Windows XP SP1 on Compaq Evo Notebooks
Page 5
.... Description: Several changes with WLAN adapters. 17A8-0902A-WWEN Description: When performing a clean install of Windows XP on Compaq Evo Notebooks 5 Device Manager Anomaly: Devices cannot be disabled through Device Manager. When WEP keys are entered, the characters are masked and... properties page. • WEP Key indexing range has changed . Systems Affected: All models with Wireless Local Area Networking can be entered twice. Wireless Networks Anomaly: Wireless Network behavior is currently under investigation. It is different. Microsoft Windows XP Service Pack 1 on ...
.... Description: Several changes with WLAN adapters. 17A8-0902A-WWEN Description: When performing a clean install of Windows XP on Compaq Evo Notebooks 5 Device Manager Anomaly: Devices cannot be disabled through Device Manager. When WEP keys are entered, the characters are masked and... properties page. • WEP Key indexing range has changed . Systems Affected: All models with Wireless Local Area Networking can be entered twice. Wireless Networks Anomaly: Wireless Network behavior is currently under investigation. It is different. Microsoft Windows XP Service Pack 1 on ...
Wireless Security
Page 1
...two years. White Paper December 2001 Prepared by implementing policies for users and adding security layers to the pipe. Many of wireless security into context, the paper is organized as to where the security vulnerabilities lie and what can be shipped worldwide this ...year (2001), and double that 6.2 million wireless devices will be alleviated easily by : Access Business Group Compaq Computer Corporation Contents Introduction 3 Security in General 3 Essential Elements of Security ...
...two years. White Paper December 2001 Prepared by implementing policies for users and adding security layers to the pipe. Many of wireless security into context, the paper is organized as to where the security vulnerabilities lie and what can be shipped worldwide this ...year (2001), and double that 6.2 million wireless devices will be alleviated easily by : Access Business Group Compaq Computer Corporation Contents Introduction 3 Security in General 3 Essential Elements of Security ...
Wireless Security
Page 2
... White Paper prepared by Access Business Group First Edition (December 2001) Document Number 161Z-1201A-WWEN Wireless Security White Paper 2 Notice The information in this publication is subject to change without notice and is not a determination of the product...L.P. The configuration or configurations tested or described may or may be trademarks of Compaq Information Technologies Group, L.P. Compaq, the Compaq logo, Deskpro, and Evo are exclusively set forth in the U.S. and/or other countries. and/or other countries. IN NO EVENT SHALL COMPAQ BE LIABLE FOR ANY DIRECT, CONSEQUENTIAL...
... White Paper prepared by Access Business Group First Edition (December 2001) Document Number 161Z-1201A-WWEN Wireless Security White Paper 2 Notice The information in this publication is subject to change without notice and is not a determination of the product...L.P. The configuration or configurations tested or described may or may be trademarks of Compaq Information Technologies Group, L.P. Compaq, the Compaq logo, Deskpro, and Evo are exclusively set forth in the U.S. and/or other countries. and/or other countries. IN NO EVENT SHALL COMPAQ BE LIABLE FOR ANY DIRECT, CONSEQUENTIAL...
Wireless Security
Page 3
...100-225-1,00.html February, 2000) for important detail on best practices and established technologies for managing corporate network security. Since wireless networks dispense with the machines they use to gain access to such networks. Many of access is discussed. To put the appropriate... can be constantly evaluated and improved as people find new ways to gain unauthorized access to function in place. Wireless Security White Paper 3 Introduction Wireless networks connect computers in offices or homes to other computers, or to devices such as printers, by implementing policies...
...100-225-1,00.html February, 2000) for important detail on best practices and established technologies for managing corporate network security. Since wireless networks dispense with the machines they use to gain access to such networks. Many of access is discussed. To put the appropriate... can be constantly evaluated and improved as people find new ways to gain unauthorized access to function in place. Wireless Security White Paper 3 Introduction Wireless networks connect computers in offices or homes to other computers, or to devices such as printers, by implementing policies...
Wireless Security
Page 4
... Non-repudiation -- WLAN hubs, telecommunications companies 4. Security at critical junctures along the pipe, and measures that may arise with wireless networks at the corporate firewall and servers (Corporate Access) 5. Security in messages. the process of verifying that such information remains...so can be taken to address those issues. all security technology must be abused or used to hide criminal activity. A wireless mobile business solution should also provide management mechanisms for preserving privacy. • Authentication - WLAN, WPAN, WWAN, broadband,...
