Monday, December 10, 2007

4

Wi_Foo - The Secrets of wireless Hacking

Publisher : Addison Wesley

Pub Date : June 28, 2004
ISBN : 0-321-20217-1
Pages : 592

The definitive guide to penetrating and defending wireless networks.

Straight from the field, this is the definitive guide to hacking wireless networks. Authored by world-renowned wireless security auditors, this hands-on, practical guide covers everything you need to attack -- or protect -- any wireless network.

The authors introduce the 'battlefield,' exposing today's 'wide open' 802.11 wireless networks and their attackers. One step at a time, you'll master the attacker's entire arsenal of hardware and software tools: crucial knowledge for crackers and auditors alike. Next, you'll learn systematic countermeasures for building hardened wireless 'citadels''including cryptography-based techniques, authentication, wireless VPNs, intrusion detection, and more.
Coverage includes:

Step-by-step walkthroughs and explanations of typical attacks
Building wireless hacking/auditing toolkit: detailed recommendations, ranging from discovery tools to chipsets and antennas
Wardriving: network mapping and site surveying
Potential weaknesses in current and emerging standards, including 802.11i, PPTP, and IPSec
Implementing strong, multilayered defenses
Wireless IDS: why attackers aren't as untraceable as they think
Wireless hacking and the law: what's legal, what isn't
If you're a hacker or security auditor, this book will get you in. If you're a netadmin, sysadmin, consultant, or home user, it will keep everyone else out.

About the Authors

The authors have been active participants in the IT security community for many years and are security testers for leading wireless equipment vendors.

Andrew A. Vladimirov leads the wireless consultancy division at Arhont Ltd, one of the UK's leading security consultants. He was one of the UK's first IT professionals to obtain the coveted CWNA wireless certification.

Konstantin V. Gavrilenko co-founded Arhont Ltd. He has more than 12 years of IT and security experience, and his expertise includes wireless security, firewalls, cryptography, VPNs, and IDS.
Andrei A. Mikhailovsky has more than a decade of networking and security experience and has contributed extensively to Arhont's security research papers.


Why Does Wi-Foo Exist and for Whom Did We Write It?

There are multiple white papers and books available on wireless security (only two years ago you would have hardly found any). Many of them, including this book, are centered around 802.11 standards. Most explain the built-in security features of 802.11 protocols, explain future 802.11 security standards development and requirements, list (and sometimes describe in detail) known security weaknesses of 802.11 networks, and describe the countermeasures that a wireless network manager or system administrator can take to reduce the risks presented by these flaws. However, all books (except this one) do not describe how "hackers" can successfully attack wireless networks and how system administrators can detect and defeat these attacks, step by step, as the actual attack takes place.

We believe that the market needs above all else a hands-on, down-to-earth source on penetration testing of wireless networks. Such a source should come from the field and be based on the practical experience of penetrating a great number of client and testing wireless networks, an experience that many in the underground and few in the information security community possess. As a core of the Arhont wireless security auditing team, we perform wireless penetration testing on an almost daily basis and we hope that our experience will give you a good jump start on practical wireless security assessment and further network hardening.
If you are a curious individual who just got a PCMCIA card and a copy of the Netstumbler, we hope that this book will teach you about real wireless security and show, in the words of one of the main heroes of The Matrix, "how deep the rabbit hole goes." You will, hopefully, understand what is possible to do security-wise with the wireless network and what isn't; what is considered to be legal and what crosses the line. In the second, defense-oriented section of the book, you will see that, despite all the limitations of wireless security, an attacker can be successfully traced and caught. At the same time, we hope that you will see that defending wireless networks can be as thrilling and fascinating as finding and attacking them, and you could easily end up as a local wireless community security guru or even choose a professional path in this area. If you do participate in a wireless community project, you can raise awareness of wireless security issues in the community and help educate and inform others and show them that "open and free" does not mean "exploited and abused." If you run your own home wireless LAN, we take it for granted that it will be far more difficult to break into after you finish reading this book.

If you are a system administrator or network manager, proper penetration testing of your wireless network is not just the only way to see how vulnerable your network is to both external and internal attackers, but also the only way to demonstrate to your management the need for additional security safeguards, training, and consultants. Leaving the security of your wireless network unattended is asking for trouble, and designing a network with security in mind from the very beginning saves you time, effort, and perhaps your job. Unless the threats are properly understood by top management, you won't be able to implement the security measures you would like to see on your WLAN, or make the best use of the expertise of external auditors and consultants invited to test, troubleshoot, and harden the wireless network. If you decide (or are required) to tackle wireless security problems yourself, we hope that the defense section of the book will be your lifeline. If the network and company happen to be yours, it might even save you a lot of cash (hint: open source).

If you are a security consultant working within the wireless security field or expanding your skills from the wired to the wireless world, you might find a lack of structure in the on-line information and lack of practical recommendations (down to the command line and configuration files) in the currently available literature; this book will fill the vacuum.

The most prestigious and essential certification in the wireless security area at the time of writing is the Certified Wireless Security Professional (CWSP; see the "Certifications" section at http://www.cwne.com). People who have this certification have shown that they have a sufficient understanding of wireless security problems and some hands-on skills in securing real-life wireless networks. Because the CWSP certification is vendor-independent, by definition the CWSP preparation guide cannot go into specific software installation, configuration, troubleshooting, and use in depth. Thus, this book is a very useful aid in CWSP exam preparation, helping the reader comprehend the studied issues on a "how-to" level. In fact, the structure of this book (planned half a year before the release of the official CWSP study guide) is similar to the guide structure: The description of attack methods is followed by chapters devoted to the defensive countermeasures. After that, as you will see, the similarities between the books end.

Finally, if you are a cracker keen on breaking into a few networks to demonstrate that "sad outside world" your "31337 2k1LLz," our guess is what you are going to read here can be useful for your "h4x0r1ng" explorations, in the same manner that sources like Securityfocus or Packetstorm are. Neither these sites nor this book are designed for your kin, though (the three categories of people we had in mind when writing it are listed earlier). We believe in a free flow of information and sensitive open disclosure (as, e.g., outlined by a second version of the infamous RFPolicy; see http://www.wiretrip.net/rfp/policy.html). What you do with this information is your responsibility and the problems you might get into while using it the illicit way are yours, and not ours. The literature on martial arts is not banned because street thugs might use the described techniques against their victims, and the same applies to the informational "martial arts" (consider this one of the subreasons for the name of this book). In fact, how often are you attacked by the possessors of (rightfully earned) black belts on streets or in bars without being an offender yourself? Real masters of the arts do not start fights and true experts in information security do not go around defacing Web sites or trying to get "a fatter free pipe for more w4r3z." If you are truly keen on wireless security, you will end up as a wireless security application developer, security system administrator, or consultant. Although it is not an example from the wireless side of the world, take a close look at Kevin Mitnick, or read his recent "The Art of Deception" work. If you remain on the "m3 0wnZ j00" level, you will end up living without the Internet behind bars in some remote prison cell, and no manuals, books, or tools will save you. It's the mindset that puts "getting root by any means to impress my mates and satisfy my ego" before knowledge and understanding that is flawed.

How This Book Is Organized

Practically every wired or wireless network security book available starts with an outline of the seven Open Systems Interconnection (OSI) layers, probably followed by explaining "the CISSP triad" (confidentiality, integrity, and availability), basic security principles, and an introduction to the technology described. These books also include an introductory chapter on cryptography normally populated by characters called Bob, Alice, Melanie, and of course, Eve, who tends to be an evil private key snatcher.

This book is different: We assume that the reader has basic knowledge of the OSI and TCP/IP layers, understands the difference between infrastructure / managed and independent / ad-hoc wireless networks as well as can distinguish between common IEEE 802 standards. Describing the basics of networking or detailed operations of wireless networks will constitute two separate books on their own, and such well-written books are easily found (for 802.11 essentials we strongly recommend the Official CWNA Study Guide and O'Reilly's 802.11 Wireless Networks: The Definitive Guide).

However, you'll find a lot of data on 802.11 network standards and operations here when outlining it is appropriate, often in form of the inserted "foundations" boxes.

Also, there is a cryptography part that isn't directly related to everything wireless, but is absolutely vital for the proper virtual private network (VPN) deployment, wireless users authentication, and other security practices outlined in the following chapters. We skimmed through a lot of cryptographic literature and have been unable to find anything written specifically for system and network administrators and managers to cover practical networking conditions taking into account the access media, bandwidth available, deployed hosts' CPU architecture, and so forth. Chapters 11 and 12 will be such a source and we hope it will help you even if you have never encountered practical cryptography issues at all or aren't an experienced cryptographer, cryptanalytic, or cryptologist.

We have divided the book into two large parts: Attack and Defense. Although the Attack half is self-sufficient if your only aim is wireless security auditing, the Defense part is heavily dependent on understanding who the attackers might be, why they would crack your network, and, most important, how it can be done. Thus, we recommend reading the Attack part first unless you are using Wi-Foo as a reference.

