< Back
Page 14 of 14
Like this article? We recommend
Summary
If nothing else, this article should have enlightened you about how a hacker cracks WEP. If it can be illustrated in a few pages of text, imagine how easy it is to automate using a computer. Although the danger is real for everyone who uses WEP, the threat really only applies to those who have highly trafficked WLANs. In these cases, WEP should be only one part of the security defenses built to protect your wireless network from intrusion.
< Back
Page 14 of 14