Discuss cracking wireless encryption.

What will be an ideal response?


Using encryption can stop casual leeching. Three types of wireless encryption are used: WEP, WPA, and WPA2. WEP and WPA cracking are very simple. Essentially, an attacker runs a sniffer program to capture packets, and then runs a program to sniff out the password or preshared key. Since WPA2 is very difficult and time-consuming to crack, it should be used before the other encryption methods.

Computer Science & Information Technology

You might also like to view...

Answer the following questions true (T) or false (F)

1. A local class and a nested class are the same thing. 2. Overloading a binary operator as a stand-alone function requires two arguments.

Computer Science & Information Technology

The _________ constant can be used to display an error message in a message dialog.

a) JOptionPane.ERROR_MESSAGE b) JOptionPane.ERROR_ICON c) JOptionPane.ERROR d) JOptionPane.ERROR_IMAGE

Computer Science & Information Technology

Running a macro in Excel deletes the entire Undo history

Indicate whether the statement is true or false

Computer Science & Information Technology

A sequential search of an n-element list takes ____ key comparisons on average to determine whether the search item is in the list.

A. 0 B. n/2 C. n D. n2

Computer Science & Information Technology