Wireless Security
Page 7
...password caching, and avoiding single sign-on. Whereas a stolen smart card can perform its own protocol and cryptological processing, unlike smart cards that intruders may penetrate the network. Wireless Security White Paper 7 Available Device-specific Security Measures Many security measures ...are outlined in the subsections below. Smart Cards Smart cards offer a partial solution to the problem of security to a wireless network, even with a personal identification number (PIN). Some of these are available for ...
...password caching, and avoiding single sign-on. Whereas a stolen smart card can perform its own protocol and cryptological processing, unlike smart cards that intruders may penetrate the network. Wireless Security White Paper 7 Available Device-specific Security Measures Many security measures ...are outlined in the subsections below. Smart Cards Smart cards offer a partial solution to the problem of security to a wireless network, even with a personal identification number (PIN). Some of these are available for ...
Wireless Security
Page 8
..., iris, face, and voice to log in. The user places a registered finger on the reader attached to his or her PC in order to at least two types of strangers. If the comparison is a sufficient match, the user is currently available only ...for accessing data. smart card) • Who the user is worth investigating security software that describe the fingerprint). File System Security While desktop operating systems such as requirements for Compaq Armada and Evo notebook computers. Wireless Security White Paper 8 A concern with Identix, a leader...
..., iris, face, and voice to log in. The user places a registered finger on the reader attached to his or her PC in order to at least two types of strangers. If the comparison is a sufficient match, the user is currently available only ...for accessing data. smart card) • Who the user is worth investigating security software that describe the fingerprint). File System Security While desktop operating systems such as requirements for Compaq Armada and Evo notebook computers. Wireless Security White Paper 8 A concern with Identix, a leader...
Wireless Security
Page 9
... Automatic encryption at power-off • Key recovery ensures that corporate data is not lost if the pass-phrase is forgotten Compaq iPAQ Pocket PC's ship with the operations of an external authenticator device to produce a secure user login. Connectivity Technologies The second key juncture in...access device; either because of the small hard drives of same) requiring such use a wireless connection at work to stay connected while they can be implemented as a key fob, smart card, or software token. For example, they roam. Different connection technologies are often not ...
... Automatic encryption at power-off • Key recovery ensures that corporate data is not lost if the pass-phrase is forgotten Compaq iPAQ Pocket PC's ship with the operations of an external authenticator device to produce a secure user login. Connectivity Technologies The second key juncture in...access device; either because of the small hard drives of same) requiring such use a wireless connection at work to stay connected while they can be implemented as a key fob, smart card, or software token. For example, they roam. Different connection technologies are often not ...
Wireless Security
Page 19
...Nortel, Radguard, Symantec Check Point VPN Client: • In development • Not based on IPSec • Uses Certicom ECC for the Compaq iPAQ Pocket PC: movianVPN by Certicom: • Based on IPSec • Will support only Check Point VPN products VGate by performing packet switching at remote...-air voice privacy) • A8: Cipher Key Generator (essentially a one-way function), and session key generation The smart card contains A3, A5 and A8; Wireless Security White Paper 19 The following VPN products, however, are available from third parties for IKE • Connects to back-...
...Nortel, Radguard, Symantec Check Point VPN Client: • In development • Not based on IPSec • Uses Certicom ECC for the Compaq iPAQ Pocket PC: movianVPN by Certicom: • Based on IPSec • Will support only Check Point VPN products VGate by performing packet switching at remote...-air voice privacy) • A8: Cipher Key Generator (essentially a one-way function), and session key generation The smart card contains A3, A5 and A8; Wireless Security White Paper 19 The following VPN products, however, are available from third parties for IKE • Connects to back-...
Wireless Security
Page 26
... represent a completely uncontrolled periphery. however, they could "remember" their WEP key. EAP already supports multiple authentication schemes including smart cards, Kerberos, Public Key Encryptions, and One Time Passwords. There have cast a shadow on an authenticated port - in any authentication...problem arises when users connect to the network, since they must be addressed in public areas or at customer sites). Wireless Security White Paper 26 • For security reasons, the authentication information must be encapsulated using the Extensible Authentication Protocol (...
... represent a completely uncontrolled periphery. however, they could "remember" their WEP key. EAP already supports multiple authentication schemes including smart cards, Kerberos, Public Key Encryptions, and One Time Passwords. There have cast a shadow on an authenticated port - in any authentication...problem arises when users connect to the network, since they must be addressed in public areas or at customer sites). Wireless Security White Paper 26 • For security reasons, the authentication information must be encapsulated using the Extensible Authentication Protocol (...
Hardware Guide, Compaq Notebook Series
Page 59
Conserving Power as You Work To conserve power as you use the notebook: ■ Turn off wireless and local area network (LAN) connections and exit modem applications when you are not using them. ■ Disconnect external devices you are not using. ... volume as you need it. ■ Turn off a device connected to an external power source. ■ Stop or remove a PC Card you are not using that a battery pack can run the notebook from a single charge. Hardware Guide 3-15 Battery Packs Battery Conservation Procedures and Settings Using the battery conservation procedures and settings...
Conserving Power as You Work To conserve power as you use the notebook: ■ Turn off wireless and local area network (LAN) connections and exit modem applications when you are not using them. ■ Disconnect external devices you are not using. ... volume as you need it. ■ Turn off a device connected to an external power source. ■ Stop or remove a PC Card you are not using that a battery pack can run the notebook from a single charge. Hardware Guide 3-15 Battery Packs Battery Conservation Procedures and Settings Using the battery conservation procedures and settings...
Maintenance and Service Guide
Page 46
...10063; TouchPad pointing device (Presario 2800 and Evo Notebook N800c models) ❏ TouchPad and point stick (Evo Notebook N800c models only) ■ Network interface card (NIC) integrated on the system board, with a mini PCI V.92 modem ■ Integrated wireless support of 802.11b and Bluetooth devices ...through MultiPort ■ Support for one Type I or II PC Card slot with support...
...10063; TouchPad pointing device (Presario 2800 and Evo Notebook N800c models) ❏ TouchPad and point stick (Evo Notebook N800c models only) ■ Network interface card (NIC) integrated on the system board, with a mini PCI V.92 modem ■ Integrated wireless support of 802.11b and Bluetooth devices ...through MultiPort ■ Support for one Type I or II PC Card slot with support...