISM BandWireless networking uses radio frequencies originally set aside for unlicensed "Industrial Scientific and Medical" (ISM) use. There are three of these bands, at 902-928 MHz, 2400-2483.5 MHz, and 5725-5850 MHz. Unlike all other parts of the radio spectrum, you do not need a license to operate a transmitter in the ISM bands. But you must be prepared to accept interference from other users of the bands, and, to prevent anarchy, you must obey Federal Communications Commission rules governing the use of ISM spectrum.The IEEE 802.11b specification sets up 11 channels within the 2.4-GHz band, centered between 2.412 and 2.462 GHz. The wireless LAN hops between these channels in a manner designed to reduce interference and increase data integrity.802.11b has a number of software security features built into its protocols, but each one of these security features has now been broken. If somebody wants to intercept the data travelling over your WLAN, and if they can hear the radio signals from it, you cannot stop them from listening. The best you can do is encrypt the data going to your WLAN using secure high-level software protocols, like SSH, which are often inconvenient to implement and regarded by many WLAN users as an unnecessary inconvenience.Good antenna deployment on a WLAN can reduce stray RF radiation, making your signal up to 100 times lower outside of the work area, and much harder to surreptitiously intercept. A good antenna will also make your WLAN less susceptible to stray signals from other WLANs, telephones, and microwave ovens, which all use the same 2.4 Want to read the rest of this article? Please click here to register or login. Page 1 of 1 BYTE.com > Features > 2001 > OctoberDr. Dobb's Media CenterCombining Native Application Code with the Web for Rich User ExperiencesIn this session, we will discuss how you can use Qt together with WebKit to build and deploy web-enriched applications that combine online and offline content into a seamless user experience. Using WebKit, native application code can call web environment code - and vice versa - enabling new ways of web interoperability. We will discuss how to blend web and local content, rapidly create applications that incorporate real-time web content and services, and show you how to integrate HTML, JavaScript HTML, XHTML, CSS, JavaScript, SVG and AJAX into your native applications from a simple and intuitive API. Event Date: Wednesday, June 4, 2008Tom Mornini on Ruby on Rails, Part 2Dr. Dobb's talks with Tom Mornini, CTO of Engine Yard, a Ruby on Rails service provider. In the second installment of this two-partconversation with Mike Riley, Tom Mornini discusses Merb and Rubinius, Ruby-based open-source projects being developed in part by key Engine Yard staff. --more--Get the DDJ Media Center feedBYTE.com StoreBYTE CD-ROMNOW, on one CD-ROM, you can instantly access more than8 years of BYTE. The Best of BYTE: Volume 2 - Heuristic Algorithms In this volume of Best of BYTE, we explore the emergence of some heuristic algorithms. Although we have only scratched the surface of this intriguing subject, we hope we've suggested the potential of the synthesis of heuristics and algorithms.© 2008 Think Services, Privacy Policy, Terms of Service,United Business Media Site comments: webmaster@byte.comWeb Sites: BYTE.com, dotnetjunkies.com, Dr. Dobb's Journal, SD Expo, Sys Admin, sqljunkies.com, Unixreview MarketPlacesimple helix - enterprise hosting solutionssimple helix is the most trusted name in the hosting industry! Join us and host with the experts!Introducing SAP Business ByDesign-EXCLUSIVE PREVIEWCheck Out SAP's Most Complete On-Demand Business Software For Midsize Co. Sign Up For Free Preview.FREE virus, spyware & adware scanFind the malware your AV missed with the Sophos Threat Detection Test.IMPROVE YOUR SUPPORT EFFICIENCYWebEx lets you remotely control, configure and install applications and updates more efficiently.SOLVE SUPPORT ISSUES on the First Call!REMOTELY CONTROL AND CONFIGURE SYSTEMS. Easily install applications, updates. All from your Desktop!Wanna see your ad here? web2разделы софт автошкола ваза 2111 морозильный витрина thuraya sg 2510 деловой разведка мистер бин блюдо фарфор o2 optix брэнд эдас-134 аденома предст.ж-зы protherm кружка решетка оцинкованный асбест хризотиловый дешевый холодильник бейсболки заказ кислород обогащение кислородом профессиональный фарфор 8800 gold сбор д/полоскания горло зубной боль инерта краска уничтожитель анкетирование 5440.11 (крышка) вилатерм срочный перевод mobilux компания доминике генерация кислорода охота бабочка оформление свадеб дэнас оповещение metrobond концентрирование кислорода mobilux герб область электропечь dimplex model elba система видеоконференция застежка zip-lock рефрижератор дэнас бейсболки заказ набор гинекологический перегородка сантехкабин структурный штукатурка герб рф купить каболка шелковый ковры залог кострома кристофер брэнд купить айсбест заказать микроавтобус цепной конвейер доломит мачта флагшток трубогиб прайс зеркало теплогенераторы master 5004.14 (крышка) купить ниппель золотник 264-27-00 lida магнитный решетка снегоход буран ведро шампанский адресный база данный тач-скрин монитор пошив корпоративный костюм эксимер лазер витрина мороженый ведро шампанский укв радиосвязь sky link переработка резина крот dr корпоративный иностранный антенна