This part begins with a rather nontechnical discussion outlining the wireless security situation in the real world, types of wireless attackers, and their motivations, objectives, and target preferences. It is followed by structured recommendations on selecting and setting up hardware and software needed to perform efficient wireless security testing. We try to stay impartial, do not limit ourselves to a particular group of vendors, and provide many tips on getting the best from the hardware and utilities you might already have. After all, not every reader is capable of devoting his or her resources to building an ultimate wireless hacking machine, and every piece of wireless hardware has its strong and weak sides. When we do advise the use of some particular hardware item, there are sound technical reasons behind any such recommendation: the chipset, radio frequency transceiver characteristics, antenna properties, availability of the driver source code, and so on. The discussion of standard wireless configuration utilities such as Linux Wireless Tools is set to get the most out of these tools security-wise and flows into the description of wireless penetration testing-specific software. Just like the hardware discussion before, this description is structured, splitting all available tools into groups with well-defined functions rather than listing them in alphabetic or random order. These groups include wireless network discovery tools, protocol analyzers, encryption cracking tools, custom 802.11 frame construction kits, and various access point management utilities useful for access point security testing.

Whereas many "network security testing" books are limited to describing what kind of vulnerabilities there are and which tools are available to exploit them, we carry the discussion further, outlining the intelligent planning for a proper audit (or attack) and walking the reader step by step through the different attack scenarios, depending on the protection level of the target network. We outline advanced attack cases, including exploiting possible weaknesses in the yet unreleased 802.11i standard, accelerating WEP cracking, launching sneaky layer 2 man-in-the-middle and denial of service attacks, and even trying to defeat various higher layer security protocols such as PPTP, SSL and IPSec. Finally, the worst case scenario, a cracker being able to do anything he or she wants with a penetrated wireless network, is analyzed, demonstrating how the individual wireless hosts can be broken into, the wired side of the network assaulted, connections hijacked, traffic redirected, and the firewall separating wireless and wired sides bypassed. The Attack chapters demonstrate the real threat of a wireless network being abused by crackers and underline the statement repeated throughout the book many times: Wireless security auditing goes far beyond discovering the network and cracking WEP.

In a similar manner, wireless network hardening goes beyond WEP, MAC address filtering, and even the current 802.11i developments. The later statement would be considered blasphemy by many, but we are entitled to our opinion. As the Attack part demonstrates, the 802.11i standard is not without its flaws and there would be cases in which it cannot be fully implemented for various administrative and financial reasons. Besides, we believe that any network security should be a multilayered process without complete dependence on a single safeguard, no matter how great the safeguard is. Thus, the primary aim of the Defense part of the book is giving readers the choice. Of course, we dwell on the impressive work done by the "i" task force at mitigating the threats to which all pre-802.11i wireless LANs are exposed. Nevertheless, we spend a sufficient amount of time describing defending wireless networks at the higher protocol layers. Such defense methodologies include mutually authenticated IPSec implementations, authentication methods alternative to 802.1x, proper network design, positioning and secure gateway deployment, protocol filtering, SSL/TLS use, and ssh port forwarding. The final chapter in the book is devoted to the last (or first?) line of defense on wireless networks, namely wireless-specific intrusion detection. It demonstrates that wireless attackers are not as untraceable as they might think and gives tips on the development and deployment of affordable do-it-yourself wireless IDS systems and sensors. It also lists some well-known high-end commercial wireless IDS appliances.

Even though we have barely scratched the surface of the wireless security world, we hope that this book will be useful for you as both a wireless attack and defense guide and a reference. We hope to receive great feedback from our audience, mainly in the form of fewer insecure wireless networks in our Kismet output and new exciting wireless security tools, protocols, and methodologies showing up to make the contents of this book obsolete.
Read comments For more Information

2

Javascript

Introduction by Author


Welcome to the wonderful world of Web programming with JavaScript. If you’ve worked with HTML before but want to add more flexibility and punch to your pages, or even if you’ve never written a stick of code in your life but are eager to hop on the Infobahn-wagon, this book’s for you.

Although I don’t assume that you know HTML, much of what you want to do with JavaScript is interact with objects created by using HTML — so you understand the examples in this book that much quicker if you have a good HTML reference handy. One to consider is HTML 4 For Dummies, 4th Edition, by Ed Tittel (Wiley Publishing, Inc.).

I do my best to describe how JavaScript works by using real-world examples — and not a foo (bar) in sight. When explaining things in formal notation makes sense, I do that, but not without a recap in plain English. Most importantly, I include tons of sample programs that illustrate the kinds of things you may want to do in your own pages.

Along with this book comes a companion CD-ROM. This CD-ROM contains all the sample code listings covered in the text along with many other interesting scripts, examples, and development tools. From experience, I can tell you that the best way to get familiar with JavaScript is to load the scripts and interact with them as you read through each chapter. If it’s feasible for you, I suggest installing the contents of the CD right away, before you dig into the chapters. Then, when you come across a listing in the book, all you have to do is double­click on the corresponding HTML file you’ve already installed. Doing so helps reinforce your understanding of each JavaScript concept described in this book. For more information and instructions on installing the CD-ROM, see the About the CD appendix in the back of this book.

About This Book

Think of this book as a good friend who started at the beginning, learned the ropes the hard way, and now wants to help you get up to speed. In this book, you can find everything from JavaScript basics and common pitfalls to answers to embarrassingly silly questions (and some really cool tricks, too), all of which I explain from a first-time JavaScript programmer’s point of view. Although you don’t find explanations of HTML in this book, you do find working examples on the companion CD complete with all the HTML you need to understand how JavaScript works.

Some sample topics you can find in this book are:

* Creating interactive Web pages
* Validating user input with JavaScript
* Testing and debugging your JavaScript scripts
* Adapting your scripts for cross-browser issues
* Integrating JavaScript with other technologies, such as Java applets, Netscape plug-ins, and ActiveX components

Building intelligent Web pages with JavaScript can be overwhelming — if you let it. You can do so much with JavaScript! To keep the deluge to a minimum, this book concentrates on the practical considerations you need to get your interactive pages up and running in the least amount of time possible.

How This Book Is Organized

This book contains five major parts. Each part contains several chapters, and each chapter contains several sections. You can read the book from start to finish if you like, or you can dive in whenever you need help on a particular topic. (If you’re brand-new to JavaScript, however, skimming through Part I first sure couldn’t hurt.) Here’s a breakdown of what you can find in each of the five parts.

Part I: Building Killer Web Pages for Fun and Profit

This part explains how to turn JavaScript from an abstract concept to some­thing happening on the screen in front of you. It takes you step by step through obtaining your choice of Netscape Navigator or Microsoft Internet Explorer, discovering how to access and modify the document object model, and writing and testing your first script. Part I also includes an overview of the JavaScript language itself.

Part II: Creating Dynamic Web Pages

In this part, I demonstrate practical ways to create Web pages that appear differently to different users. By the time you finish Part II, you’ll have seen sample code for such common applications as detecting your users’ browsers on-the-fly, formatting and displaying times and dates, and storing information for repeat visitors by using cookies.

Part III: Making Your Site Easy for Visitors to Navigate and Use

The chapters in Part III are devoted to helping you create Web pages that visi­tors can interact with easily and efficiently. You find out how to use JavaScript’s event model and function declaration support to create hot buttons, clickable images, mouse rollovers, and intelligent (automatically validated) HTML forms.

Part IV: Interacting with Users

JavaScript is evolving by leaps and bounds, and Part IV keeps you up-to-date with the latest and greatest feats you can accomplish with JavaScript, including brand-new support for dynamic HTML and cascading style sheets. In this part you also find a double handful of the most popular JavaScript and DHTML effects, including pull-down menus, expandable site maps, and custom tooltips.

Part V: The Part of Tens

The concluding part pulls together tidbits from the rest of the book, organized in lists of ten. The categories include great JavaScript-related online resources, common mistakes, and debugging tips.

Part VI: Appendixes

At the back of the book you find a handful of indispensable references, includ­ing JavaScript reserved words, color values, document objects, and special characters. There’s also a nifty how-to section that describes all the cool tools you find on the companion CD.
Read comments for more

Saturday, December 8, 2007

1

Deploying secure wireles Networks with windows

How This Book Is Structured


Deploying Secure 802.11 Wireless Networks with Microsoft Windows is structured to provide a conceptual overview of not only wireless networking but also all the other components of the authentication infrastructure such as Remote Authentication Dial-In User Service (RADIUS) and certificates. Many companies have not implemented RADIUS or a public key infrastructure (PKI), so this book takes the time to explain them in detail and how they apply to the authentication and authorization of wireless connections. It then describes the steps of deploying secure wireless connections using certificate and password-based authentication in a large organization as well as SOHO and public access wireless networks. Finally, it describes how to troubleshoot wireless problems from the wireless client, the wireless AP, and the authentication infrastructure.

Part I, “Wireless Network Technology and Components,” provides an introduction to the various elements of secure wireless networking. To understand how to deploy and troubleshoot a secure wireless network, you must have an understanding of the underlying technologies and how they work. These technologies include 802.11 wireless LAN networking, wireless security, the various Windows wireless clients, and the elements of the authentication infrastructure. This background is provided in Part I, which includes the following chapters:

Chapter 1, “IEEE 802.11 Overview,” briefly describes the advantages of wireless LAN networking and then describes the IEEE 802.11 standards including 802.11b, 802.11a, and 802.11g; components of wireless networking; and operating modes.

Chapter 2, “Wireless Security,” provides an overview of how authentication, confidentiality (encryption), and data integrity are supported with both the original 802.11 standard and the new Wi-Fi Protected Access (WPA) standard. Authentication with the 802.1X standard is also discussed.

