<?xml version="1.0"?>
<?xml-stylesheet type="text/css" href="http://wiki.cas.mcmaster.ca/skins/common/feed.css?207"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>http://wiki.cas.mcmaster.ca/index.php?feed=atom&amp;target=Hamilr3&amp;title=Special%3AContributions</id>
		<title>Computing and Software Wiki - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="http://wiki.cas.mcmaster.ca/index.php?feed=atom&amp;target=Hamilr3&amp;title=Special%3AContributions"/>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Special:Contributions/Hamilr3"/>
		<updated>2026-04-07T21:41:43Z</updated>
		<subtitle>From Computing and Software Wiki</subtitle>
		<generator>MediaWiki 1.15.1</generator>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/User:Skip</id>
		<title>User:Skip</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/User:Skip"/>
				<updated>2009-11-24T16:19:10Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;/* Topics: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Human Computer Interaction =&lt;br /&gt;
&lt;br /&gt;
=='''This is the projects main page for cs4hc3 and se4f03''' -- ''HCI / CHI'' Courses.==&lt;br /&gt;
&lt;br /&gt;
===Objectives===&lt;br /&gt;
&lt;br /&gt;
===Logistics===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
  &amp;lt;li&amp;gt;&lt;br /&gt;
    During the middle of term the class will be divided into about 12 (n) groups, each of whom will negotiate amongst&lt;br /&gt;
    themselves a topic of concentration from the list below with at least three ranked by selected priority.&lt;br /&gt;
    At an early designated lecture, each group will be linked to a topic of their choice in a first-come/first-served&lt;br /&gt;
    basis -- only one group per project.&lt;br /&gt;
  &amp;lt;/li&amp;gt;&lt;br /&gt;
  &amp;lt;li&amp;gt;&lt;br /&gt;
    Group members should all have their associated member email addresses and use these to generate a wiki in one of the&lt;br /&gt;
    groups member names.  Note that ALL changes made to a wiki are logged by IP address of the machine, as well as time&lt;br /&gt;
    and date.  By law Derek Lipiec MUST always be running an audit trail system which essentially operates as a key logger&lt;br /&gt;
    in that if any vandalism is done electronically, he can determine who is logged on, from where as well as what was typed.&lt;br /&gt;
    This is a warning that anyone modifying a group's wiki who is NOT a member of that group will be caught and risk a zero&lt;br /&gt;
    grade for this assignment exists.  Therefore &amp;quot;play safe&amp;quot; and do not fool around.  (wfsp)&lt;br /&gt;
  &amp;lt;/li&amp;gt;&lt;br /&gt;
  &amp;lt;li&amp;gt;&lt;br /&gt;
    Just after several weeks of class duration, a created wiki from each group will be completed&lt;br /&gt;
    and marked.  As soon as scheduled, these dates will be posted in the ELM calendar for this course.&lt;br /&gt;
  &amp;lt;/li&amp;gt;&lt;br /&gt;
  &amp;lt;li&amp;gt;&lt;br /&gt;
    Part of this mark will be composed of 12 other rankings (by three groups of four members each as listed below)&lt;br /&gt;
    from &amp;lt;b&amp;gt;each&amp;lt;/b&amp;gt; of the other group members, &amp;lt;b&amp;gt;done individually&amp;lt;/b&amp;gt;, who will rank and provide one sentence&lt;br /&gt;
    of what is best and one sentence of what is worst about the subject wiki under consideration.  This is done&lt;br /&gt;
    through sending Dr.Poehlman an email with the three marks and single sentences for like and dislike reasons.&lt;br /&gt;
    The ranking for each wiki will be compiled by the instructor and posted anonymously for class consideration&lt;br /&gt;
    and discussion near the end of term.&lt;br /&gt;
  &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Topics:===&lt;br /&gt;
Reference -- adapted from ACM (Association for Computing Machinery -- but people can join, too!) http://wiki.acm.org/cs2001/index.php?title=HUMAN-COMPUTER_INTERACTION&lt;br /&gt;
&amp;lt;OL&amp;gt;&lt;br /&gt;
  &amp;lt;Li&amp;gt; '''Motivation:''' Why the study of how people interact with technology is vital for the development of most usable and acceptable systems. [[Motivations for the Studying of HCI]] (Taken by Group 10 -- wfsp/15nov09@14:30) &amp;lt;/Li&amp;gt;&lt;br /&gt;
  &amp;lt;Li&amp;gt; '''Contexts for HCI:''' mobile devices, consumer devices, business applications, web, business applications, collaboration systems, games, etc. [[Contexts for HCI]] (Taken by Group 8 -- wfsp/05nov09@14:00)&amp;lt;/Li&amp;gt;&lt;br /&gt;
  &amp;lt;Li&amp;gt; '''[[Process_for_User-centered_Development]]:''' early focus on users, empirical testing, iterative design. (Specified for Group 11 -- wfsp/15nov09@14:30) &amp;lt;/Li&amp;gt;&lt;br /&gt;
  &amp;lt;Li&amp;gt; '''[[Different measures for evaluation]]:''' utility, efficiency, learnability, user satisfaction. (Taken by Group 5 -- wfsp/10nov09@13:00)&amp;lt;/Li&amp;gt;&lt;br /&gt;
  &amp;lt;Li&amp;gt; '''Models that inform human-computer interaction (HCI) design:''' attention, perception and recognition, movement, and cognition.&amp;lt;/Li&amp;gt;&lt;br /&gt;
  &amp;lt;Li&amp;gt; '''[[Social issues influencing HCI design and use]]''': culture, communication, and organizations. (Taken by Group 3 -- wfsp/13nov09@15:30) &amp;lt;/Li&amp;gt;&lt;br /&gt;
  &amp;lt;Li&amp;gt; '''[[HCI - Accommodating human diversity]]:''' including universal design and accessibility and designing for multiple cultural and linguistic contexts. (Taken by Group 9 -- wfsp/12nov09@13:30)&amp;lt;/Li&amp;gt;&lt;br /&gt;
  &amp;lt;Li&amp;gt; The most '''[[Common Interface Mistakes]]'''. (Taken by Group 1 -- wfsp/04nov09@17:00)&amp;lt;/Li&amp;gt;&lt;br /&gt;
  &amp;lt;Li&amp;gt; '''[[User Interface Standards]]'''. (Taken by Group 6 -- wfsp/05nov09@19:30)&amp;lt;/Li&amp;gt;&lt;br /&gt;
  &amp;lt;Li&amp;gt; The '''five interaction styles''' as espoused by [[B.Scheidermann]]. [[Five Interaction Styles]] (Taken by Group 7 -- wfsp/04nov09@17:30)&amp;lt;/Li&amp;gt;&lt;br /&gt;
  &amp;lt;Li&amp;gt; The '''Object-Action''' (or visa-versa) '''model''' and its applications. [[The Object-Action (or_visa-versa) model and its applications]](Specified for Group 2 -- wfsp/15nov09@14:30) &amp;lt;/Li&amp;gt;&lt;br /&gt;
  &amp;lt;Li&amp;gt; The '''direct manipulation method''' and its importance to CHI. [[Direct Manipulation]] (Taken by Group 4 -- wfsp/06nov09@09:30) &amp;lt;/Li&amp;gt;&lt;br /&gt;
&amp;lt;/OL&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;&lt;br /&gt;
  Marking Duties for Each Group:&lt;br /&gt;
&amp;lt;/h4&amp;gt;&lt;br /&gt;
&amp;lt;table  border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;th&amp;gt;&lt;br /&gt;
      &amp;lt;u&amp;gt;Group   Mark1   Mark2   Mark3&amp;lt;/u&amp;gt;&lt;br /&gt;
    &amp;lt;/th&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&lt;br /&gt;
      1   Group 2  Group 3  Group 4&lt;br /&gt;
    &amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&lt;br /&gt;
      2   Group 3  Group 4  Group 5&lt;br /&gt;
    &amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&lt;br /&gt;
      3   Group 4  Group 5  Group 6&lt;br /&gt;
    &amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&lt;br /&gt;
      4   Group 5  Group 6  Group 7&lt;br /&gt;
    &amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&lt;br /&gt;
      5   Group 6  Group 7  Group 8&lt;br /&gt;
    &amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&lt;br /&gt;
      6   Group 7  Group 8  Group 9&lt;br /&gt;
    &amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&lt;br /&gt;
      7   Group 8  Group 9  Group 10&lt;br /&gt;
    &amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&lt;br /&gt;
      8   Group 9  Group 10 Group 11&lt;br /&gt;
    &amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&lt;br /&gt;
      9   Group 10 Group 11 Group 01&lt;br /&gt;
    &amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&lt;br /&gt;
      10  Group 11 Group 01 Group 02&lt;br /&gt;
