HP 2530p - EliteBook - Core 2 Duo 2.13 GHz 사용자 설명서 - 페이지 12

{카테고리_이름} HP 2530p - EliteBook - Core 2 Duo 2.13 GHz에 대한 사용자 설명서을 온라인으로 검색하거나 PDF를 다운로드하세요. HP 2530p - EliteBook - Core 2 Duo 2.13 GHz 27 페이지. Notebook pc
HP 2530p - EliteBook - Core 2 Duo 2.13 GHz에 대해서도 마찬가지입니다: 사양 (36 페이지), 제품 설명서 (16 페이지), 사용자 설명서 (15 페이지), 네트워크 매뉴얼 (16 페이지), 사양 (2 페이지), 설정 매뉴얼 (19 페이지), 개요 (16 페이지), 매뉴얼 (12 페이지), 소프트웨어 설치 매뉴얼 (8 페이지), 매뉴얼 (6 페이지), 설정 및 구성 매뉴얼 (18 페이지), 드라이버 설치 (20 페이지), 매뉴얼 (20 페이지), 매뉴얼 (7 페이지), 사용자 설명서 (31 페이지), 사용자 설명서 (46 페이지), 사용자 설명서 (44 페이지), 사용자 설명서 (42 페이지), 사양 (45 페이지), 사용자 설명서 (30 페이지), 사용자 설명서 (24 페이지), 빠른 사양 (46 페이지)

HP 2530p - EliteBook - Core 2 Duo 2.13 GHz 사용자 설명서

Protecting your WLAN

Because the WLAN standard was designed with only limited security capabilities—basically to foil casual
eavesdropping rather than more powerful forms of attack—it is essential to understand that WLANs are
vulnerable to well-known and well-documented security weaknesses.
WLANs in public areas, or "hotspots," like coffee shops and airports may not provide any security. New
technologies are being developed by wireless manufacturers and hotspot service providers that make
the public environment more secure and anonymous. If you are concerned about the security of your
computer in a hotspot, limit your network activities to noncritical e-mail and basic Internet surfing.
When you set up a WLAN or access an existing WLAN, always enable security features to protect your
network from unauthorized access. The common security levels are Wi-Fi Protected Access (WPA) and
Wired Equivalent Privacy (WEP). Because wireless radio signals travel outside the network, other WLAN
devices can pick up unprotected signals and either connect to your network (uninvited) or capture
information being sent across it. However, you can take precautions to protect your WLAN:
Use a wireless transmitter with built-in security
Many wireless base stations, gateways, and routers provide built-in security features such as
wireless security protocols and firewalls. With the correct wireless transmitter, you can protect your
network from the most common wireless security risks.
Work behind a firewall
A firewall is a barrier that checks both data and requests for data that are sent to your network and
then discards any suspicious items. Firewalls are available in many varieties, both software and
hardware. Some networks use a combination of both types.
Use wireless encryption
A variety of sophisticated encryption protocols is available for your WLAN. Find the solution that
works best for your network security:
Wired Equivalent Privacy (WEP) is a wireless security protocol that uses a WEP key to
encode or encrypt all network data before it is transmitted. Usually, you can allow the network
to assign the WEP key. Alternatively, you can set up your own key, generate a different key,
or choose other advanced options. Without the correct key, others will not be able to use the
WLAN.
WPA (Wi-Fi Protected Access), like WEP, uses security settings to encrypt and decrypt data
that is transmitted over the network. However, instead of using one static security key for
encryptions as WEP does, WPA uses temporal key integrity protocol (TKIP) to dynamically
generate a new key for every packet. It also generates different sets of keys for each computer
on the network.
Close your network
If possible, prevent your network name (SSID) from being broadcast by the wireless transmitter.
Most networks initially broadcast the name, telling any computer nearby that your network is
available. By closing the network, other computers are less likely to know that your network exists.
NOTE:
the SSID to connect new devices to the network. Write down the SSID and store it in a secure
place before closing the network.
8
Chapter 2 Using a WLAN
If your network is closed and the SSID is not broadcast, you will need to know or remember