Chapter 3, “Windows Wireless Client Support,” details the support for wireless networks provided in Windows XP (prior to Service Pack 1 [SP1]), Windows XP SP1 and later, Windows Server 2003, and Windows 2000 (with Microsoft 802.1X Authentication Client). The Wireless Zero Configuration (WZC) service and the set of configuration dialog boxes for each operating system are described in detail. This chapter also discusses the manual configuration of wireless settings and the automated configuration using the Wireless Network (IEEE 802.11) Policies Group Policy extension.

Chapter 4, “RADIUS, IAS, and Active Directory,” presents a detailed look at Remote Authentication Dial-In User Service (RADIUS), a protocol and infrastructure for providing authentication, authorization, and accounting for network connections. Internet Authentication Service (IAS) is the Microsoft implementation of a RADIUS server and proxy. This chapter describes the configuration dialog boxes for IAS global settings, remote access policies, and connection request policies. Finally, this chapter presents an overview of the Active Directory directory service and how user accounts, computer accounts, and groups are used to provide wireless access.

Chapter 5, “EAP,” details the Extensible Authentication Protocol (EAP) and its support in Windows for secure authentication of wireless access. This chapter provides detailed explanations of EAP-Transport Layer Security (EAP- TLS) and Protected EAP-Microsoft Challenge Handshake Authentication Protocol version 2 (PEAP-MS-CHAP v2) with their corresponding client and server-side configuration dialog boxes in Windows.

Chapter 6, “Certificates and Public Key Infrastructure,” presents an overview of public key encryption and the role of certificates in providing authentication. This chapter includes discussions of PKI, certification authorities, certification hierarchies, certificate revocation and validation, and how Windows supports certificates using the Certificates snap-in and Certificate Services. This chapter also details the various methods of obtaining a user or computer certificate on a Windows wireless client or an IAS server.

After you understand the basic concepts and components of secure wireless networking, the next step is to begin the planning and deployment of secure wireless connectivity in your organization. Part II, “Wireless Network Deployment,” provides you with the information you need to plan and deploy your secure wireless network solution. Part II includes the following chapters:

Chapter 7, “Wireless AP Placement,” includes wireless LAN design guidelines such as wireless access point (AP) requirements, signal propagation modifiers and sources of interference, and the number of wireless APs needed. This chapter then gives you step-by-step instructions on how to deploy your wireless APs to provide adequate coverage for all desired areas.

Chapter 8, “Intranet Wireless Deployment Using EAP-TLS,” provides detailed step-by-step instructions on how to deploy the authentication infrastructure (PKI, Active Directory, and IAS) and wireless clients for EAP- TLS authentication.

Chapter 9, “Case Study: The Microsoft Wireless Network,” details the history, design and deployment considerations, and phases of the deployment of the wireless network that is in place at the Microsoft Corporation. This chapter also provides details on the authentication infrastructure, including domains, PKI, and IAS RADIUS proxies and servers.

Chapter 10, “Intranet Wireless Deployment Using PEAP-MS-CHAP v2,” provides detailed step-by-step instructions on how to deploy the authentication infrastructure (certificates, Active Directory, and IAS) and wireless clients for PEAP-MS-CHAP v2 authentication.

Chapter 11, “Additional Intranet Wireless Deployment Configurations,” details the following additional wireless configurations: Internet access for business partners, cross-forest authentication, using RADIUS proxies to scale authentications, and using both EAP-TLS and PEAP-MS-CHAP v2 authentication.

Chapter 12, “Secure Wireless Networks for the Home and Small Business,” provides detailed step-by-step instructions on how to deploy a secure wireless network in a SOHO using either infrastructure mode or ad hoc mode, and either Wired Equivalent Privacy (WEP) or WPA.

Chapter 13, “RADIUS Infrastructure for Public Place Deployment,” details the configuration of RADIUS proxies and servers for a wireless Internet service provider (WISP) that is offering public wireless access to its own customers or wireless users that have a benefactor (another telecommunications provider or a private organization).

After you deploy secure wireless networking, you must know how to troubleshoot the common problems with obtaining wireless connectivity. Part III, “Troubleshooting Wireless Networks,” includes the following chapters:

Chapter 14, “Troubleshooting the Windows Wireless Client,” describes the troubleshooting tools available to gather troubleshooting information on a Windows wireless client and provides a discussion of common connectivity and authentication problems that can be solved from the Windows wireless client.

Chapter 15, “Troubleshooting the Wireless AP,” describes the typical troubleshooting tools provided with wireless APs to gather troubleshooting information and discusses common connectivity and authentication problems that can be solved from the wireless AP.

Chapter 16, “Troubleshooting the Authentication Infrastructure,” describes the troubleshooting tools provided with Windows to gather troubleshooting information for IAS and discusses IAS-authentication, certificate-validation, and password-validation problems that can be solved from the authentication infrastructure.

Part IV, “Appendixes,” includes the following:

Appendix A, “Wireless Deployment Best Practices,” is a single location for the best practices for all the elements of a secure wireless deployment, as described in Chapters 1–16.

Appendix B, “Wireless ISPs and Windows Provisioning Services,” is a brief overview of the upcoming Wireless Provisioning Services update for Windows XP wireless clients, which attempts to solve various security, automated configuration, and consistency issues that WISPs and public wireless users now have to face.

Appendix C, “Setting Up Secure Wireless Access in a Test Lab,” provides detailed step-by-step instructions on how to configure secure wireless access using IEEE 802.1X and PEAP-MS-CHAP v2 and EAP-TLS authentication in a test lab using a wireless AP and four computers.

Conventions Used in This Book

Throughout the book, you will find special sections set aside from the main text. These sections draw your attention to topics of special interest and importance or to problems that implementers invariably face during the course of a deployment. These features include the following:

Note This feature is used to underscore the importance of a specific concept or to highlight a special case that might apply only to certain situations.

More Info When additional material is available on a subject, whether in other sections in the book or from outside sources such as Web sites or white papers, the links to these extra sources are provided in the More Info features.

Caution The Caution feature points out the places where you can get yourself into trouble if you do something or fail to do something. Pay close attention to these sections because they could save you a great deal of aggravation.

Tip This feature directs your attention to advice on timesaving or strategic moves.

Best Practices Getting the most stable performance and the highest quality deployment often means knowing a few ins and outs. The Best Practices features are where you’ll find such pieces of knowledge.

Planning There are times when an ounce of prevention through planning is worth many hours of troubleshooting and downtime. Such times merit the Planning feature.


Table Of Contents

Introduction

Part I - Wireless Network Technology and Components

Chapter 1 - IEEE 802.11 Overview
Chapter 2 - Wireless Security
Chapter 3 - Windows Wireless Client Support
Chapter 4 - RADIUS, IAS, and Active Directory
Chapter 5 - EAP
Chapter 6 - Certificates and Public Key Infrastructure

Part II - Wireless Network Deployment

Chapter 7 - Wireless AP Placement
Chapter 8 - Intranet Wireless Deployment Using EAP-TLS
Chapter 9 - Case Study: The Microsoft Wireless Network
Chapter 10 - Intranet Wireless Deployment Using PEAP-MS-CHAP v2
Chapter 11 - Additional Intranet Wireless Deployment Configurations
Chapter 12 - Secure Wireless Networks for the Home and Small Business
Chapter 13 - RADIUS Infrastructure for Public Place Deployment
Chapter 14 - Troubleshooting the Windows Wireless Client

Part III - Troubleshooting Wireless Networks

Chapter 15 - Troubleshooting the Wireless AP
Chapter 16 - Troubleshooting the Authentication Infrastructure

Part IV - Appendixes

Appendix A - Wireless Deployment Best Practices
Appendix B - Wireless ISPs and Windows Provisioning Services
Appendix C - Setting Up Secure Wireless Access in a Test Lab
Index
List of Figures
List of Tables
List of Sidebars
Read comments

2

Windows XP All in one desk referance

Contents at a Glance


Book I: A Windows XP Overview

Chapter 1: Introducing Windows XP
Chapter 2: A Windows XP Orientation.
Chapter 3: Running Windows from Start to Finish
Chapter 4: Getting Help with Windows XP
Chapter 5: Searching Your Machine and Beyond
Chapter 6: Getting the Basic Stuff Done
Chapter 7: Maintaining Your System
Chapter 8: Focusing on Windows XP/Professional

Book II: Customizing Your Windows eXPerience

Chapter 1: Personalizing Your Desktop
Chapter 2: Organizing Your Windows XP Interface
Chapter 3: Lock Down: Spies, Spams, Scams, and Slams
Chapter 4: Security Center: Windows Firewall
Chapter 5: Security Center: Automatic Updates
Chapter 6: Security Center: Virus Protection

Book III: Windows XP and the Internet

Chapter 1: Expanding Your Reach through the Internet
Chapter 2: Connecting to the Internet
Chapter 3: Managing E-Mail and Newsgroups with Outlook Express
Chapter 4: Chatting with Windows Messenger
Book IV: Adventures with Internet Explorer

