Receive new posts as email.
RSS 0.91 | RSS 2.0
RDF | Atom
Podcast only feed (RSS 2.0 format)
Get an RSS reader
Get a Podcast receiver
Sun | Mon | Tues | Wed | Thurs | Fri | Sat |
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | 6 | |
7 | 8 | 9 | 10 | 11 | 12 | 13 |
14 | 15 | 16 | 17 | 18 | 19 | 20 |
21 | 22 | 23 | 24 | 25 | 26 | 27 |
28 | 29 | 30 | 31 |
This site operates as an independent editorial operation. Advertising, sponsorships, and other non-editorial materials represent the opinions and messages of their respective origins, and not of the site operator or JiWire, Inc.
Entire site and all contents except otherwise noted © Copyright 2001-2006 by Glenn Fleishman. Some images ©2006 Jupiterimages Corporation. All rights reserved. Please contact us for reprint rights. Linking is, of course, free and encouraged.
Powered by
Movable Type
This piece briefly touches on WPA2, the latest Wi-Fi security mechanism, but also looks at what some say are shortcomings in security provisions built into WiMax: Some vendors are saying that the authentication scheme built into the WiMax standard is weak. They also say that DES 3, the encryption method supported by the standard is weaker than AES, another encryption method which is supported in WPA2. Apparently Intel has submitted a proposal for including AES in WiMax. It also sounds like some vendors may hope to support strong security mechanisms as a way to differentiate their products and attract security-conscious customers.
Posted by nancyg at 2:41 PM | Comments (0) | TrackBack