Windows 7

1. Microsoft Windows 7 tutorials 2. Module 1- Installation, Upgrading, and Migrating to Windows 7 tutorials 3. Editions of Windows 7 tutorials 4. Hardware Requirements for Installing Windows 7 tutorials 5. You can install Windows 7 in following different ways, including: 6. Consideration for Upgrading v/s Migrating tutorials 7. What is Migration tutorials 8. Migrating User Data and Settings tutorials 9. Performing an Image-Based Installation of Windows 7 tutorials 10.Configuring Disks and Device Drivers tutorials 11. Partitioning Disks in Windows 7 tutorials 12.GUID - GPT Disk tutorials 13.Disk Management tools tutorials 14. Simple Volume tutorials 15. Spanned and Striped Volumes tutorials 16. Maintaining Disks, Partitions, and Volumes tutorials 17. Disk Quota tutorials 18.Working with VHD Virtual Hard Disk tutorials 19. Device Driver in Windows 7 tutorials 20.System Restore tutorials 21.LAST KNOWN GOOD CONFIGURATION tutorials 22.Configure and Trouble shoot Network Connections tutorials 23.What is an IPv4 Address tutorials 24. Note - IPV4 25. IPv4 address classes tutorials 26.Default Gateway tutorials 27.Public and Private IPv4 Address tutorials 28.IPv6 Network Connectivity tutorials 29.IPv6 UNICAST ADDRESSES tutorials 30. IPv4 Address can be assigned by following types tutorials 31.Implementing Name Resolution tutorials 32. Trouble Shooting Network Connectivity tutorials 33. Implementing Wireless Security tutorials 34.Wireless network Technologies tutorials 35.What is Wireless Broadband tutorials 36.IEEE 802.11 tutorials 37.Wireless Network Configuration tutorials 38. Security Types tutorials 39. Implementing Network Security tutorials 40.Configuring Windows Firewall tutorials 41.Ports and Application tutorials 42.Important Application, Protocol and Port Number tutorials 43.Configure Inbound and Outbound Rules tutorials 44. Securing Network traffic tutorials

What is Wireless Broadband tutorials

  • Wireless broadband is technology that provides high-speed wireless Internet access or networking access over a wide area.

  • Windows 7 provide same user interface regardless or service provider. However in order to use wireless broadband, you need to have wireless NIC adapter and Wireless Modem/Router.

 

Security Protocols for Wireless Network.

  • In order to protect Wireless Network from unauthorized users, various wireless Security Protocols are developed. In addition to preventing uninvited guest from connecting to your wireless network, wireless security protocols encrypt your private data transmitted over the wireless.

 

Point to note:-

  • In early days wireless networking manufactures tried to make wireless networking equipment easy but insecure.

 

Wireless networks are inherently insecure! Why?.

  • Wireless network are generally not as secure as wired networks. Wired networks send data between two points, which are connected by network cable. On the other hand wireless network broadcast data in every direction. These wireless data may propagate beyond the physical boundary of office or home to every device that happens to be listening.

  • In order to protect your Wireless Network, you must configure Authentication and Encryption option.

 

Authentication

  • In simple word Authentication verifies who you are.

  • It requires you to provide valid user credentials such as User name and Password or proof with authentication key.

  • It prevents unauthorized users from joining your wireless network.

 

Encryption

  • Encryption sends the content of all wireless data in encrypted format so only receiver can interpret its content.

  • Encryption prevents unauthorized users from retrieving sensitive data.

  • It also helps in preventing unauthorized user from sending valid frames and accessing your private wireless network.

  • Wireless LAN supports following security standard. Each standard have own strength and weaknesses.

 

Security Standard

Authentication Methods

Encryption methods

Remarks

IEEE 802.11

Open System,

Shared Key

WEP

Least secure, Very weak Authentication & Encryption.

Avoid using it.

IEEE 802.1X

EAP Authentication

WEP

Strong EAP method provides Stronger Authentication.

WPA-Enterprise

802.1x

TKIP/AES

Strong Authentication using Strong EAP and TKIP.

Very Strong AES Encryption

Used for medium & large Co.

WPA-Personal

PSK

TKIP/AES

Strong Authentication using Strong PSK and TKIP.

Very Strong AES Encryption

Used for Home & Small Co.

WPA2-Enterprise

802.1X

TKIP/AES

Strong Authentication using Strong EAP and TKIP.

Very Strong AES Encryption

Used for medium & large Co.

WPA2-Personal

PSK

TKIP/AES

Strong Authentication using Strong PSK and TKIP.

Very Strong AES Encryption

Used for Home & Small Co.

 

WPA (Wi-Fi Protected Access) and WPA2 (Wi-Fi Protected Access 2) are available in 2 modes:-

Personal

  • It is used for Home and Small Organization.

  • In this mode a Pre-shared key or passphrase is used for authentication.

  • A pre-shared key is used for authentication and is provided to each users.

  • This pre-shared key is dynamically sent between Access Point and Clients.

 

Enterprise

  • It is used for medium and Large organization.

  • This mode includes all the features of WPA Personal plus support for 802.1x RADIUS authentication.

  • It can be used only where RADIUS server is installed and Server distributes individual keys to users that have wireless designation.

 

 


 

border