Chapter 1: Finding Your Way around the Internet Explorer Window .
Chapter 2: Advanced Browsing and Searching with Internet Explorer
Chapter 3: Making Internet Explorer Your Own
Book V: Connecting with Microsoft Network
Chapter 1: MSN: Who Needs Ya, Baby?
Chapter 2: MSN Explorer
Chapter 3: Taking MSN Explorer for a Spin
Chapter 4: Hotmail (a.k.a. MSN E-Mail)
Chapter 5: MSN Messenger

Book VI: Adding and Using Other Hardware

Chapter 1: Finding and Installing the Hardware You Want
Chapter 2: Working with Printers
Chapter 3: Getting the Scoop on Scanners

Book VII: Joining the Multimedia Mix

Chapter 1: Jammin’ with Windows Media Player
Chapter 2: Lights! Action! Windows Movie Maker
Chapter 3: Discovering Digital Cameras and Recorders

Book VIII: Windows Media Center

Chapter 1: Windows Media Center: Should You Buy One? .
Chapter 2: Setting Up a Media Center PC
Chapter 3: Running Windows Media Center

Book IX: Setting Up a Network with Windows XP

Chapter 1: Those Pesky Network Things You Have to Know
Chapter 2: Building Your Network
Chapter 3: Putting the Why in Wi-Fi
Chapter 4: Protecting Your Privacy

About This Book

Windows XP All-in-One Desk Reference For Dummies, 2nd Edition, takes you through the Land of the Dummies — with introductory material and stuff your grandmother could (and should!) understand — and then continues the journey into more advanced areas, where you can really put Windows to work every day. I don’t dwell on technical mumbo-jumbo, and I keep the baf­fling jargon to a minimum. At the same time, though, I tackle the tough prob­lems you’re likely to encounter, show you the major road signs, and give you a lot of help where you’ll need it the most.extensions by default, but you can and should go in and change that. Yeah, I know that Bill G. hisself made the decision to hide them, and he won’t back off. (At least, that’s the rumor.)
I also know that hundreds — probably thousands — of Microsoft employees passed along the ILOVEYOU virus, primarily because they couldn’t see the filename extension that would’ve warned them that the file was a virus. Uh, bad decision, Bill.

(If you haven’t yet told Windows XP to show you filename extensions, take a minute now and hop to Book I, Chapter 3, and get Windows XP to dance to your tune.)
Read comments

Friday, December 7, 2007

1

Wireless Networking: Preventing a Data Disaster


Introduction

Welcome to Caution! Wireless Networking: Preventing a Data Disaster. Wireless networking is quickly replacing Ethernet networks in many of our homes and offices. The pace of adoption of Wi-Fi technology has been remarkably quick, primarily because wireless networking equipment is easy to set up and use. In fact, in most cases it’s less complicated than setting up an Ethernet network.

Unfortunately, the downside to user-friendly Wi-Fi gear is that the majority of people setting up wireless networks in their homes or offices are not securing them correctly, if at all. Unlike Ethernet networks that require a user to be attached or plugged-into the network, Wi-Fi networks broadcast their signal in all directions, allowing anyone with a wireless adapter to access the network. If you haven’t taken the time to secure your Wi-Fi equipment, you may be sharing your files and Internet connection with your neighbors, or worse, hackers.

There are plenty of wireless books available that address basic wireless networking or the setup of specific products. In this book, I focus on the security and safety consequences of using these devices and try to explain these issues in a manner that’s helpful to new and intermediate wireless users.

I won’t discuss specific brands or provide step-by-step instruction for setting up your access point or router; my goal is to illuminate you about the risks associated with your new wireless equipment and provide some solutions for improving the security on your network. Using this book you’ll learn the following things:

How TCP/IP networks work

How Wi-Fi networks operate

Why wireless technology is insecure

How you are vulnerable

How you can protect your computer and networks

Once you have a basic understanding of the topics covered in this book, I hope you’ll be interested enough to learn more about them. Continued education is one of the most important things that you can do to maintain security of your computer and network.

Whom This Book is For

If you’re an average computer user — beginning or intermediate — and you’ve recently installed your own wireless network, then this book is for you. You don’t need to be a technical guru to benefit from the information I’ve presented inside this book. While a general knowledge of computing and familiarity with basic networking and Internet concepts is desirable, Part I provides an intro to networking that will have you up to speed in no time.

This book is for beginning or intermediate computer users who need a better understanding of the security issues surrounding wireless networks, and how to address them on their own network before they become a victim.

How This Book Is Organized

I’ve divided this book into two parts; each part includes chapters that address a common topic. If you’re relatively new to networking or only have a passing familiarity with TCP/IP and wireless security, I suggest you start in Part I and read the book in order. If you’re in a hurry or concerned that your network may be compromised, you can skip ahead and return to the earlier material later. Here’s how the parts are organized:

Part I: Understanding the Threat —

Part I introduces wireless technology and basic TCP/IP networking. It introduces the security and safety problems associated with wireless networks and with networking in general.

Part II: Protecting Yourself —

In Part II, I discuss the steps you can take to secure your network, protect your equipment from viruses, protect and recover your data, and maintain your privacy. If you’re concerned that your network is not secure, and you already have a grasp of the issues presented in Part I, you can start here.

Appendixes —

The appendixes provide useful resources relating to wireless networks. I’ve also included a glossary of many of the terms I’ve used in this book.

It’s my goal to acquaint you with wireless technology and the related security issues so that you’ll be encouraged to pursue more information and improve your computing knowledge. Wireless networks are here to stay, and I want you to get the most out of them without leaving yourself vulnerable.

Special features and icons

At the beginning of each chapter, you’ll find a short list of the broad topics covered therein. Throughout the text, you’ll encounter icons that I’ve used to bring different topics to your attention. Here’s what each of these icons indicates:

Note Note icons provide important related information about a subject.

On The Web The On the Web icon provides addresses to online resources about a topic.

Caution If I use the Caution icon, I’m warning you about something dangerous where you need to be particularly diligent. I don’t use this icon often, but if you see it please pay close attention to the information.

Cross-Reference The Cross-Reference icon directs you to related information elsewhere in the book.


I hope you find this book useful and informative and that it educates you about wireless networking and security and assists you in securing your wireless network.

Read comments

2

Windows XP Timesaving Techniques

About This Book


Microsoft says that Windows XP contains 50,000,000 lines of program­ming code. 400,000,000 PCs run Windows. Half of them use Windows XP, and roughly half of them run Service Pack 2. Heaven only knows how many people have used Windows. Nobody — absolutely nobody — understands more than a tiny part of Windows XP. Yet everybody — everybody outside of an ashram, anyway — has to come to grips with it.

Not an easy task, eh?

Windows XP Timesaving Techniques For Dummies concentrates on high-payoff techniques that save you time. These techniques make Windows work faster, more reliably, and more like the way you work, day in and day out. Use these techniques to spend less time spluttering and futzing with your machine.

What’s in This Book

To save you time, I organized this book into techniques — groups of related tasks that make you or your computer (or possibly both!) more efficient and effective. Some techniques are short ’n’ sweet, tackle one specific topic, and get you in and out of the machine in record time. Other techniques are more involved and explore the pros and cons of vari­ous options.

Wherever an important ancillary topic, shorter tip, or loosely related timesaver may be of use, I include it. Watch for the icons. They can save you gobs of time. And don’t be surprised if you bump into a tip or two that urges you to change the way you work, as opposed to simply making changes to your computer.

This book is laid out in a unique, easy-to-read two-column format full of figures and other visual cues that make it easier for you to scan and jump into a technique at the point most appropriate for your cir­cumstances. Linear thinking is good. Nonlinear scan­ning is better. Lay the book flat so you can see exactly what you’re doing without flipping a bunch of pages (and tearing your hair out in the process).

You can read the book from front to back, or you can dive right into the technique of your choice. Either way works just fine. Anytime a concept is mentioned that isn’t covered in depth in that technique, you’ll find a cross-reference to another technique to find out more. If you’re looking for something specific, check out either the table of contents or the index.

The Cheat Sheet at the beginning of the book lists my choices as the most important timesaving tech­niques. Tear it out, tape it to your monitor, pass it around to other folks at the office, and be sure to tell ’em Woody shares their pain.

All Gaul may have been divided into three parts, but this book needs eleven (a particularly, uh, galling admission). Here’s what you’ll find.

Part I: No-Bull Installation and Setup

If you haven’t yet set up Windows XP, or if you’re still in the process of getting adjusted to Service Pack 2, this is the place to start. In addition to advice that gets you up and running in no time, I cover the rarely discussed aspects of product registration, retrieving your product key, and installing a legiti­mate copy of Windows over the top of a pirate copy — without losing all your settings or wiping out your hard drive.

Part II: Making Windows Lean and Clean

Fine-tune Windows so that it helps you work faster. Here you can decide which desktop settings really make a difference and which ones don’t. I also show you how to train Windows to respond to your needs. You find out how to transfer your old settings to a new PC, activate Passport without divulging your personal information, set up (or avoid) ClearType, “brand” your laptop computer to deter theft and identify you as its owner if it somehow gets lost, make your PC turn itself off when you shut down Windows, and how to switch users in the blink of an eye.
Part III: Convincing Windows to Work Your Way You discover how to launch your most frequently used programs quickly — both on the Windows taskbar and by using hot keys, including hot keys that you build yourself.