    &amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&lt;br /&gt;
      11  Group 01 Group 02 Group 03&lt;br /&gt;
    &amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=='''This is the VRML assignment main page for cs4hc3 and se4f03''' &amp;lt;br&amp;gt; -- ''HCI / CHI'' Courses.==&lt;br /&gt;
NOTE:  This is NOT required for the 2009-2010 version of this course.&lt;br /&gt;
===Some Important References:===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
  &amp;lt;li&amp;gt;&lt;br /&gt;
    The Custom Courseware for this course has an Appendix section for VRML beginners so this is a good place to begin studying if you are not familiar with the Virtual Reality Modelling Language.  We will be using this to create 3-D interfaces for 3-D worlds, just to get some practice in thinking in more than two dimensions.  Although VRML has been around for more than a decade, it is still found as the 3-D layer in MPEG4, has been updated and in a standard in the W3C world known as X3D, which is just VRML with &amp;lt;elements&amp;gt; instead of reserved keywords.  If you know VRML, you know X3D.&lt;br /&gt;
  &amp;lt;/li&amp;gt;&lt;br /&gt;
  &amp;lt;li&amp;gt;&lt;br /&gt;
    To begin our study of the Virtual Reality Modeling Language (VRML), we need to get setup to view the VRML code (which is in pure ASCII, as is Javascript, etc.)  To create VRML, use any ASCII editor that you like best.  I use Crimson Editor which has a built-in context sensitive markup that understands VRML, so it is easy to distinguish comments from verbs and nouns, etc.&lt;br /&gt;
Go to http://sourceforge.net/projects/emeraldeditor/files/ where Emerald Editor (the newest version of the Crimson editor) can be downloaded freely.  To interpret VRML code (nested in HTML code) you need a plug-in.  The best that I have found is called Cortona from Parallel Graphics at http://www.cortona3d.com/cortona/ .  It works best with Apple Safari Browser version 4 from http://www.apple.com/safari/download/ .  All of this information is at the end of the course web site section on VRML at http://www.cas.mcmaster.ca/~se4d03/demo.html#VRML headed with the title &amp;quot;Recommended Client Applications&amp;quot;.  By the way, Parallel Graphics has an editor called VRMLPad that is not free but can be downloaded as a trial version, which may help the beginner as it provides a thumbnail sketch at the margin right when it recognizes any VRML code shape primitives -- interesting thing to see work.&lt;br /&gt;
  &amp;lt;/li&amp;gt;&lt;br /&gt;
  &amp;lt;li&amp;gt;&lt;br /&gt;
    As far as web references go, the best place to start is on the course web site: &amp;lt;br&amp;gt; --&lt;br /&gt;
    http://www.cas.mcmaster.ca/~se4d03/demo.html#VRML &lt;br /&gt;
  &amp;lt;/li&amp;gt;&lt;br /&gt;
  &amp;lt;ol&amp;gt;&lt;br /&gt;
    &amp;lt;li&amp;gt;&lt;br /&gt;
      Once here you can take the tutorial, done by a senior thesis student Polo Cerone several year's ago.&lt;br /&gt;
      It can be taken on-line or downloaded and worked through locally -- either is equivalent.&lt;br /&gt;
    &amp;lt;/li&amp;gt;&lt;br /&gt;
    &amp;lt;li&amp;gt;&lt;br /&gt;
      Once the tutorial is taken, there are many example VRML code snippets that can be viewed with whatever browser plug-in that you have installed.  Pay particular attention to the graduated examples that show how one specifically goes about creating an interface in VRML that controls objects in the main scene graph.  This is located back near the beginning of the VRML section titled &amp;quot;Graduated VRML2 Interface Examples&amp;quot;.&lt;br /&gt;
    &amp;lt;/li&amp;gt;&lt;br /&gt;
  &amp;lt;/ol&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Social_issues_influencing_HCI_design_and_use</id>
		<title>Social issues influencing HCI design and use</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Social_issues_influencing_HCI_design_and_use"/>
				<updated>2009-11-23T05:19:21Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Communication Considerations ==&lt;br /&gt;
&lt;br /&gt;
The concept of ‘user interfaces for all’ implies the availability of and easy access to computer-based systems and services among all people in all countries worldwide. Therefore, it is essential to consider the differences among user groups with different cultural backgrounds during user interface design. Interaction is defined as the means by which users communicate input to the system and the feedback supplied by the system. [1]&lt;br /&gt;
Thus the design of computer user interfaces for multicultural groups presents a challenge to interface designers since, for user interface behavior to be perceived as a message it must be observed by someone, and it must elicit meaning. The meanings and interpretations of these messages depends on how the participants perceive the message, and this perception is dependent on the participants’ cultural backgrounds that provide the framework within which messages are encoded and decoded. Culture therefore plays an important role in communication. [3]&lt;br /&gt;
Another communication challenge for Human Computer Interface design comes in the design stage between different teams trying to create a final product. &lt;br /&gt;
Thus we divide the communication challenges in two categories as follows: &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Multidisciplinary team communication consideration for HCI design and use: ===&lt;br /&gt;
&lt;br /&gt;
The development team working for designing the HCI should consist of people from a variety of disciplines, including human factors, programming, graphic design, documentation, marketing and management. While these people bring different areas of expertise to a project, they frequently have different agendas. Ideally, team members will communicate to reach a common ground, and work towards a shared vision of the final product. Communication problems and lack of consensus within a diverse group can hinder the design in its initial stages, and as development progresses. After decisions are finalized, poor communication can prevent design decisions from being applied. Issues should be resolved clearly, and decisions enforced, to reduce implementation error and costly revisions.&lt;br /&gt;
Schedules and requirements of departments external to development frequently impact the flexibility of the design as documented. The importance of coordinating schedules and communicating design revisions with departments supporting application development should be understood by designers. Revision once development is underway may be limited or precluded by the needs of departments such as Documentation, Graphic Design, Marketing, and Quality Assurance. [2]&lt;br /&gt;
&lt;br /&gt;
=== Cross cultural communication consideration for HCI design and use: ===&lt;br /&gt;
&lt;br /&gt;
As mentioned earlier for user interface behavior to be perceived as a message it must be observed by someone, and it must elicit meaning. The meanings and interpretations of these messages would depend on how the participants perceive the message, and this perception is dependent on the participants cultural background.&lt;br /&gt;
&lt;br /&gt;
For e.g. the garbage can symbol on the Windows OS represents deleted items this idea is intuitive to people who have seen garbage cans but it is possible that in some other part of the world the people do not know the concept of garbage can and so the garbage can symbol would mean nothing to them. &lt;br /&gt;
Thus when trying to design a HCI to communicate with people from different cultural background:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt; &lt;br /&gt;
The first step is to determine user differences to find out which user characteristics predict differences in overall performance.&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&lt;br /&gt;
The next step is to isolate the source of variation in a particular task&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&lt;br /&gt;