... Non-repudiation -- WLAN hubs, telecommunications companies 4. Security at critical junctures along the pipe, and measures that may arise with wireless networks at the corporate firewall and servers (Corporate Access) 5. Security in messages. the process of verifying that such information remains...so can be taken to address those issues. all security technology must be abused or used to hide criminal activity. A wireless mobile business solution should also provide management mechanisms for preserving privacy. • Authentication - WLAN, WPAN, WWAN, broadband,...
Wireless Security
Page 5
Device Security Despite the growing popularity of handheld PCs, PDAs, and cellular telephones, the truly ubiquitous mobile computing device in the United States is still the notebook computer (in Europe it , is discussed in this paper, since securing data from one .) Figure 1 illustrates the pipe. Wireless Security White Paper 5 - (This aspect of primary content...
Device Security Despite the growing popularity of handheld PCs, PDAs, and cellular telephones, the truly ubiquitous mobile computing device in the United States is still the notebook computer (in Europe it , is discussed in this paper, since securing data from one .) Figure 1 illustrates the pipe. Wireless Security White Paper 5 - (This aspect of primary content...
Wireless Security
Page 6
...computers, PDAs, and cellular telephones have in monitoring their usefulness, companies deploy millions of security risk. Wireless Security White Paper 6 Moreover, workers are using notebook computers more and more susceptible to loss and theft than desktop devices, which makes it harder to ...access many types of mobile device users. Because of their surroundings are precautions that the devices hold. For information on Compaq notebook computers, see http://www.compaq.com/showroom/handhelds.html. Most companies, therefore, do not have traditionally been used more frequently...
...computers, PDAs, and cellular telephones have in monitoring their usefulness, companies deploy millions of security risk. Wireless Security White Paper 6 Moreover, workers are using notebook computers more and more susceptible to loss and theft than desktop devices, which makes it harder to ...access many types of mobile device users. Because of their surroundings are precautions that the devices hold. For information on Compaq notebook computers, see http://www.compaq.com/showroom/handhelds.html. Most companies, therefore, do not have traditionally been used more frequently...
Wireless Security
Page 7
...plastic inside the card. The enhanced smart card reader also reads the card in conjunction with each key require repeated presses to type certain letters. Wireless Security White Paper 7 Available Device-specific Security Measures Many security measures are available for example, adds a level of security to the device in the...There are often not fully implemented. A smart card is to endure the trade-off in addition does not allow the PIN back out to a wireless network, even with a personal identification number (PIN). Smart card readers offer different levels of hardware on .
...plastic inside the card. The enhanced smart card reader also reads the card in conjunction with each key require repeated presses to type certain letters. Wireless Security White Paper 7 Available Device-specific Security Measures Many security measures are available for example, adds a level of security to the device in the...There are often not fully implemented. A smart card is to endure the trade-off in addition does not allow the PIN back out to a wireless network, even with a personal identification number (PIN). Smart card readers offer different levels of hardware on .
Wireless Security
Page 8
...Finland provides such encryption for the commercial market. FileCrypto for Compaq Armada and Evo notebook computers. Fingerprints are an accurate trait to convert the image into the hands...The user places a registered finger on the reader attached to his or her PC in order to the network. The information is in operation. fingerprint identification) ...authentication as requirements for fingerprints are concerned, Compaq FIT is dramatically more secure than one . Wireless Security White Paper 8 A concern with Identix, a leader in . Multi-factor Authentication ...
...Finland provides such encryption for the commercial market. FileCrypto for Compaq Armada and Evo notebook computers. Fingerprints are an accurate trait to convert the image into the hands...The user places a registered finger on the reader attached to his or her PC in order to the network. The information is in operation. fingerprint identification) ...authentication as requirements for fingerprints are concerned, Compaq FIT is dramatically more secure than one . Wireless Security White Paper 8 A concern with Identix, a leader in . Multi-factor Authentication ...
Wireless Security
Page 9
... firewalls are available from Network ICE Corporation. These technologies provide the infrastructure, standards, and protocols that permit information to travel wirelessly between mobile clients and the wired lines that combines a user's PIN with the operations of an external authenticator device to produce... a secure user login. RSA Security did not develop a Pocket PC client, but instead incorporated SecurID into the access device; Different connection technologies are used at different times, depending on the ...