I also show you how to take good care of your data. Discover quick file management techniques, such as renaming a group of files en masse, finding files quickly and effectively (and getting rid of Rover the Search Companion in the bargain), printing a list of files in a folder with a click, and much more.

Part IV: Making the Most of Internet and E-Mail

Take back control of the World Wide Timesink. You can find out about configuring and customizing Internet Explorer (including zapping pop-up, pop-over, and pop-under ads for good), controlling cook­ies to reduce spam, taking control of Windows/MSN Messenger so everybody and their brothers don’t bother you when you’re online, and keeping Outlook Express running like a dream. I help you set up Trillian, so you can run instant messaging with any­one, anytime. I also show you how to make the most of Google. And if you’ve got kids, this is the part where I show you how to protect them online.

Part V: Optimizing Your Musical Entertainment

A surprising number of pitfalls await the unfortu­nate. Here’s how to avoid them. Get no-nonsense, person-to-person music gathering techniques; rec­ommendations for buying music; and inside tips on ripping and burning. Customize Windows Media Player 10 and manipulate playlists, create your own music CDs, transfer music to players and other PCs, and tune in to WMP radio. Yes, the free radio is still there, if you know where to find it.

Part VI: Having Fun and Saving Time with Visual Media

Video and pictures take time to handle, but they’re such fun. So here’s how to spend less time while hav­ing more fun. Take snapshots and record videos with a Webcam, edit your home movies, manage digital pictures, and decrease picture download times. Ever wonder how to retrieve pictures that you accidentally

deleted from your camera? The answer’s here. You can also find techniques for printing pictures and using your scanner effectively.

Part VII: Ensuring Peak Network Performance

These days, everyone’s networked, or so it seems. But how efficient is your network? Here you can find out how to get the most out of your peer-to-peer net­work, get home and small office network installation tips, find out the best way to share one Internet con­nection among several machines, and add (and con­figure) new network users.

If you’re looking for help installing a wireless net­work, look no further. I take you through the fastest way to set up your network — and, far more impor­tantly, secure it. I also tell you the whole story — the real story — behind Windows XP Simple File Sharing. It isn’t as simple (or as secure) as you think.

Part VIII: Fast Security Techniques

This part contains full behind-the-scenes coverage of the Windows Security Center, new in Service Pack 2. It gives you common-sense approaches to solving the rabidly hyped problem of computer security. Protect your PC from real viruses; conduct fast, easy, and safe online shopping transactions; and thwart intruders with a firewall. Best of all, I show you how to put an icon on your desktop that will “lock down” your system in a split-second. If you need to set up and monitor your security perimeter, look no further.

Part IX: Keeping Your PC Alive

An ounce of prevention is worth a ton of painful cures. Here you can discover how to run periodic maintenance automatically while you’re off lounging somewhere (or meeting some insane deadline). I show you how to decide how much maintenance is enough and how to determine when to run mainte­nance checks so that your workflow isn’t affected.And what about keeping Windows up to date? I show you why I don’t trust Microsoft to update my PCs automatically. Decide which updates are critical and which ones can wait, get Remote Assistance and other forms of help, and make backups without a problem.

Part X: Fast (Nearly Painless) Disaster Recovery

Has Windows gone to Hades in a handbasket? Again? Here are the tricks you need to try in down-to-earth language. Find out how to survive (and per­manently stop) the dreaded Blue Screen of Death. Find out how to get your PC to boot when it doesn’t want to, restore your system to its pre-calamitous condition, and recover lost passwords. It ain’t pretty, but sometimes you have to take the Windows bull by the horns.

Part XI: The Scary (Or Fun!) Stuff

Most of the techniques in the first ten parts are pretty straightforward. In Part XI, I take you deep into the belly of Windows XP. Find out how to make changes to the Registry without getting burned, and go through three of my favorite Registry tweaks that aren’t covered by Microsoft’s programs. I also show you how to use Program Compatibility Mode when you absolutely, positively have to get an old program to work.

Read comments for more

Thursday, December 6, 2007

1

Building Wireless Community Networks,

Building Wireless Community Networks is about getting people online using wireless network technology. The 802.11b standard (also known as WiFi) makes it possible to network towns, schools, neighborhoods, small business, and almost any kind of organization. All that's required is a willingness to cooperate and share resources. The first edition of this book helped thousands of people engage in community networking activities. This revised and expanded edition adds coverage on new network monitoring tools and techniques, regulations affecting wireless deployment, and IP network administration, including DNS and IP Tunneling.

New in This Edition

The most important addition to this book is the inclusion of Tim Pozar's excellent paper, "Regulations Affecting 802.11 Deployment." Tim is a microwave communications engineer and ham radio operator, and he has done terrific work in exploring the labyrinthine FCC Part 15 regulations. His paper helps us all to understand exactly what is required to operate wireless equipment legally in the United States.

I will also take a look at relevant technologies that have recently entered the wireless networking world, including 802.11a, 802.11g, and 802.1x. While 802.11b is still widely regarded as the champion technology of the community wireless networking effort, these newer technologies are poised to bring interesting new capabilities to networking projects everywhere.
In addition, I discuss a number of fun new home-brew equipment and software designs that have come to light, and evaluate some new security tools (and challenges). In particular, the Host AP driver has graduated to near-production quality, and can provide a very flexible alternative to traditional APs. More on that later.

Organization

Early chapters of this book introduce basic wireless concepts and essential network services, while later chapters focus on specific aspects of building your own wireless network. Experienced users may prefer to skip around rather than read this book from cover to cover, so here's an overview of each chapter:

Chapter 1

gives a brief history of the state of wireless connectivity, and some ideas (and warnings) about how things might proceed.

Chapter 2

is an overview of many important logistical considerations you will face in designing your own network, and describes some tools that may make your job easier.

Chapter 3,

provides a detailed description of critical network components that you will need to provide your users. Network design and security considerations are also addressed.

Chapter 4,

details how to use Wireless Access Point hardware effectively in your networking project.

Chapter 5,

is a step-by-step guide to building your own Access Point using Linux, inexpensive PC hardware, and conventional wireless client cards.

Chapter 6,

is about extending your range. It looks at using topographic mapping software to evaluate long distance links, and examines the myriad antennas, cables, connectors you are likely to encounter. It also provides a simple method for calculating the usable range of your gear.

Chapter 7,

investigates some really exotic (and useful!) applications of 802.11b. It includes practical pointers for setting up point-to-point links, some simple repeaters, assembling a 2.4GHz antenna from ordinary household objects, and lots of other fun hackery. We'll also see an implementation of a dynamic "captive portal" firewall using open source (http://www.opensource.org) software.

Chapter 8,

is a resource guide to some of the major players in the wireless network access revolution. Here you'll find out how people all over the globe are making ubiquitous wireless network access a reality, all in their free time.

Chapter 9,

is the (brief) history of my own experiences in setting up a wireless community network in Sebastopol, CA (and in meeting directly with the heads of some of the biggest community efforts in the U.S.).

Appendix A contains Tim Pozar's paper, "Regulations Affecting 802.11 Deployment."
Appendix B provides a path loss calculation table.
Appendix Coffers a shell script that makes network scheme management easier.
Read comments for more

1

Javascript

Introduction from the Author

Welcome to the wonderful world of Web programming with JavaScript. If you’ve worked with HTML before but want to add more flexibility and punch to your pages, or even if you’ve never written a stick of code in your life but are eager to hop on the Infobahn-wagon, this book’s for you.

Although I don’t assume that you know HTML, much of what you want to do with JavaScript is interact with objects created by using HTML — so you understand the examples in this book that much quicker if you have a good HTML reference handy. One to consider is HTML 4 For Dummies, 4th Edition, by Ed Tittel (Wiley Publishing, Inc.).

I do my best to describe how JavaScript works by using real-world examples — and not a foo (bar) in sight. When explaining things in formal notation makes sense, I do that, but not without a recap in plain English. Most importantly, I include tons of sample programs that illustrate the kinds of things you may want to do in your own pages.

Along with this book comes a companion CD-ROM. This CD-ROM contains all the sample code listings covered in the text along with many other interesting scripts, examples, and development tools. From experience, I can tell you that the best way to get familiar with JavaScript is to load the scripts and interact with them as you read through each chapter. If it’s feasible for you, I suggest installing the contents of the CD right away, before you dig into the chapters. Then, when you come across a listing in the book, all you have to do is double­click on the corresponding HTML file you’ve already installed. Doing so helps reinforce your understanding of each JavaScript concept described in this book. For more information and instructions on installing the CD-ROM, see the About the CD appendix in the back of this book.

Think of this book as a good friend who started at the beginning, learned the ropes the hard way, and now wants to help you get up to speed. In this book, you can find everything from JavaScript basics and common pitfalls to answers to embarrassingly silly questions (and some really cool tricks, too), all of which I explain from a first-time JavaScript programmer’s point of view. Although you don’t find explanations of HTML in this book, you do find working examples on the companion CD complete with all the HTML you need to understand how JavaScript works.

Some sample topics you can find in this book are:

* Creating interactive Web pages
* Validating user input with JavaScript
* Testing and debugging your JavaScript scripts
* Adapting your scripts for cross-browser issues
* Integrating JavaScript with other technologies, such as Java applets, Netscape plug-ins, and ActiveX components

Building intelligent Web pages with JavaScript can be overwhelming — if you let it. You can do so much with JavaScript! To keep the deluge to a minimum, this book concentrates on the practical considerations you need to get your interactive pages up and running in the least amount of time possible.

