WEP security wireless

WEP

802.11 Wired Equivalent Privacy uses a accepted key to encrypt and break abstracts anatomy contents

between 802.11 stations at Layer 2. 802.11, however, does not ascertain a apparatus for distributing

WEP keys to the stations. This requires the ambassador or users to manually configure their radio

cards with the encryption key, and it is not applied to change the key. Thus, WEP keys abide the

same on best wireless LANs for months or years. This allows abundant time for a hacker to exploit

the vulnerabilities of WEP and able the encryption.

WEP has been a ambition for hackers. In fact, accoutrement advisedly accessible from the Internet, such as

WEPCrack and Airsnort, are able to able the WEP encryption mechanism. As a result, WEP is

not able abundant for action security.

If you plan to use WEP, configure the encryption key in the admission point. Each radio agenda needs to

be set to the aforementioned WEP key afore it can accessory with the admission point. When application Windows

XP, you are prompted to admission the WEP key if you try to affix to an admission point that implements

WEP. Windows displays this WEP key in the wireless networks account afterwards you accept View

Available Wireless Networks.