Windows 7

1. Microsoft Windows 7 tutorials 2. Module 1- Installation, Upgrading, and Migrating to Windows 7 tutorials 3. Editions of Windows 7 tutorials 4. Hardware Requirements for Installing Windows 7 tutorials 5. You can install Windows 7 in following different ways, including: 6. Consideration for Upgrading v/s Migrating tutorials 7. What is Migration tutorials 8. Migrating User Data and Settings tutorials 9. Performing an Image-Based Installation of Windows 7 tutorials 10.Configuring Disks and Device Drivers tutorials 11. Partitioning Disks in Windows 7 tutorials 12.GUID - GPT Disk tutorials 13.Disk Management tools tutorials 14. Simple Volume tutorials 15. Spanned and Striped Volumes tutorials 16. Maintaining Disks, Partitions, and Volumes tutorials 17. Disk Quota tutorials 18.Working with VHD Virtual Hard Disk tutorials 19. Device Driver in Windows 7 tutorials 20.System Restore tutorials 21.LAST KNOWN GOOD CONFIGURATION tutorials 22.Configure and Trouble shoot Network Connections tutorials 23.What is an IPv4 Address tutorials 24. Note - IPV4 25. IPv4 address classes tutorials 26.Default Gateway tutorials 27.Public and Private IPv4 Address tutorials 28.IPv6 Network Connectivity tutorials 29.IPv6 UNICAST ADDRESSES tutorials 30. IPv4 Address can be assigned by following types tutorials 31.Implementing Name Resolution tutorials 32. Trouble Shooting Network Connectivity tutorials 33. Implementing Wireless Security tutorials 34.Wireless network Technologies tutorials 35.What is Wireless Broadband tutorials 36.IEEE 802.11 tutorials 37.Wireless Network Configuration tutorials 38. Security Types tutorials 39. Implementing Network Security tutorials 40.Configuring Windows Firewall tutorials 41.Ports and Application tutorials 42.Important Application, Protocol and Port Number tutorials 43.Configure Inbound and Outbound Rules tutorials 44. Securing Network traffic tutorials

IEEE 802.11 tutorials

  • It is the original IEEE 802.11 standard for Shared key authentication and WEP (Wired Equivalent Privacy).

  • WEP is one of the least secure forms of security.

  • A network that is secured with WEP had been cracked in 3 minutes by FBI.

  • To establish WEP encryption you have to install same secret key in each of organization Wireless Access Point.

  • Then you must install that key in each Client.

  • WEP uses either 40 bits or 104 bits Encryption key.

  • Finally Wireless Access Point and Client go through a challenge response cycle which uses WEP encryption key as shared secret key.

  • Although WEP fails to meet security goals, it is still widely used.

 

IEEE 802.1X

  • IEEE 802.1X provide same standard that existed for Ethernet Switch.

  • It was adapted to Wireless LAN to provide much stronger authentication then original 802.11 WEP standard.

  • 802.1X authentication is designed for medium and large wireless LAN that consist of RADIUS (Remote Authentication Dial-In User Service) Server and AD DS (Active Directory Domain Service) Database.

  • IEEE 802.1X prevents a wireless node from joining a wireless network until the node performs a successful authentication.

  • When Wireless Access Point & Data-Link device, detects new clients, it passes authentication to authentication server. Server then checks the client’s credentials and report the authentication status to data-link or WAP device.

  • If authentication fails, Wireless Access Point, bridge or Switch will not forward packets to the network.

  • You must ensure that the Client and Wireless Devices all support 802.1X protocol.

 

WPA - Wi-Fi Protected Access

  • WPA is quick alternative to improve security over WEP.

  • WPA - Wi-Fi Protected Access was created by Wi-Fi Alliance an organization of Wireless Equipment vendors.

  • WPA is a trimmed down version of 802.11i Security standard developed by IEEE 802.11 to replace WEP.

  • WEP uses a much stronger encryption method known as TKIP (Temporal Key Integrity Protocol).

 

WPA2 - Wi-Fi Protected Access 2

  • WPA2 is a Wi-Fi Alliance branded version of 802.11i standard.

  • WPA2 support the additional mandatory security features of IEEE 802.11i standards that were not included in earlier WPA version.

  • WPA2 support both TKIP (Temporal Key Integrity Protocol) and AES encryption.

  • Both EPA and WPA2 support EAP authentication using RADIUS server and PSK Preshared Key.

 

 


 

border