What You’re Not to Read

Okay, you can read the text next to the Technical Stuff icons, but you don’t have to understand what’s going on! Technical Stuff icons point out in-depth information that explains why things work as they do (interesting if you’re in the mood, but not necessary to get the most out of the JavaScript examples I present).

How This Book Is Organized

This book contains five major parts. Each part contains several chapters, and each chapter contains several sections. You can read the book from start to finish if you like, or you can dive in whenever you need help on a particular topic. (If you’re brand-new to JavaScript, however, skimming through Part I first sure couldn’t hurt.) Here’s a breakdown of what you can find in each of the five parts.

Part I: Building Killer Web Pages for Fun and Profit

This part explains how to turn JavaScript from an abstract concept to some­thing happening on the screen in front of you. It takes you step by step through obtaining your choice of Netscape Navigator or Microsoft Internet Explorer, discovering how to access and modify the document object model, and writing and testing your first script. Part I also includes an overview of the JavaScript language itself.

Part II: Creating Dynamic Web Pages

In this part, I demonstrate practical ways to create Web pages that appear differently to different users. By the time you finish Part II, you’ll have seen sample code for such common applications as detecting your users’ browsers on-the-fly, formatting and displaying times and dates, and storing information for repeat visitors by using cookies.Part III: Making Your Site Easy for Visitors to Navigate and Use

The chapters in Part III are devoted to helping you create Web pages that visi­tors can interact with easily and efficiently. You find out how to use JavaScript’s event model and function declaration support to create hot buttons, clickable images, mouse rollovers, and intelligent (automatically validated) HTML forms.

Part IV: Interacting with Users

JavaScript is evolving by leaps and bounds, and Part IV keeps you up-to-date with the latest and greatest feats you can accomplish with JavaScript, including brand-new support for dynamic HTML and cascading style sheets. In this part you also find a double handful of the most popular JavaScript and DHTML effects, including pull-down menus, expandable site maps, and custom tooltips.

Part V: The Part of Tens

The concluding part pulls together tidbits from the rest of the book, organized in lists of ten. The categories include great JavaScript-related online resources, common mistakes, and debugging tips.

Part VI: Appendixes

At the back of the book you find a handful of indispensable references, includ­ing JavaScript reserved words, color values, document objects, and special characters. There’s also a nifty how-to section that describes all the cool tools you find on the companion CD.
Read comments for more information

Monday, December 3, 2007

1

Absolute Beginner Guide to WiFi

Introduction


Absolute Beginner's Guide to Wi-Fi is a book for beginners who want to join the Wi-Fi revolution. Using easy-to-understand language, this book teaches you all you need to know about Wi-Fi, from choosing the Wi-Fi system that is right for you to adding a Wi-Fi card and related software to finding hotspots and access points. With the help of this book, you will be able to configure a home network and share internet connections quickly and easily. In addition, the book covers all important security issues so that a user is less exposed to threats, as well as the dos and don'ts of traveling with a Wi-Fi enabled laptop.

About the Author

Harold Davis is a strategic technology consultant, hands-on programmer, and the author of many well-known books. He has been a popular speaker at trade shows and conventions, giving presentations on topics ranging from digital photography through wireless networking and programming methodologies.

Harold has served as a technology consultant for many important businesses, including investment funds, technology companies, and Fortune 500 corporations. In recent years, he has been Vice President of Strategic Development at YellowGiant Corporation, Chief Technology Officer at an expert systems company, a Technical Director at Vignette Corporation, and a principal in the e-commerce practice at Informix Software.

Harold started programming when he was a child. He has worked in many languages and environments, and has been lead programmer and/or architect in projects for many corporations, including Chase Manhattan Bank, Nike, and Viacom.

He has earned a Bachelor's Degree in Computer Science and Mathematics from New York University and a J.D. from Rutgers Law School, where he was a member of the law review.

Harold lives with his wife, Phyllis Davis, who is also an author, and their two sons, Julian and Nicholas, in the hills of Berkeley, California. In his spare time, he enjoys hiking, gardening, and collecting antique machines including typewriters and calculation devices. He maintains a Wi-Fi access point and a mixed wired and wireless network for the Davis menagerie of computers running almost every imaginable operating system.

Introduction by the Author

If you are new to Wi-Fi—wireless networking—I'd like to be your guide to this wonderful technology. I am no industry flak or starry-eyed gadget freak (although I do appreciate technology that makes life easier for people, like Wi-Fi).

I want to be your guide to Wi-Fi, so it is fair for you to ask (and me to answer) some questions:

  • What are my qualifications?

  • What is my approach?

  • Who is this book for, and why an "Absolute Beginner's Guide?"

I'd like to start with my qualifications. I take qualifications in this context to be a pretty broad issue, meaning (in part) who am I?

I am a normal human being, whatever that means, who is interested in technology (among other things). I have a wife, two kids, another one on the way, and a house with a mortgage. Besides my interest in technology, I like to read, write, garden, take photographs, and hike.

I've been involved in technology as a professional for more than 20 years. (Because technology years actually compare with dog years, that probably is the equivalent of hundreds of experiential years!) I've seen technologies come on strong, grow up, mature, and burst like a star that has gone nova too soon. I like to think I know what is important, and what is not, and what technologies matter.

I've been involved with Wi-Fi since its infancy, and have lectured about Wi-Fi and taught people how to construct Wi-Fi networks. I maintain a Wi-Fi network in my home for the convenience of myself and my family. I've been a road warrior and a stay-at-home. I enjoy sharing my knowledge with people and helping them get up to speed as quickly as possible.

Well, enough about me! Perhaps you are completely new to Wi-Fi and want to quickly get up to speed so you can surf at local hotspots, or while you're on the road. This book will give you the practical information you need to buy the right equipment, get your equipment working perfectly, find Wi-Fi hotspots, and get the best deal with Wi-Fi providers.

Perhaps you already use Wi-Fi in your local coffee shop, at the airport, or in hotel lobbies, and you want to set up a small office or home network. You already know how great Wi-Fi is, so you want to enjoy the benefits where you live and work. It is truly transformational to one's lifestyle to decouple computing from the wires!

If you are looking to set up a Wi-Fi network, you've come to the right place. I'll show you the best way to buy the equipment you need at the best prices, and how to set it up easily. I won't gloss over potential pitfalls, and I will save you time and money. I'll also show you some of the considerations you might want to think about if you are building a more complex network involving Wi-Fi.

Many people are looking to find out how to use Wi-Fi on the road, or in networks at home. An Absolute Beginner's Guide provides the perfect format for easily learning what you need to know to get up to speed with Wi-Fi, without wasting a lot of time.

In this book you'll find inspiration as well as practical information. I believe that Wi-Fi is a modest technology that has the power to have a huge and positive impact. Some of the items I've included in this book speak to that transformational power. For example, you'll learn how villages in southeast Asia use Wi-Fi on the fly to connect to the world, and how Wi-Fi was used to bring wireless networking to Pitcairn Island, a romantic flyspeck in the South Pacific Ocean (remember Mutiny on the Bounty?). You'll also learn about war chalking, and find out how to locate free Wi-Fi hotspots.

This is wonderful material, and it's lots of fun! So what are you waiting for? It's time to Wi-Fi!


How This Book Is Organized

Absolute Beginner's Guide to Wi-Fi is organized into five main parts, as follows:

  • Part I, "Why Wi-Fi?" is a general introduction to the Wi-Fi technology and using Wi-Fi. This part explains why Wi-Fi is one of the fastest-growing technologies of all time and why it is important to all computer users.

  • Part II, "Setting Up Your Computer for Wi-Fi" explains how to buy a Wi-Fi–enabled computer, shows you how to set up your computers to work with Wi-Fi, and surveys some of the cool Wi-Fi gizmos and gadgets that are available.

  • Part III, "Going Mobile with Wi-Fi" shows you how to use your Wi-Fi laptop or PDA on the road, explains the best road warrior tools to bring, teaches you how to find the best places to connect, and gives you tips on making the best deal with Wi-Fi service providers.

  • Part IV, "Creating a Wi-Fi Network" explains everything you always wanted to know but were afraid to ask about successfully setting up and managing a wireless network in your home or small office.

  • Part V, "Securing Your Wi-Fi Computer and Network" explains how to safely and securely deploy Wi-Fi on the road and at home.

Besides the 19 chapters in five parts in this book, I've also provided several really useful appendixes:

  • Appendix A, "Wireless Standards" provides more details about the ins and outs of the 802.11 wireless standards.

  • Appendix B, "Finding Wi-Fi Hotspots" shows you how to find Wi-Fi hotspots, and provides specific information (which is hard to find in one place) about Wi-Fi locations such as airports, hotels, and retail stores. This appendix alone is worth the price of this book!

Because Wi-Fi rests at the intersections of a number of technologies—wireless broadcasting and computer networking, to name two—it is replete with jargon and technical terminology. To help you hack your way through this morass of incomprehensible techno-babble and acronym soup, I've also provided a complete glossary.

Taken together, the 19 chapters, two appendixes, and glossary in Absolute Beginner's Guide to Wi-Fi provide all the information you need to Wi-Fi successfully and happily!