The final step is to redesign the interface to accommodate the differences among users [3] &lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Organizational Considerations ==&lt;br /&gt;
A good HCI should take into account the business rules and operating procedures of a particular organization.  If organizational factors are not taken into account, the end result could be software that is verifiably correct, but not useful for its purpose.  One way of accomplishing this is through frequent interaction between the designer and the client (the organization). The Manifesto For Agile Software Development &amp;lt;http://agilemanifesto.org/principles.html&amp;gt; suggests that designers follow a twelve principles approach.  A few of the key principles can be summarized into the following (Manifesto for Agile Software Development, 2001):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h5&amp;gt;Software should follow an evolutionary life cycle.&amp;lt;/h5&amp;gt;  &amp;lt;i&amp;gt;That is, the software should be prototyped at various stages in the development cycle and tested by the clients.  The clients should provide feedback relating to their likes and dislikes about the prototype.  This iterative design process assures that the client is getting software that is not simply correct, but also useful to the organization.&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h5&amp;gt; A Time Boxed project management approach should be applied.&amp;lt;/h5&amp;gt; &amp;lt;i&amp;gt; Milestones should be small and manageable, and distinct.  In other words, if a client is not satisfied by a particular prototype, the developers should be able to work on the next milestone and correcting the current milestone in parallel.  According to the manifesto, this allows the project to still be completed in a timely manner.&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h5&amp;gt;Maximize the amount of work not done.&amp;lt;/h5&amp;gt;&amp;lt;i&amp;gt;  This, however, is not to say that the software should not perform all of the intended tasks.  This principle states that the software should be kept simple.  It should be exactly what the client has requested, and not more than that.&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Cultural Considerations==&lt;br /&gt;
HCI or Human Computer Interaction, is a study of how people interact with computers and to what extent computers are developed for successful&lt;br /&gt;
interaction with human beings.&lt;br /&gt;
One of the most important factors of HCI is the fact that different users form different conceptions or mental models about their interactions&lt;br /&gt;
and have different ways of learning and keeping knowledge and skills.&lt;br /&gt;
In addition to this cultural differences play a part.&lt;br /&gt;
&lt;br /&gt;
Living in a globalized world, cultural identities strongly influence our interpretation of behaviour in others. Users are forced to adapt their way of interaction and interpretation&lt;br /&gt;
to a given perspective.&lt;br /&gt;
Earlier cultural background was not a key factor in designing computer systems, however now it is an important subject, since computers are used world wide. A great example is of the windows operating systems.&lt;br /&gt;
To a person who is familiar with a Recycle Bin, the icon of the Recycle Bin on the Desktop means delete an object. However, to people who have never seen a recycle bin, it may be a mystery.&lt;br /&gt;
&lt;br /&gt;
===Guidelines used during HCI construction===&lt;br /&gt;
&amp;lt;h5&amp;gt;Visibility of system status:&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;i&amp;gt;The system should always keep users informed about what is going on, through appropriate feedback within reasonable time.&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h5&amp;gt;Match between system and the real world:&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;i&amp;gt;The system should speak the users' language, with words, phrases and concepts familiar to the user, rather than system-oriented terms. Follow real-world conventions, making information appear in a natural and logical order. &amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h5&amp;gt;User control and freedom: &amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;i&amp;gt;Users often choose system functions by mistake and will need a clearly marked &amp;quot;emergency exit&amp;quot; to leave the unwanted state without having to go through an extended dialogue. Support undo and redo.&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h5&amp;gt;Consistency and standards:&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;i&amp;gt;Users should not have to wonder whether different words, situations, or actions mean the same thing. Follow platform conventions.&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h5&amp;gt;Error prevention:&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;i&amp;gt;Even better than good error messages is a careful design which prevents a problem from occurring in the first place. Either eliminate error-prone conditions or check for them and present users with a confirmation option before they commit to the action.&amp;lt;/i&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;h5&amp;gt;Recognition rather than recall&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;i&amp;gt;Minimize the user's memory load by making objects, actions, and options visible. The user should not have to remember information from one part of the dialogue to another. Instructions for use of the system should be visible or easily retrievable whenever appropriate. &amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h5&amp;gt;Flexibility and efficiency of use: &amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;i&amp;gt;Accelerators -- unseen by the novice user -- may often speed up the interaction for the expert user such that the system can cater to both inexperienced and experienced users. &amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h5&amp;gt;Allow users to tailor frequent actions&amp;lt;/h5&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;h5&amp;gt;Aesthetic and minimalist design:&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;i&amp;gt;Dialogues should not contain information which is irrelevant or rarely needed. Every extra unit of information in a dialogue competes with the relevant units of information and diminishes their relative visibility.&amp;lt;/i&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;h5&amp;gt;Help users recognize, diagnose, and recover from errors:&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;i&amp;gt;Error messages should be expressed in plain language (no codes), precisely indicate the problem, and constructively suggest a solution.&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h5&amp;gt;Help and documentation: &amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;i&amp;gt;Even though it is better if the system can be used without documentation, it may be necessary to provide help and documentation. Any such information should be easy to search, focused on the user's task, list concrete steps to be carried out, and not be too large.&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Conclusion===&lt;br /&gt;
As we know some non-educated people who are not familiar with technical devices, may be encouraged to use it if a well understood HCI is composed. Translating language for example is of no use if the user cannot read. &lt;br /&gt;
any entity that is meaningful to a culture may be added to the product so that it not only makes it easy for  people to use but adds emotional value hence a better liking for the product.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Bibliography==&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt; &lt;br /&gt;
