Handling Rogue Access Points

Rouge Access Point

Handling Rogue Access Points – Rogue access points have become a sort of hot-button issue. Rogue access points are any wireless access points that exist on your network without the consent of the business. Even “secure” rogue access points that are connected to your network can pose a security risk. Preventing rogue access points can be a little tricky, although not impossible. Not only is it critical for you to find and remove rogue access points from your network, but it can actually be pretty fun! Rogue wireless networks have…

Read More

What Is Encryption?

What is Encryption?

What Is Encryption? – Encryption is the process of converting readable plain text into an unreadable cipher text by applying a set of complex algorithms that transform that the data into blocks or streams of random alphanumeric characters. This section deals with ciphers and various encryption algorithms such DES, AES, RC4, RC5, RC6, DSA, RSA, MD5, and SHA. Type of Encryption Cipher In cryptography, a cipher is an algorithm for performing encyption and decryption. Encipherment is the process of converting plain text into a cipher or code; the reverse process…

Read More