Protecting your WLAN

Because the WLAN standard was designed with only limited security capabilities—basically to foil casual eavesdropping rather than more powerful forms of attack—it is essential to understand that WLANs are vulnerable to well-known and well-documented security weaknesses.

WLANs in public areas, or “hotspots,” like coffee shops and airports may not provide any security. New technologies are being developed by wireless manufacturers and hotspot service providers that make the public environment more secure and anonymous. If you are concerned about the security of your computer in a hotspot, limit your network activities to noncritical e-mail and basic Internet surfing.

When you set up a WLAN or access an existing WLAN, always enable security features to protect your network from unauthorized access. The common security levels are Wi-Fi Protected Access (WPA)- Personal and Wired Equivalent Privacy (WEP). Because wireless radio signals travel outside the network, other WLAN devices can pick up unprotected signals and either connect to your network (uninvited) or capture information being sent across it. However, you can take precautions to protect your WLAN:

Use a wireless transmitter with built-in security

Many wireless base stations, gateways, or routers provide built-in security features such as wireless security protocols and firewalls. With the correct wireless transmitter, you can protect your network from the most common wireless security risks.

Work behind a firewall

A firewall is a barrier that checks both data and requests for data that are sent to your network, and discards any suspicious items. Firewalls are available in many varieties, both software and hardware. Some networks use a combination of both types.

Use wireless encryption

A variety of sophisticated encryption protocols is available for your WLAN. Find the solution that works best for your network security:

Wired Equivalent Privacy (WEP) is a wireless security protocol that encodes or encrypts all network data before it is transmitted using a WEP key. Usually, you can allow the network to assign the WEP key. Alternatively, you can set up your own key, generate a different key, or choose other advanced options. Without the correct key, others will not be able to use the WLAN.

WPA (Wi-Fi Protected Access), like WEP, uses security settings to encrypt and decrypt data that is transmitted over the network. However, instead of using one static security key for encryptions as WEP does, WPA uses “temporal key integrity protocol” (TKIP) to dynamically generate a new key for every packet. It also generates different sets of keys for each computer on the network.

Roaming to another network

When you move your computer within range of another WLAN, Windows attempts to connect to that network. If the attempt is successful, your computer is automatically connected to the new network. If Windows does not recognize the new network, follow the same procedure you used initially to connect to your WLAN.

Creating a wireless connection 19

Page 29
Image 29
HP tm2-1016tx, tm2-2001sl, tm2-2001xx, tm2-1073nr, tm2-1070us, tm2-1072nr Protecting your Wlan, Roaming to another network

tm2t-1100, tm2-1010ee, tm2-1013tx, tm2-1001xx, tm2-2001xx specifications

The HP tm2t-2100, tm2-2150us, and tm2t-2200 are part of HP's TouchSmart series, which focus on delivering a versatile and user-friendly experience. These models are especially noted for their 2-in-1 functionality, combining the features of a laptop and a tablet, appealing to users who desire flexibility in their devices.

The HP tm2t-2100 comes equipped with a 12.1-inch touchscreen display, providing an engaging interface for users who want to utilize touch capabilities for navigation and interaction. The device supports multi-touch input, making it ideal for a variety of applications, from casual browsing to detailed design work. This model operates on an Intel Core 2 Duo processor, delivering ample processing power for everyday tasks and capable of handling more demanding applications.

Moving on to the tm2-2150us, this model enhances performance with a slightly upgraded processor and graphics capabilities. It includes an Intel Core i3 option, providing improved speed and efficiency for multitasking. The device also boasts an impressive battery life, ensuring that users can stay productive throughout the day without worrying about frequent recharging. The tm2-2150us maintains the same responsive touchscreen, making it suitable for both professional and entertainment purposes.

The tm2t-2200 features further enhancements, including advanced graphics options with integrated Intel HD Graphics, allowing for smoother visuals and better performance in multimedia tasks. This model is particularly popular among students and professionals who require a portable yet powerful device for presentations, lectures, or casual gaming. The touchscreen is complemented by an active digitizer, supporting precise pen input for drawing or annotating documents, thus expanding its usability for creative professionals.

All three models in the HP TouchSmart tm2 series feature HP’s unique software enhancements, including HP MediaSmart for quick access to multimedia content and HP TouchSmart software for an intuitive interface. Additionally, they come with various connectivity options such as USB ports, HDMI output, and built-in Wi-Fi, ensuring seamless connectivity with other devices and networks.

In summary, the HP tm2t-2100, tm2-2150us, and tm2t-2200 stand out for their innovative combination of laptop and tablet functionalities, powerful processing options, and enhanced interactive displays. With their varying specifications, they cater to different user needs, making them a versatile choice in the realm of portable computing.