[1] International Journal of Intercultural Relations. (2008). Cross-cultural influence on communication effectiveness and user interface design. Retrieved 11, 20, 2009, from International Journal of Intercultural Relations: http://www.contrib.andrew.cmu.edu/~ytseng/images/ibm/Cross-cultural influence.pdf&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt; &lt;br /&gt;
[2] Practical User Interface Design: Developing within Real-World Constraints. (1997). Retrieved 11, 20, 2009, from Conference on Human Factors in Computing Systems:  http://www.sigchi.org/chi97/proceedings/tutorial/dmh.htm&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt; &lt;br /&gt;
[3] Issues in the Design of Computer User Interfaces for Multicultural Communities. (1998). Retrieved 11, 20, 2009, from Issues in the Design of Computer User Interfaces for Multicultural Communities: http://www.it.murdoch.edu.au/~sudweeks/catac98/pdf/21_stander.pdf&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;&lt;br /&gt;
Manifesto for Agile Software Development. (2001). Principles Behind the Agile Manifesto. Retrieved 11 20, 2009, from Manifesto for Agile Software Development: http://agilemanifesto.org/principles.html&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;&lt;br /&gt;
http://www.useit.com/papers/heuristic/heuristic_list.html&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&lt;br /&gt;
http://www.springerlink.com/content/qr6m2fptevd730u1/&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Social_issues_influencing_HCI_design_and_use</id>
		<title>Social issues influencing HCI design and use</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Social_issues_influencing_HCI_design_and_use"/>
				<updated>2009-11-23T05:04:28Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;Communication and culture additions&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Communication Considerations ==&lt;br /&gt;
&lt;br /&gt;
The concept of ‘user interfaces for all’ implies the availability of and easy access to computer-based systems and services among all people in all countries worldwide. Therefore, it is essential to consider the differences among user groups with different cultural backgrounds during user interface design. Interaction is defined as the means by which users communicate input to the system and the feedback supplied by the system. [1]&lt;br /&gt;
Thus the design of computer user interfaces for multicultural groups presents a challenge to interface designers since, for user interface behavior to be perceived as a message it must be observed by someone, and it must elicit meaning. The meanings and interpretations of these messages depends on how the participants perceive the message, and this perception is dependent on the participants’ cultural backgrounds that provide the framework within which messages are encoded and decoded. Culture therefore plays an important role in communication. [3]&lt;br /&gt;
Another communication challenge for Human Computer Interface design comes in the design stage between different teams trying to create a final product. &lt;br /&gt;
Thus we divide the communication challenges in two categories as follows: &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Multidisciplinary team communication consideration for HCI design and use: ===&lt;br /&gt;
&lt;br /&gt;
The development team working for designing the HCI should consist of people from a variety of disciplines, including human factors, programming, graphic design, documentation, marketing and management. While these people bring different areas of expertise to a project, they frequently have different agendas. Ideally, team members will communicate to reach a common ground, and work towards a shared vision of the final product. Communication problems and lack of consensus within a diverse group can hinder the design in its initial stages, and as development progresses. After decisions are finalized, poor communication can prevent design decisions from being applied. Issues should be resolved clearly, and decisions enforced, to reduce implementation error and costly revisions.&lt;br /&gt;
Schedules and requirements of departments external to development frequently impact the flexibility of the design as documented. The importance of coordinating schedules and communicating design revisions with departments supporting application development should be understood by designers. Revision once development is underway may be limited or precluded by the needs of departments such as Documentation, Graphic Design, Marketing, and Quality Assurance. [2]&lt;br /&gt;
&lt;br /&gt;
=== Cross cultural communication consideration for HCI design and use: ===&lt;br /&gt;
&lt;br /&gt;
As mentioned earlier for user interface behavior to be perceived as a message it must be observed by someone, and it must elicit meaning. The meanings and interpretations of these messages would depend on how the participants perceive the message, and this perception is dependent on the participants cultural background.&lt;br /&gt;
&lt;br /&gt;
For e.g. the garbage can symbol on the Windows OS represents deleted items this idea is intuitive to people who have seen garbage cans but it is possible that in some other part of the world the people do not know the concept of garbage can and so the garbage can symbol would mean nothing to them. &lt;br /&gt;
Thus when trying to design a HCI to communicate with people from different cultural background:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt; &lt;br /&gt;
The first step is to determine user differences to find out which user characteristics predict differences in overall performance.&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&lt;br /&gt;
The next step is to isolate the source of variation in a particular task&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&lt;br /&gt;
The final step is to redesign the interface to accommodate the differences among users [3] &lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Cultural Considerations==&lt;br /&gt;
HCI or Human Computer Interaction, is a study of how people interact with computers and to what extent computers are developed for successful&lt;br /&gt;
interaction with human beings.&lt;br /&gt;
One of the most important factors of HCI is the fact that different users form different conceptions or mental models about their interactions&lt;br /&gt;
and have different ways of learning and keeping knowledge and skills.&lt;br /&gt;
In addition to this cultural differences play a part.&lt;br /&gt;
&lt;br /&gt;
Living in a globalized world, cultural identities strongly influence our interpretation of behaviour in others. Users are forced to adapt their way of interaction and interpretation&lt;br /&gt;
to a given perspective.&lt;br /&gt;
Earlier cultural background was not a key factor in designing computer systems, however now it is an important subject, since computers are used world wide. A great example is of the windows operating systems.&lt;br /&gt;
To a person who is familiar with a Recycle Bin, the icon of the Recycle Bin on the Desktop means delete an object. However, to people who have never seen a recycle bin, it may be a mystery.&lt;br /&gt;
&lt;br /&gt;
===Guidelines used during HCI construction===&lt;br /&gt;