Conventions Used in This Book

Although it is my hope that you can figure out everything in this book on your own without requiring an instruction manual, it makes sense to mention a couple of points about how information is presented in this book.

Web Addresses

There are tons of Web addresses in this book, mostly because these are places you can go for further information on a variety of related topics. Web addresses are denoted using a special font. For example:

www.wi-fiplanet.com

You should also note that in most cases I omitted the http:// with which Web addresses technically start (Web browsers insert it anyhow, so there is no need to type it).

Special Elements

This book also includes a few special elements that provide additional information not in the basic text. These elements are designed to supplement the text to make your learning faster, easier, and more efficient.

Tip

A tip is a piece of advice—a little trick, actually—that lets you use your computer more effectively or maneuver around problems or limitations.

Caution

A caution will tell you to beware of a potentially dangerous act or situation. In some cases, ignoring a caution could cause you problems—so pay attention to them!

A note is designed to provide information that is generally useful but not specifically necessary for what you're doing at the moment. Some are like extended tips—interesting, but not essential.

Read Comments For More

1

C# 2005

Introduction


The C# programming language is a powerful, relatively new descendant of the earlier C, C++, and Java languages. Programming with it is a lot of fun, as you’re about to find out in this book.

Microsoft created C# as a major part of its .NET initiative. For what are proba­bly political reasons, Microsoft turned the specifications for the C# language over to the ECMA (pronounced ek-ma) international standards committee in the summer of 2000, long before .NET was a reality. In theory, any company can come up with its own version of C# written to run on any operating system, on any machine larger than a calculator.

When the first edition of this book came out, Microsoft’s C# compiler was the only game in town, and its Visual Studio .NET suite of tools offered the only way to program C# (other than at the Windows command line). Since then, however, Visual Studio has gone through two major revisions — Visual Studio 2003 and, very recently, Visual Studio 2005. And at least two other players have entered the C# game.

It’s now possible to write and compile C# programs on a variety of Unix-based machines using either the Mono or Portable .NET implementations of .NET and C#:

*. Mono (www.go-mono.com) is an open-source software project spon­sored by Novell Corporation. Version 1.1.8 came out in June 2005. While Mono lags Microsoft’s .NET, just now implementing the 1.1 version that Microsoft released a couple of years ago, it appears to be moving fast.

*. Portable .NET, under the banner of Southern Storm Software and DotGNU (www.dotgnu.org/pnet.html), is also open-source. Portable .NET is at version 0.7.0 as of this writing.

Both Mono and Portable .NET claim to run C# programs on Windows and a variety of Unix flavors, including Linux and Apple’s Macintosh operating system. At this writing, Portable .NET reaches the greater number of flavors, while Mono boasts a more complete .NET implementation. So choosing between them can be complicated, depending on your project, your platform, and your goals. (Books about programming for these platforms are becoming available already. Check www.amazon.com.)

Open-source software is written by collaborating groups of volunteer pro­grammers and is usually free to the world.Making C# and other .NET languages portable to other operating systems is far beyond the scope of this book. But you can expect that within a few years, the C# Windows programs you discover how to write in this book will run on all sorts of hardware under all sorts of operating systems — matching the claim of Sun Microsystems’ Java language to run on any machine. That’s undoubtedly a good thing, even for Microsoft. The road to that point is still under construction, so it’s no doubt riddled with potholes and obstacles to true universal portability for C#. But it’s no longer just Microsoft’s road.

For the moment, however, Microsoft’s Visual Studio has the most mature versions of C# and .NET and the most feature-filled toolset for programming with them. If all you need is C#, I’ve included a bonus chapter called “C# on the Cheap” on the CD that accompanies this book. That chapter tells you how you can write C# code virtually for free. (You’ll be missing lots of amenities, including the nice visual design tools that Visual Studio 2005 provides, but you can write Windows code without them, especially the kind of code in this book. Bonus Chapter 5 explains how.)

Note: Two authors wrote this book, but it seemed more economical to say “I” instead of “we,” so that’s what we (I?) do throughout.

What’s New in C# 2.0

While C# version 2.0 does have a number of small changes here and there, most of C# 2.0 is still virtually the same as the previous version. The big new additions that this book covers include the following:

*. Iterator blocks: An iterator is an object that lets you step through all the items in a collection of objects. That’s always been possible, but C# 2.0 makes it far simpler to implement. Bonus Chapter 3 on the CD helps you take advantage of the simplicity and flexibility of iterator blocks. Chapter 15 covers collections.

*. Generics: This is the big one! Generic features allow you to write highly general, more flexible code. It’s a powerhouse — a programmer’s dream. Chapter 15 shows you how to write far simpler and more type-safe code using generics.
Leaving aside a few of the more esoteric and advanced additions, we’ll men­tion a few smaller items here and there as appropriate. (Don’t worry if parts of this Introduction are Greek to you. You’ll get there.)

About This Book

The goal of this book is to explain C# to you, but to write actual programs you need a specific coding environment. We’re betting that most readers will be using Microsoft Visual Studio, although we do provide alternatives. In basing the book on Visual Studio, we’ve tried to keep the Visual Studio portions to a reasonable minimum. we could just tell you, “Run your program any way you want,” but instead we may say, “Execute your C# program from Visual Studio by pressing F5.” We want you to be able to focus on the C# language and not on the mechanics of getting simple things to work.

We realize that many, if not most, readers will want to use C# to write graphi­cal Windows applications. C# is a powerful tool for programming graphical Windows applications, but that’s only one area for using C#, and this book must focus on C# as a language. We touch briefly on graphical Windows pro­grams in Chapter 1, but you should get a good grasp of C# before seeking another source to understand Windows programming in full. We also realize that some power users will be using C# to build Web-ready, distributed appli­cations; however, publishing limitations require us to draw the line some­where. C# 2005 For Dummies does not tackle the challenges of distributed programming. The book does explain quite a bit of .NET, though, for the simple reason that much of C#’s power comes from the .NET Framework class libraries that it uses.

At a minimum, you need the Common Language Runtime (CLR) before yoi can even execute the programs generated by C#. Visual Studio 2005 copie: the CLR onto your machine for you as part of the installation procedure. Alternatively, you can download the entire .NET package, including the C# compiler and many other nice tools, from Microsoft’s Web site at http:// msdn.microsoft.com. Look for the .NET Software Development Toolkit (SDK). Bonus Chapter 5 on the CD explains how to get these items.

You can still create most of the programs in this book with Visual Studio 2003, if you need to. The exceptions are those that cover the new features available only with C# 2.0, primarily generics and iterator blocks. A less-costly C# Express 2005 version of Visual Studio 2005 is also available, and don’t overlook the cheap options covered in Bonus Chapter 5 on the CD.

What You Need to Use the BookHow to Use This Book

We’ve made this book as easy to use as possible. Figuring out a new language is hard enough. Why make it any more complicated than it needs to be? The book is divided into six parts. Part I introduces you to C# programming with Visual Studio. This part guides you step by step in the creation of two differ­ent types of programs. We strongly encourage you to start here and read these two chapters in order before branching out into the other parts of the book. Even if you’ve programmed before, the basic program framework created in Part I is reused throughout the book.

The chapters in Parts II through V stand alone. We have written these chapters so that you can open the book to any one of them and start reading. If you’re new to programming, however, you will have to read Part II before you can jump ahead. But when you return to refresh your memory on some particular topic, you should have no trouble flipping to a section without the need to restart 20 pages back. Of course, the Part of Tens finishes out the lineup, and there’s more on the CD that accompanies the book.
How This Book Is Organized

Here’s a brief rundown on what you’ll find in each part of the book.

Part I: Creating Your First C# Programs

This part shows you, step by step, how to write the smallest graphical Windows application possible using the Visual Studio 2005 interface. Part I also shows you how to create the basic nongraphical C# framework that’s used in the other parts of this book.

Part II: Basic C# Programming

At the most basic level, Shakespeare’s plays are just a series of words all strung together. By the same token, 90 percent of any C# program you ever write consists of creating variables, performing arithmetic operations, and controlling the execution path through a program. This part concentrates on these core operations.
Part III: Object-Based Programming

It’s one thing to declare variables here or there and to add them and subtract them. It’s quite another thing to write real programs for real people. Part III focuses on how to organize your data to make it easier to use in creating a program.
Part IV: Object-Oriented Programming

You can organize the parts of an airplane all you want, but until you make it do something, it’s nothing more than a collection of parts. It’s not until you fire up the engines and start the wings flapping that it’s going anywhere.

In like fashion, Part IV explains how to turn a collection of data into a real object — an object that has internal members, sure, but an object that can mimic the properties of a real-world item. This part presents the essence of object-oriented programming.
Part V: Beyond Basic Classes

After the airplane gets off the ground, it has to go somewhere. Figuring out classes and the fundamentals of object-oriented programming is only a start. Part V takes the next step, introducing structures, interfaces, and generics, your gateway to more advanced object-oriented concepts — and the wild blue yonder.

Part VI: The Part of Tens

C# is great at finding errors in your programs — at times, it seems a little too good at pointing out my shortcomings. However, believe it or not, C# is trying to do you a favor. Every problem it finds is another problem that you would otherwise have to find on your own.