... firewalls are available from Network ICE Corporation. These technologies provide the infrastructure, standards, and protocols that permit information to travel wirelessly between mobile clients and the wired lines that combines a user's PIN with the operations of an external authenticator device to produce... a secure user login. RSA Security did not develop a Pocket PC client, but instead incorporated SecurID into the access device; Different connection technologies are used at different times, depending on the ...
Wireless Security
Page 10
...below. Users of these connectivity technologies follows and detailed papers that uses high-frequency radio waves rather than wires to a wireless connection. Wireless personal area networks (WPANs) facilitate such connections between various personal devices wherever they can send and receive e-mail, access...technology are , such as an extension or alternative to plug cables into Ethernet jacks in every office and conference room. Wireless Local-area Networks A wireless local-area network (WLAN) is a flexible data communication system implemented as from a cell phone to a handheld to...
...below. Users of these connectivity technologies follows and detailed papers that uses high-frequency radio waves rather than wires to a wireless connection. Wireless personal area networks (WPANs) facilitate such connections between various personal devices wherever they can send and receive e-mail, access...technology are , such as an extension or alternative to plug cables into Ethernet jacks in every office and conference room. Wireless Local-area Networks A wireless local-area network (WLAN) is a flexible data communication system implemented as from a cell phone to a handheld to...
Wireless Security
Page 11
...) can also use infrared technology. WWANs use Bluetooth, a radio frequency (RF) specification for point-to peripheral devices such as handheld PCs to connect wirelessly to -multipoint voice and data transfer. Japan's NT DoCoMo uses I-mode technology in the United States and are IS-95 and IS...Multiple Access (CDMA) and Time Division Multiple Access (TDMA) were developed in its market. They can use one of the three digital wireless telephone technologies. The Global System for Mobile communication (GSM), developed in Europe, is a TDMA technology. GSM is the most widely used ...
...) can also use infrared technology. WWANs use Bluetooth, a radio frequency (RF) specification for point-to peripheral devices such as handheld PCs to connect wirelessly to -multipoint voice and data transfer. Japan's NT DoCoMo uses I-mode technology in the United States and are IS-95 and IS...Multiple Access (CDMA) and Time Division Multiple Access (TDMA) were developed in its market. They can use one of the three digital wireless telephone technologies. The Global System for Mobile communication (GSM), developed in Europe, is a TDMA technology. GSM is the most widely used ...
Wireless Security
Page 12
...the same frequency and with InfoWave. Figure 4 illustrates a WWAN. Such eavesdropping and possible theft of security) are available now. Wireless Security White Paper 12 Compaq provides turnkey solutions: clients with InfoWave. Compaq offers an optimized MS Exchange e-mail solution with enabling ...Gaining access to the Internet, Internet e-mail, enterprise intranet and corporate e-mail. Because all the elements of information violates privacy. Figure 4: Wireless Wide-area Network Whether it is transmitted through the air when the data is air. WWAN via GSM, as it is a WLAN,...
...the same frequency and with InfoWave. Figure 4 illustrates a WWAN. Such eavesdropping and possible theft of security) are available now. Wireless Security White Paper 12 Compaq provides turnkey solutions: clients with InfoWave. Compaq offers an optimized MS Exchange e-mail solution with enabling ...Gaining access to the Internet, Internet e-mail, enterprise intranet and corporate e-mail. Because all the elements of information violates privacy. Figure 4: Wireless Wide-area Network Whether it is transmitted through the air when the data is air. WWAN via GSM, as it is a WLAN,...
Wireless Security
Page 13
...For example, it unreadable, and thus unusable, to mitigate risk associated with WWAN connectivity. Smaller companies have PKI support for the wireless exchange of information over networks involve the use of public key cryptography, also known as a public key infrastructure (PKI). GSM...the recipient's private key. Eavesdropping To prevent eavesdropping and its destructive ramifications. Popular PKI vendors like Baltimore Technologies, Inc. Wireless Security White Paper 13 The discussion that follows concentrates on the segment of the network pipe in which public key cryptography...
...For example, it unreadable, and thus unusable, to mitigate risk associated with WWAN connectivity. Smaller companies have PKI support for the wireless exchange of information over networks involve the use of public key cryptography, also known as a public key infrastructure (PKI). GSM...the recipient's private key. Eavesdropping To prevent eavesdropping and its destructive ramifications. Popular PKI vendors like Baltimore Technologies, Inc. Wireless Security White Paper 13 The discussion that follows concentrates on the segment of the network pipe in which public key cryptography...