&amp;lt;h5&amp;gt;Visibility of system status:&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;i&amp;gt;The system should always keep users informed about what is going on, through appropriate feedback within reasonable time.&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h5&amp;gt;Match between system and the real world:&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;i&amp;gt;The system should speak the users' language, with words, phrases and concepts familiar to the user, rather than system-oriented terms. Follow real-world conventions, making information appear in a natural and logical order. &amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h5&amp;gt;User control and freedom: &amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;i&amp;gt;Users often choose system functions by mistake and will need a clearly marked &amp;quot;emergency exit&amp;quot; to leave the unwanted state without having to go through an extended dialogue. Support undo and redo.&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h5&amp;gt;Consistency and standards:&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;i&amp;gt;Users should not have to wonder whether different words, situations, or actions mean the same thing. Follow platform conventions.&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h5&amp;gt;Error prevention:&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;i&amp;gt;Even better than good error messages is a careful design which prevents a problem from occurring in the first place. Either eliminate error-prone conditions or check for them and present users with a confirmation option before they commit to the action.&amp;lt;/i&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;h5&amp;gt;Recognition rather than recall&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;i&amp;gt;Minimize the user's memory load by making objects, actions, and options visible. The user should not have to remember information from one part of the dialogue to another. Instructions for use of the system should be visible or easily retrievable whenever appropriate. &amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h5&amp;gt;Flexibility and efficiency of use: &amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;i&amp;gt;Accelerators -- unseen by the novice user -- may often speed up the interaction for the expert user such that the system can cater to both inexperienced and experienced users. &amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h5&amp;gt;Allow users to tailor frequent actions&amp;lt;/h5&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;h5&amp;gt;Aesthetic and minimalist design:&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;i&amp;gt;Dialogues should not contain information which is irrelevant or rarely needed. Every extra unit of information in a dialogue competes with the relevant units of information and diminishes their relative visibility.&amp;lt;/i&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;h5&amp;gt;Help users recognize, diagnose, and recover from errors:&amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;i&amp;gt;Error messages should be expressed in plain language (no codes), precisely indicate the problem, and constructively suggest a solution.&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h5&amp;gt;Help and documentation: &amp;lt;/h5&amp;gt;&lt;br /&gt;
&amp;lt;i&amp;gt;Even though it is better if the system can be used without documentation, it may be necessary to provide help and documentation. Any such information should be easy to search, focused on the user's task, list concrete steps to be carried out, and not be too large.&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Conclusion===&lt;br /&gt;
As we know some non-educated people who are not familiar with technical devices, may be encouraged to use it if a well understood HCI is composed. Translating language for example is of no use if the user cannot read. &lt;br /&gt;
any entity that is meaningful to a culture may be added to the product so that it not only makes it easy for  people to use but adds emotional value hence a better liking for the product.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Bibliography==&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt; &lt;br /&gt;
[1] International Journal of Intercultural Relations. (2008). Cross-cultural influence on communication effectiveness and user interface design. Retrieved 11, 20, 2009, from International Journal of Intercultural Relations: http://www.contrib.andrew.cmu.edu/~ytseng/images/ibm/Cross-cultural influence.pdf&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt; &lt;br /&gt;
[2] Practical User Interface Design: Developing within Real-World Constraints. (1997). Retrieved 11, 20, 2009, from Conference on Human Factors in Computing Systems:  http://www.sigchi.org/chi97/proceedings/tutorial/dmh.htm&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt; &lt;br /&gt;
[3] Issues in the Design of Computer User Interfaces for Multicultural Communities. (1998). Retrieved 11, 20, 2009, from Issues in the Design of Computer User Interfaces for Multicultural Communities: http://www.it.murdoch.edu.au/~sudweeks/catac98/pdf/21_stander.pdf&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;&lt;br /&gt;
http://www.useit.com/papers/heuristic/heuristic_list.html&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&lt;br /&gt;
http://www.springerlink.com/content/qr6m2fptevd730u1/&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Template:Reflist</id>
		<title>Template:Reflist</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Template:Reflist"/>
				<updated>2009-11-23T04:37:21Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;New page: {{reflist|3}}&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{reflist|3}}&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Social_issues_influencing_HCI_design_and_use</id>
		<title>Social issues influencing HCI design and use</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Social_issues_influencing_HCI_design_and_use"/>
				<updated>2009-11-23T04:22:26Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Social issues influencing HCI design and use =&lt;br /&gt;
&lt;br /&gt;
== Communication Considerations ==&lt;br /&gt;
&lt;br /&gt;
stsssss [[classical liberalism]].&amp;lt;ref&amp;gt;Jeffers, 8–12; Nevins, 4–5&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist|3}}&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Social_issues_influencing_HCI_design_and_use</id>
		<title>Social issues influencing HCI design and use</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Social_issues_influencing_HCI_design_and_use"/>
				<updated>2009-11-23T04:20:56Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Social issues influencing HCI design and use =&lt;br /&gt;
&lt;br /&gt;
== Communication Considerations ==&lt;br /&gt;
&lt;br /&gt;
stsssss [[classical liberalism]].&amp;lt;ref&amp;gt;Jeffers, 8–12; Nevins, 4–5&amp;lt;/ref&amp;gt;&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Social_issues_influencing_HCI_design_and_use</id>
		<title>Social issues influencing HCI design and use</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Social_issues_influencing_HCI_design_and_use"/>
				<updated>2009-11-23T04:16:45Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;New page: = Social issues influencing HCI design and use =      &amp;lt;h4&amp;gt;   Group 3: &amp;lt;/h4&amp;gt; &amp;lt;UL&amp;gt;  &amp;lt;li&amp;gt;  Robert Hamilton &amp;lt;/li&amp;gt; &amp;lt;li&amp;gt; Daniel Moore &amp;lt;/li&amp;gt; &amp;lt;li&amp;gt;  Premal Parekh &amp;lt;/li&amp;gt; &amp;lt;li&amp;gt; Lokesh Thakur &amp;lt;/li&amp;gt; &amp;lt;/U...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Social issues influencing HCI design and use =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h4&amp;gt;&lt;br /&gt;
  Group 3:&lt;br /&gt;
&amp;lt;/h4&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt; &lt;br /&gt;
&amp;lt;li&amp;gt; &lt;br /&gt;
Robert Hamilton&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&lt;br /&gt;
Daniel Moore&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt; &lt;br /&gt;
Premal Parekh&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&lt;br /&gt;
Lokesh Thakur&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/User:Skip</id>
		<title>User:Skip</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/User:Skip"/>
				<updated>2009-11-14T01:48:07Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;/* Topics: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Human Computer Interaction =&lt;br /&gt;
&lt;br /&gt;
=='''This is the projects main page for cs4hc3 and se4f03''' -- ''HCI / CHI'' Courses.==&lt;br /&gt;