Unfortunately, the error messages can be confusing. One chapter in this part presents the ten most common C# build error messages, what they mean, and how the heck to get rid of them. Many readers are coming to C# from another programming language. The second chapter in The Part of Tens describes the ten major differences between C# and its progenitor, C++.

Read Comments For More

Tuesday, November 27, 2007

7

Wiley Publishing - Wireless Networks

Author’s Acknowledgments


We’d like to offer special thanks to Pat O’Brien, who started this rolling. Peter worked as the technical editor for Pat on Hacking For Dummies. Thanks for passing on Melody’s name.
Thanks to Melody Layne, acquisitions editor, for pitching the book to the edi­torial committee and getting us a contract. Much appreciated.

Thanks to Becky Huehls, who started us out on this project as editor but wisely got herself re-assigned. Thanks to Kelly Ewing for picking up the ball and running with it after Becky. Unfortunately, Kelly fumbled it, but Colleen Totz was able to struggle with it over the goal line.
Dan DiNicolo, technical editor, is commended for his diligence in reviewing the material. Thanks, Dan.

Peter would like to thank Kevin Beaver, Ken Cutler, Gerry Grindler, Ronnie Holland, Carl Jackson, Ray Kaplan, Kevin Kobelsky, Carrie Liddie, Dexter Mills Jr., and Larry Simon for responding to a request for wireless informa­tion. Thanks for answering the call for help. The provided information shows in this book.

Barry would like to thank his co-author Peter. Always a pleasure, sir. He would also like to acknowledge Craig McGuffin and John Tannahill who are always there for him, as friends and business associates , and never fail to lend a helping hand.

Introduction

Recently, a very knowledgeable speaker at a presentation for a wireless vendor talked about wireless as ubiquitous. We would have to disagree. Wireless is widespread, but it is not everywhere. But it is rapidly becoming ubiquitous.

In about 1990, cell phone users carried around a phone that looked and felt like a World War II walkie-talkie. You didn’t casually whip that baby out and start a conversation. At that time, you either had a deep wallet, a big ego, or a compelling need to talk to your mother. Now, depending on where you live in the world, the cell phone provides better quality at a lower cost — and in a much smaller form factor.

In about 1994, Wireless Local Area Network (WLAN) equipment manufacturers sold gear that was comparable to the wireless phone market. The devices were large and very expensive and provided poor bandwidth. You had to have a compelling reason to spend the money on the low bandwidth. But that has changed. In 2004, you can buy a reasonably priced laptop with onboard sup­port for 802.11b and Bluetooth. You can add a fairly inexpensive 802.11a and g PC Card and easily connect wirelessly and, if you have a Centrino-based system or Microsoft Windows XP, somewhat seamlessly. The WLAN market of today is analogous to the Ethernet market of the mid 1980s. In those years, solutions were proprietary, and standards were being approved. Companies were jockeying for position. Now, you would have difficulty finding a desktop or laptop computer that does not come with Ethernet support. When we look back from the future, we will see some parallels between 802.3 and 802.11 development.

Telephone companies have wrestled with the issue of the “last mile” for a while. But forget the last mile; Bluetooth and IrDA provide the last foot. Mice, keyboards, phones, PDAs, and other devices support Bluetooth for wire replacement. When you have a Bluetooth-enabled printer, you no longer need to hook up to the network to print one page or a contact.

Vendors are trying to get along with each other to develop standards so that one day we can walk around with a phone, PDA, or laptop and connect to any network, anywhere, anytime. We wrote this book for those of you who want to release your company f its bondage. If you want to unfetter your clients so that they can access t e-mail before getting on the red-eye to New York or Toronto, this book is you. If your desktop looks like spaghetti junction and you want to rid you of all those wires, this book is for you. If you want to provide up-to-the-m stock quotes to the Chair of your company while she sits in the boardroo this book is for you. If you have a small to medium enterprise (SME) or b ness (SMB) or a small office/home office (SOHO) and don’t want to rewir (or pay someone to rewire) your office, this book is for you. If you have w less at home and want to learn about features that you can expect for ho gear, this book is for you.

About This Book

Mark Twain once wrote, “Writing is easy. All you have to do is cross out the wrong words.” So we have done the easy part for you. We crossed ou all the wrong words and came up with this book. What are left are the wo that will help you plan for, install, acquire, protect, manage, and administ wireless networks from personal area to wide area.

We have started your journey by providing information on

*.Differentiating WPAN, WLAN, WMAN, and WWAN
*. Planning your wireless network
*.Doing a site survey
*.Using IrDA for transferring files
*.Using Bluetooth for wire replacement
*. Securing IrDA and Bluetooth
*. Acquiring the right equipment
*.Installing and configuring an access point
*.Acquiring and installing client hardware
*.Installing and configuring client software
*. Building a network to allow roaming
*.Connecting while on the go
*. Securing your WLAN
*. Understanding WEP, WPA, and RSN
*. Understanding EAP
*.Setting up a VPN using PPTP
*. Troubleshooting your network
*. Evaluating and fixing network performance
*. Using administrator software and utilities

How to Use This Book

You don’t have to start reading this book at the beginning — each chapter stands on its own, as does each and every part. In fact, if you are new to wireless networking but not new to networking, you may want to start with the radio frequency (RF) primer in Appendix C. It’s an exploration of radio frequency. We do suggest, however, that you consider starting at the begin­ning and reading to the end.

We encourage you to use the white space and the margins of this book. Mark it up and make it your own. Look up the links that we provideto find a wealth of information. You’ll want to write in the book because it will become an irre­placeable reference when you cross out words and add others yourself.

How This Book Is Organized

We grouped the chapters of this book into manageable chunks, called parts. Each part has a theme. For instance, the first part is like a handshake. We help you get started through planning and acquiring hardware and software. In between, we have some management parts. And the last part is an exchange of data.

Part I: Planning and Acquiring Your Network

Part I is the foundation required for the world of wireless networks. Chapter 1 breaks down the various types of wireless networks and provides examples of each type. If you’re trying to sell wireless within your organization, you will see some benefits of wireless you might want to use. Chapter 2 introduces the necessary planning for a successful implementation. You will see how to do a site survey. Chapter 3 sorts out more terminology and explains the differences between an ad hoc and an infrastructure network. You get the scoop on differ­entiating between BSS, IBSS, and ESS.

Part II: Implementing Your Wireless Network

Part II starts at 10 meters and moves to 100 meters and then beyond. Chapter 4 gives you an overview of IrDA and Bluetooth and security measures for both. You will understand how to use these technologies to replace wires in your office or on your body. Chapters 5 and 6 move on to wireless local area net­working. In Chapter 5, you see how to set up an access point. Chapter 6 talks about connecting Windows 2000, Windows XP, tablet PC, Linux, and Mac OS clients as well as Centrino-based systems. Chapter 7 moves you a little beyond your office through the use of bridges and switches. When you want to roam about your offices, you need to set your system up correctly. You can read how to do this in Chapter 7. Chapter 8 deals with accessing wireless wide area net­works. You will find a discussion about hot spots. But more important, you see how to get your e-mail wirelessly while on the road.

Part III: Using Your Network Securely

In Chapter 9, we introduce you to the additional risks of wireless networks — additional because you have all the risks of a wired network plus those specific to wireless. For instance, signal jamming is not a real risk in wired networks, but it is in wireless networks.

It wouldn’t be fair to just enumerate risks without providing some help. Chapter 10 provides a security architecture for your wireless network. You probably have a healthy paranoia when it comes to wireless and its security. Hopefully, Chapter 11 can allay some of your fears — and add some new ones. Chapter 12 helps you set up a secure channel because, quite frankly, who cares if WEP can be broken when you protect your data at a higher level?

Part IV: Keeping Your Network on the Air — Administration and Troubleshooting

Availability is an integral part of a network. So is administration. After we develop a network that is reliable, available, and secure, we must administer it. This includes documenting components. Chapter 13 highlights known wireless problems and practiced solutions. For instance, when you have a near/far condition, move one of the workstations closer. You’ll find pithy advice like this in Chapter 13. Chapter 14 discusses bridges and bridging technology. When you have a network, you have people complaining about connectivity

and performance. Chapter 15 provides some commonsense solutions to typi­cal wireless problems. Finally, Chapter 16 provides guidance for trying to wrap your hands (and heads) around your network. Whether you have an authorized wireless network or not, you won’t want to miss this chapter.

Part V: The Part of Tens

The Part of Tens provides top-ten that lists authors think are interesting. Our Part of Tens is no different. We provide a look at ten indispensable tools for network administrators and tinkerers alike (Chapter 17); ten ways to secure your WLAN (Chapter 18); and ten ways to use wireless in your busi­ness (Chapter 19).

Part VI: Appendixes

We also provide some valuable reference material in the Appendixes. Appendix A lists trade associations and user groups for wireless. You can find out whether there is a WUG (wireless user group) in your neighborhood. If you don’t have one, start one and send us the information. Appendix B pro­vides information on the 802 standards that you need to know for the wireless market. Appendix C, as mentioned earlier, provides the minimum necessary information that you need to set up a wireless network. If you want more infor­mation, refer to Appendixes A and B.
Read Comments for more

Would you like to get my updates directly to your mailbox? Click below to Enter your mail address

Subscribe to Books Tube


AddThis Feed Button 
Page copy protected against web site content infringement by Copyscape