Tags » WEP

WEP Exploits

Wired Equivalent Privacy, (frequently mistakenly called Wireless Encryption Protocol) was invented to do exactly what its name suggested, provide wireless access to the internet with the same amount of privacy that a wired connection offered. 525 more words


Wireless Network Security - The Basics of Securing a Wireless LAN

Network Authentication ProcessThe process of a client associating and authenticating to an access point is standard. Should shared key authentication be selected at the client, there are additional packets sent confirming the keys authenticity.The following describes EAP network authentication.1. 1,055 more words


This will be my first ever blog post and that is pretty exciting, this blog will be about recording my student exchange experience in Italy and sharing it with people wanting to learn about exchange and Italy in general. 58 more words



Tested out my Ebay WEP dc power supply midway charging some 18650s. I am making a 12V power supply using 6 18650 batteries recovered from old laptop batteries. 9 more words

Whats Going On In My Life

My lovely badge

A few days ago, I participated in a WEP Challenge Holiday Celebrations Out of This World and wrote a flash fiction sci-fi story about New Year on a spaceship. 66 more words

Olga Godim

WEP December Challenge - Holiday Celebrations That Are Out of This World

The month of December brought with it a brand new writing challenge from the good folks over at WEP, and I eagerly added my name to the list of participants. 90 more words