&lt;br /&gt;
===Objectives===&lt;br /&gt;
&lt;br /&gt;
===Logistics===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
  &amp;lt;li&amp;gt;&lt;br /&gt;
    During the middle of term the class will be divided into about 12 (n) groups, each of whom will negotiate amongst&lt;br /&gt;
    themselves a topic of concentration from the list below with at least three ranked by selected priority.&lt;br /&gt;
    At an early designated lecture, each group will be linked to a topic of their choice in a first-come/first-served&lt;br /&gt;
    basis -- only one group per project.&lt;br /&gt;
  &amp;lt;/li&amp;gt;&lt;br /&gt;
  &amp;lt;li&amp;gt;&lt;br /&gt;
    Group members should all have their associated member email addresses and use these to generate a wiki in one of the groups member names.  Note that ALL changes made to a wiki are logged by IP address of the machine, as well as time and date.  By law Derek MUST always be running an audit trail system which essentially operates as a key logger in that if any vandalism is done electronically, he can determine who is logged on, from where as well as what was typed.  This is a warning that anyone modifying a group's wiki who is NOT a member of that group will be caught and risk a zero grade for this assignment.  Therefore &amp;quot;play safe&amp;quot; and do not fool around.  (wfsp)&lt;br /&gt;
  &amp;lt;/li&amp;gt;&lt;br /&gt;
  &amp;lt;li&amp;gt;&lt;br /&gt;
    Just after several weeks of class duration, a created wiki from each group will be completed&lt;br /&gt;
    and marked.&lt;br /&gt;
  &amp;lt;/li&amp;gt;&lt;br /&gt;
  &amp;lt;li&amp;gt;&lt;br /&gt;
    Part of this mark will be composed of (n-1) other rankings from each of the other groups,&lt;br /&gt;
    who will rank and provide one sentence of what is best and one sentence of what is worst about the&lt;br /&gt;
    subject wiki under consideration.  The ranking for each wiki will be posted anonymously for class consideration and discussion near the end of term.&lt;br /&gt;
  &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Topics:===&lt;br /&gt;
Reference -- adapted from ACM (Association for Computing Machinery -- but people can join, too!) http://wiki.acm.org/cs2001/index.php?title=HUMAN-COMPUTER_INTERACTION&lt;br /&gt;
&amp;lt;OL&amp;gt;&lt;br /&gt;
  &amp;lt;Li&amp;gt; '''Motivation:''' Why the study of how people interact with technology is vital for the development of most usable and acceptable systems.&amp;lt;/Li&amp;gt;&lt;br /&gt;
  &amp;lt;Li&amp;gt; '''Contexts for HCI:''' mobile devices, consumer devices, business applications, web, business applications, collaboration systems, games, etc. (Taken by Group 8 -- wfsp/05nov09@14:00)&amp;lt;/Li&amp;gt;&lt;br /&gt;
  &amp;lt;Li&amp;gt; '''Process for user-centered development:''' early focus on users, empirical testing, iterative design.&amp;lt;/Li&amp;gt;&lt;br /&gt;
  &amp;lt;Li&amp;gt; '''Different measures for evaluation:''' utility, efficiency, learnability, user satisfaction. (Taken by Group 5 -- wfsp/10nov09@13:00)&amp;lt;/Li&amp;gt;&lt;br /&gt;
  &amp;lt;Li&amp;gt; '''Models that inform human-computer interaction (HCI) design:''' attention, perception and recognition, movement, and cognition.&amp;lt;/Li&amp;gt;&lt;br /&gt;
  &amp;lt;Li&amp;gt; '''Social issues influencing HCI design and use:''' culture, communication, and organizations. (Taken by Group 3 -- wfsp/13nov09@15:30) &amp;lt;/Li&amp;gt;&lt;br /&gt;
  &amp;lt;Li&amp;gt; '''Accommodating human diversity:''' including universal design and accessibility and designing for multiple cultural and linguistic contexts. (Taken by Group 9 -- wfsp/12nov09@13:30)&amp;lt;/Li&amp;gt;&lt;br /&gt;
  &amp;lt;Li&amp;gt; The most '''common''' interface '''design mistakes'''. (Taken by Group 1 -- wfsp/04nov09@17:00)&amp;lt;/Li&amp;gt;&lt;br /&gt;
  &amp;lt;Li&amp;gt; '''User interface standards'''. (Taken by Group 6 -- wfsp/05nov09@19:30)&amp;lt;/Li&amp;gt;&lt;br /&gt;
  &amp;lt;Li&amp;gt; The '''five interaction styles''' as espoused by [[B.Scheidermann]]. (Taken by Group 7 -- wfsp/04nov09@17:30)&amp;lt;/Li&amp;gt;&lt;br /&gt;
  &amp;lt;Li&amp;gt; The '''Object-Action''' (or visa-versa) '''model''' and its applications. &amp;lt;/Li&amp;gt;&lt;br /&gt;
  &amp;lt;Li&amp;gt; The '''direct manipulation method''' and its importance to CHI. (Taken by Group 4 -- wfsp/06nov09@09:30) &amp;lt;/Li&amp;gt;&lt;br /&gt;
&amp;lt;/OL&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=='''This is the VRML assignment main page for cs4hc3 and se4f03''' &amp;lt;br&amp;gt; -- ''HCI / CHI'' Courses.==&lt;br /&gt;
&lt;br /&gt;
===Some Important References:===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
  &amp;lt;li&amp;gt;&lt;br /&gt;
    The Custom Courseware for this course has an Appendix section for VRML beginners so this is a good place to begin studying if you are not familiar with the Virtual Reality Modelling Language.  We will be using this to create 3-D interfaces for 3-D worlds, just to get some practice in thinking in more than two dimensions.  Although VRML has been around for more than a decade, it is still found as the 3-D layer in MPEG4, has been updated and in a standard in the W3C world known as X3D, which is just VRML with &amp;lt;elements&amp;gt; instead of reserved keywords.  If you know VRML, you know X3D.&lt;br /&gt;
  &amp;lt;/li&amp;gt;&lt;br /&gt;
  &amp;lt;li&amp;gt;&lt;br /&gt;
    To begin our study of the Virtual Reality Modeling Language (VRML), we need to get setup to view the VRML code (which is in pure ASCII, as is Javascript, etc.)  To create VRML, use any ASCII editor that you like best.  I use Crimson Editor which has a built-in context sensitive markup that understands VRML, so it is easy to distinguish comments from verbs and nouns, etc.&lt;br /&gt;
Go to http://sourceforge.net/projects/emeraldeditor/files/ where Emerald Editor (the newest version of the Crimson editor) can be downloaded freely.  To interpret VRML code (nested in HTML code) you need a plug-in.  The best that I have found is called Cortona from Parallel Graphics at http://www.cortona3d.com/cortona/ .  It works best with Apple Safari Browser version 4 from http://www.apple.com/safari/download/ .  All of this information is at the end of the course web site section on VRML at http://www.cas.mcmaster.ca/~se4d03/demo.html#VRML headed with the title &amp;quot;Recommended Client Applications&amp;quot;.  By the way, Parallel Graphics has an editor called VRMLPad that is not free but can be downloaded as a trial version, which may help the beginner as it provides a thumbnail sketch at the margin right when it recognizes any VRML code shape primitives -- interesting thing to see work.&lt;br /&gt;
  &amp;lt;/li&amp;gt;&lt;br /&gt;
  &amp;lt;li&amp;gt;&lt;br /&gt;
    As far as web references go, the best place to start is on the course web site: &amp;lt;br&amp;gt; --&lt;br /&gt;
    http://www.cas.mcmaster.ca/~se4d03/demo.html#VRML &lt;br /&gt;
  &amp;lt;/li&amp;gt;&lt;br /&gt;
  &amp;lt;ol&amp;gt;&lt;br /&gt;
    &amp;lt;li&amp;gt;&lt;br /&gt;
      Once here you can take the tutorial, done by a senior thesis student Polo Cerone several year's ago.&lt;br /&gt;
      It can be taken on-line or downloaded and worked through locally -- either is equivalent.&lt;br /&gt;
    &amp;lt;/li&amp;gt;&lt;br /&gt;
    &amp;lt;li&amp;gt;&lt;br /&gt;
      Once the tutorial is taken, there are many example VRML code snippets that can be viewed with whatever browser plug-in that you have installed.  Pay particular attention to the graduated examples that show how one specifically goes about creating an interface in VRML that controls objects in the main scene graph.  This is located back near the beginning of the VRML section titled &amp;quot;Graduated VRML2 Interface Examples&amp;quot;.&lt;br /&gt;
    &amp;lt;/li&amp;gt;&lt;br /&gt;
  &amp;lt;/ol&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/User:Skip</id>
