Considering your Clients
Your wireless network is only as good as the clients that use it. Learn how to design with your clients in mind…
Read More Considering your ClientsYour wireless network is only as good as the clients that use it. Learn how to design with your clients in mind…
Read More Considering your ClientsLearn how to identify deauth containment methods using Wireshark filters and basic wireless tools.
Read More Weathering a Deauth Storm with Wireshark2.4GHz and 5.0GHz radios behave very differently, yet they are often strapped into the same hardware. Learn some tricks on how to help them coexist.
Read More That Pesky 2.4GHz RadioInterested in getting a good snapshot of the health of your wireless network? Start here…
Read More Wireless AssessmentsNo podcast/blogpost this week, as I’m out living it up in Nashville with some of the best and brightest minds in the wireless networking industry! They’ve revealed a lot of exciting new features in just the first day, ranging from the ambitious machine learning based security on the internal network to the practical new wired tunneling […]
Read More Atmosphere 2017Wireless is great because it gives you mobility – you can get your work done just about anywhere these days (which is both a good and a bad thing)! But there is an inherent drawback to mobility as wireless traffic is unbounded. It flows in all directions and eavesdropping on private conversations is both easy […]
Read More Understanding Wireless Encryption