Wireless-B Media Adapter
The solution, then, is to segment your network up into multiple groups. If your network had 80 users and you used four WEP keys, a hacker would have access to only ¼ of your wireless network resources. In this way, multiple keys reduce your liability.
Finally, be sure to change your WEP key regularly, once a week or once a day. Using a “dynamic” WEP key, rather than one that is static, makes it even harder for a hacker to break into your network and steal your resources.
WEP Encryption
To enable WEP encryption for the Adapter, use the Setup Wizard. Refer to “Chapter 4: Setting up the
Appendix B: Wireless Security
Important: Always remember that each device in your wireless network MUST use the same WEP encryption method and encryption key or your wireless network will not function properly.
43
What Are The Risks?