		<title>User:Skip</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/User:Skip"/>
				<updated>2009-11-12T22:01:37Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;/* Topics: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Human Computer Interaction =&lt;br /&gt;
&lt;br /&gt;
=='''This is the projects main page for cs4hc3 and se4f03''' -- ''HCI / CHI'' Courses.==&lt;br /&gt;
&lt;br /&gt;
===Objectives===&lt;br /&gt;
&lt;br /&gt;
===Logistics===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
  &amp;lt;li&amp;gt;&lt;br /&gt;
    During the middle of term the class will be divided into about 12 (n) groups, each of whom will negotiate amongst&lt;br /&gt;
    themselves a topic of concentration from the list below with at least three ranked by selected priority.&lt;br /&gt;
    At an early designated lecture, each group will be linked to a topic of their choice in a first-come/first-served&lt;br /&gt;
    basis -- only one group per project.&lt;br /&gt;
  &amp;lt;/li&amp;gt;&lt;br /&gt;
  &amp;lt;li&amp;gt;&lt;br /&gt;
    Group members should all have their associated member email addresses and use these to generate a wiki in one of the groups member names.  Note that ALL changes made to a wiki are logged by IP address of the machine, as well as time and date.  By law Derek MUST always be running an audit trail system which essentially operates as a key logger in that if any vandalism is done electronically, he can determine who is logged on, from where as well as what was typed.  This is a warning that anyone modifying a group's wiki who is NOT a member of that group will be caught and risk a zero grade for this assignment.  Therefore &amp;quot;play safe&amp;quot; and do not fool around.  (wfsp)&lt;br /&gt;
  &amp;lt;/li&amp;gt;&lt;br /&gt;
  &amp;lt;li&amp;gt;&lt;br /&gt;
    Just after several weeks of class duration, a created wiki from each group will be completed&lt;br /&gt;
    and marked.&lt;br /&gt;
  &amp;lt;/li&amp;gt;&lt;br /&gt;
  &amp;lt;li&amp;gt;&lt;br /&gt;
    Part of this mark will be composed of (n-1) other rankings from each of the other groups,&lt;br /&gt;
    who will rank and provide one sentence of what is best and one sentence of what is worst about the&lt;br /&gt;
    subject wiki under consideration.  The ranking for each wiki will be posted anonymously for class consideration and discussion near the end of term.&lt;br /&gt;
  &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Topics:===&lt;br /&gt;
Reference -- adapted from ACM (Association for Computing Machinery -- but people can join, too!) http://wiki.acm.org/cs2001/index.php?title=HUMAN-COMPUTER_INTERACTION&lt;br /&gt;
&amp;lt;OL&amp;gt;&lt;br /&gt;
  &amp;lt;Li&amp;gt; '''Motivation:''' Why the study of how people interact with technology is vital for the development of most usable and acceptable systems.&amp;lt;/Li&amp;gt;&lt;br /&gt;
  &amp;lt;Li&amp;gt; '''Contexts for HCI:''' mobile devices, consumer devices, business applications, web, business applications, collaboration systems, games, etc. (Taken by Group 8 -- wfsp/05nov09@14:00)&amp;lt;/Li&amp;gt;&lt;br /&gt;
  &amp;lt;Li&amp;gt; '''Process for user-centered development:''' early focus on users, empirical testing, iterative design.&amp;lt;/Li&amp;gt;&lt;br /&gt;
  &amp;lt;Li&amp;gt; '''Different measures for evaluation:''' utility, efficiency, learnability, user satisfaction. (Taken by Group 5 -- wfsp/10nov09@13:00)&amp;lt;/Li&amp;gt;&lt;br /&gt;
  &amp;lt;Li&amp;gt; '''Models that inform human-computer interaction (HCI) design:''' attention, perception and recognition, movement, and cognition.&amp;lt;/Li&amp;gt;&lt;br /&gt;
  &amp;lt;Li&amp;gt; '''Social issues influencing HCI design and use:''' culture, communication, and organizations.&amp;lt;/Li&amp;gt;&lt;br /&gt;
  &amp;lt;Li&amp;gt; '''Accommodating human diversity:''' including universal design and accessibility and designing for multiple cultural and linguistic contexts. (Taken by Group 9 -- wfsp/12nov09@13:30)&amp;lt;/Li&amp;gt;&lt;br /&gt;
  &amp;lt;Li&amp;gt; The most '''common''' interface '''design mistakes'''. (Taken by Group 1 -- wfsp/04nov09@17:00)&amp;lt;/Li&amp;gt;&lt;br /&gt;
  &amp;lt;Li&amp;gt; '''User interface standards'''. (Taken by Group 6 -- wfsp/05nov09@19:30)&amp;lt;/Li&amp;gt;&lt;br /&gt;
  &amp;lt;Li&amp;gt; The '''five interaction styles''' as espoused by [[B.Scheidermann]]. (Taken by Group 7 -- wfsp/04nov09@17:30)&amp;lt;/Li&amp;gt;&lt;br /&gt;
  &amp;lt;Li&amp;gt; The '''Object-Action''' (or visa-versa) '''model''' and its applications. (Taken by Group 2 -- wfsp/12nov09@17:00)&amp;lt;/Li&amp;gt;&lt;br /&gt;
  &amp;lt;Li&amp;gt; The '''direct manipulation method''' and its importance to CHI. (Taken by Group 4 -- wfsp/06nov09@09:30) &amp;lt;/Li&amp;gt;&lt;br /&gt;
&amp;lt;/OL&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=='''This is the VRML assignment main page for cs4hc3 and se4f03''' &amp;lt;br&amp;gt; -- ''HCI / CHI'' Courses.==&lt;br /&gt;
&lt;br /&gt;
===Some Important References:===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
  &amp;lt;li&amp;gt;&lt;br /&gt;
    The Custom Courseware for this course has an Appendix section for VRML beginners so this is a good place to begin studying if you are not familiar with the Virtual Reality Modelling Language.  We will be using this to create 3-D interfaces for 3-D worlds, just to get some practice in thinking in more than two dimensions.  Although VRML has been around for more than a decade, it is still found as the 3-D layer in MPEG4, has been updated and in a standard in the W3C world known as X3D, which is just VRML with &amp;lt;elements&amp;gt; instead of reserved keywords.  If you know VRML, you know X3D.&lt;br /&gt;
  &amp;lt;/li&amp;gt;&lt;br /&gt;
  &amp;lt;li&amp;gt;&lt;br /&gt;
    To begin our study of the Virtual Reality Modeling Language (VRML), we need to get setup to view the VRML code (which is in pure ASCII, as is Javascript, etc.)  To create VRML, use any ASCII editor that you like best.  I use Crimson Editor which has a built-in context sensitive markup that understands VRML, so it is easy to distinguish comments from verbs and nouns, etc.&lt;br /&gt;
Go to http://sourceforge.net/projects/emeraldeditor/files/ where Emerald Editor (the newest version of the Crimson editor) can be downloaded freely.  To interpret VRML code (nested in HTML code) you need a plug-in.  The best that I have found is called Cortona from Parallel Graphics at http://www.cortona3d.com/cortona/ .  It works best with Apple Safari Browser version 4 from http://www.apple.com/safari/download/ .  All of this information is at the end of the course web site section on VRML at http://www.cas.mcmaster.ca/~se4d03/demo.html#VRML headed with the title &amp;quot;Recommended Client Applications&amp;quot;.  By the way, Parallel Graphics has an editor called VRMLPad that is not free but can be downloaded as a trial version, which may help the beginner as it provides a thumbnail sketch at the margin right when it recognizes any VRML code shape primitives -- interesting thing to see work.&lt;br /&gt;
  &amp;lt;/li&amp;gt;&lt;br /&gt;
  &amp;lt;li&amp;gt;&lt;br /&gt;
    As far as web references go, the best place to start is on the course web site: &amp;lt;br&amp;gt; --&lt;br /&gt;
    http://www.cas.mcmaster.ca/~se4d03/demo.html#VRML &lt;br /&gt;
  &amp;lt;/li&amp;gt;&lt;br /&gt;
  &amp;lt;ol&amp;gt;&lt;br /&gt;
    &amp;lt;li&amp;gt;&lt;br /&gt;
      Once here you can take the tutorial, done by a senior thesis student Polo Cerone several year's ago.&lt;br /&gt;
      It can be taken on-line or downloaded and worked through locally -- either is equivalent.&lt;br /&gt;
    &amp;lt;/li&amp;gt;&lt;br /&gt;
    &amp;lt;li&amp;gt;&lt;br /&gt;