Wireless Security
Page 14
... with the public key. Figure 6 illustrates symmetric and asymmetric keys. Conversely, data encrypted with the private key can be decrypted only with the private key. Wireless Security White Paper 14 Core elements of variable length that algorithm.
... with the public key. Figure 6 illustrates symmetric and asymmetric keys. Conversely, data encrypted with the private key can be decrypted only with the private key. Wireless Security White Paper 14 Core elements of variable length that algorithm.
Wireless Security
Page 15
... establishing trust. Digital certificates can also be used to encrypt sensitive information for people and resources over networks. Figure 7 illustrates digital certificates. What's in a certificate? Wireless Security White Paper 15 Digital Certificates Digital certificates are electronic files that issued the certificate • A serial number • The validity period (or lifetime) of...
... establishing trust. Digital certificates can also be used to encrypt sensitive information for people and resources over networks. Figure 7 illustrates digital certificates. What's in a certificate? Wireless Security White Paper 15 Digital Certificates Digital certificates are electronic files that issued the certificate • A serial number • The validity period (or lifetime) of...
Wireless Security
Page 16
... sent over the network to the one-way hash from the digital signature to the recipient, who decrypts the digital signature using the public key. Wireless Security White Paper 16 Digital Signatures Digital signatures are intended to the signer, and that the public key is indeed associated with the digitally signed...
... sent over the network to the one-way hash from the digital signature to the recipient, who decrypts the digital signature using the public key. Wireless Security White Paper 16 Digital Signatures Digital signatures are intended to the signer, and that the public key is indeed associated with the digitally signed...
Wireless Security
Page 17
Wireless Security White Paper 17 Virtual Private Networks Virtual Private Networks (VPNs), also known as a VPN before allowing data to cross from prying eyes. The VPN ...; Multiprotocol Support. VPNs have the following characteristics: • User Authentication. The VPN must generate and refresh encryption keys for wired networks, can keep a wireless network hidden from a wireless network to an intranet or other corporate system. The VPN must verify the user's identity and restrict VPN access to show who accessed what...
Wireless Security White Paper 17 Virtual Private Networks Virtual Private Networks (VPNs), also known as a VPN before allowing data to cross from prying eyes. The VPN ...; Multiprotocol Support. VPNs have the following characteristics: • User Authentication. The VPN must generate and refresh encryption keys for wired networks, can keep a wireless network hidden from a wireless network to an intranet or other corporate system. The VPN must verify the user's identity and restrict VPN access to show who accessed what...
Wireless Security
Page 18
...- Cisco Systems has been prominent in the VPN protocols that it runs on because of the high CPU overhead associated with wireless networks in its own lines for security that security arrangements can be limited in proposing IPSec as a standard. Cisco has ...designed with the encryption and decryption algorithms. The greater speeds of new generations of processors will enhance the ability of a virtual private network. Wireless Security White Paper 18 Several VPN protocols are the L2TP Access Concentrator (LAC), a device that physically terminates a call, and the L2TP...
...- Cisco Systems has been prominent in the VPN protocols that it runs on because of the high CPU overhead associated with wireless networks in its own lines for security that security arrangements can be limited in proposing IPSec as a standard. Cisco has ...designed with the encryption and decryption algorithms. The greater speeds of new generations of processors will enhance the ability of a virtual private network. Wireless Security White Paper 18 Several VPN protocols are the L2TP Access Concentrator (LAC), a device that physically terminates a call, and the L2TP...
Wireless Security
Page 19
... ECC for IKE • Connects to WWAN Carrier Technologies All digitized mobile telephone and wireless packet data networks use some form of encryption. The three algorithms are encrypted. Wireless Security White Paper 19 The following VPN products, however, are available from third parties ...for the Compaq iPAQ Pocket PC: movianVPN by Certicom: • Based on IPSec • Will support only ...
... ECC for IKE • Connects to WWAN Carrier Technologies All digitized mobile telephone and wireless packet data networks use some form of encryption. The three algorithms are encrypted. Wireless Security White Paper 19 The following VPN products, however, are available from third parties ...for the Compaq iPAQ Pocket PC: movianVPN by Certicom: • Based on IPSec • Will support only ...