      Once the tutorial is taken, there are many example VRML code snippets that can be viewed with whatever browser plug-in that you have installed.  Pay particular attention to the graduated examples that show how one specifically goes about creating an interface in VRML that controls objects in the main scene graph.  This is located back near the beginning of the VRML section titled &amp;quot;Graduated VRML2 Interface Examples&amp;quot;.&lt;br /&gt;
    &amp;lt;/li&amp;gt;&lt;br /&gt;
  &amp;lt;/ol&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Wi-Fi</id>
		<title>Wi-Fi</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Wi-Fi"/>
				<updated>2009-04-13T00:19:31Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;/* External Links */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Wifilogo.jpg|thumb|Wi-Fi logo]]&lt;br /&gt;
''Wi-Fi is a consortium that verifies 802.11b wireless network products interoperate, and a marketing term vendors use to sell their products.''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Wi-Fi is a subsection of the IEEE 802, a subcategory in the link layer of the TCP/IP [[The Five-Layer TCP/IP Model: Description/Attacks/Defense|Internet Protocol Suite]]. The Wi-Fi alliance is a trade group that owns the 'Wi-Fi' trademark, a symbol that certifies interoperability between wireless devices. Not every Internet product is Wi-Fi certified however, and there exists many devices that are able to interoperate wirelessly without the Wi-Fi logo. Some products have chosen to omit having Wi-Fi certification to avoid paying certification costs.&lt;br /&gt;
&lt;br /&gt;
The use of Wi-Fi has boomed in recent years and is supported by a multitude of different devices. Laptops. game consoles, smartphones, printers and other peripherals usually have Wi-Fi certification. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
[[Image:Metro Wireless Node.jpg|thumb|A municipal wireless antenna. Such devices are integral in creating a mesh network of access points. ]]&lt;br /&gt;
Wi-Fi was invented by Vic Hayes (dubbed 'the father of Wi-Fi') at the NCR Corporation/AT &amp;amp; T (later Lucent &amp;amp; Agere Systems), in 1991. Hayes had been designing IEEE standards for 802.11b, 802.11a and 802.11g and subsequent technology, initially meant for cashier systems. NCR initially released the technology under the name of 'WaveLAN' which operated in a range of 1Mbps-2 Mbps. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; The Wi-Fi alliance was created soon after the technology. &lt;br /&gt;
&lt;br /&gt;
The alliance is a consortium of separate, independent companies that promotes and develops IEEE 802.11 standards. The alliance also tests products to establish interoperability and certifies products that pass. The 'Wi-Fi' logo is allowed to be used by manufacturers who subscribe to the alliance and whose products pass testing. There exists sever unofficial &amp;quot;Wi-Fi&amp;quot; products that may work, but lack true certification.&amp;lt;sup&amp;gt;[6]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The term &amp;quot;Wi-Fi&amp;quot; was coined by Interbrand Corporation in August 1999 when hired by the Alliance to change the name from 'IEEE 802.11b Direct Sequence.' Interbrand also created the official 'Wi-Fi' logo. It is often assumed that Wi-Fi stands for &amp;quot;Wireless Fidelity&amp;quot;, however officially Wi-Fi is an abstract term and the Wi-Fi alliance is trying to downplay any association to &amp;quot;Hi-Fi&amp;quot; (High Fidelity).&lt;br /&gt;
&lt;br /&gt;
Many cities globally, have announced plans for a city-wide Wi-Fi network. Many such project have since been cancelled due to unforseen difficulties however, a few (such as Sunnyvale, California) were successful. The city-wide networks were created by meshing several wireless antenna together and effectively creating a very large hotspot.&lt;br /&gt;
&lt;br /&gt;
==Uses==&lt;br /&gt;
There are typically two ses for Wi-Fi: it can be used as an access technology whereby a single base station (access point) accomodates multiple clients, or it can be used in a point-to-point configuration, connecting exactly 2 access points. The latter is typically reserved for standard 802.16 (Wi-Max) and used by network providers or corporations to connect two sites. &lt;br /&gt;
&lt;br /&gt;
A Wi-Fi enabled device can connect to the internet if the access point it reaches is part of a network containing the internet. A wi-Fi enabled device can essentially use the internet for any networking purpose. &lt;br /&gt;
&lt;br /&gt;
There exists many wireless 'hotspots' which integrate one or more access points and the hotspots can span a range of a few meters to several kilometers( Sunnyvale, California for example, offers free city-wide Wi-Fi). Many businesses offer wireless hotspots as either free or pay services in order to attract customers. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi devices can operate in different modes such as peer-to-peer mode, which allows a direct connection between two people. In ad-hoc mode Wi-Fi devices are able to make client-to-client connections without a router. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi can enable wireless voice application (VoIP). The widespread growth of Wi-Fi now allows access to the internet outside 'traditional' setups (such as the bathroom). Wi-Fi installations can ultimately provide: a sequre computer networking gateway, firewall, DHCP server, intrusion detection system and many other services.&amp;lt;sup&amp;gt;[7]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Advantages and Challenges==&lt;br /&gt;
Wi-Fi uses an unlicensed radio spectrum (unlike packet radio systems) and does not require regulatory approval for individual developers, which makes Wi-Fi products widely available. Different brands are able to make products that are interoperable at a basic service level because of the technological foundations in Wi-Fi. Competition amounsts vendors has also considerably lowered prices of Wi-Fi products, and they continue to drop as technology improves. &amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Wi-Fi  allows local area networks (LANs) to be set up without wires, which simultaneously lowers costs (of creating and exapnding) and allows much freedom in where a network can be accessed. The Wi-Fi certification aheres to a global set of standards as well so Wi-Fi products are compatible in any region. &lt;br /&gt;
&lt;br /&gt;
===Range===&lt;br /&gt;
[[Image:Point-to-point-wifi-antenna.jpg|thumb|A point-to-point parabolic Wi-Fi antenna. Such devices can dramatically increase the range of a Wi-Fi network (in a single direction). The devices may be costly to buy and run however.]]&lt;br /&gt;
&lt;br /&gt;
Typically a Wi-Fi router in a home setup with a 802.11b stock antenna has a range of about 32m indoors (due to barriers like walls) and about 95m with no obstructions, outdoors. The frequency block a router uses also affects the range: 2.4GHz has a greater range than 5 GHz. Wi-Fi has greater range compared to bluetooth and can provide huge outdoor range if a network incorporates a directional antenna.&lt;br /&gt;
&lt;br /&gt;
Wi-Fi began with IEEE standards for short range wireless broadband technology, and appointed the standard numbers: 802.11b(Wi-Fi), 802.11a and 802.11g (can interoperate with 802.11b). Typically Wi-Fi operates between 2.5 to 4Mbps, but can go as high as 11 Mbps.&lt;br /&gt;
&lt;br /&gt;
===Mobility===&lt;br /&gt;
Wi-Fi technology allows LANs to be deployed without cabling, potentially reducing the costs of network deployment and expansion. Spaces where cables cannont be run, such as outdoor areas or historical buildings can host wireless LANs. Wi-Fi technology increases the ease of setting up a network as well. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi networks support roaming, in which a mobile client station (like a laptop or smartphone) can move from one access point to another as the user moves. It is because Wi-Fi certified devices are able to interoperate that this is possible without complications as well.&lt;br /&gt;
&lt;br /&gt;
==Security==&lt;br /&gt;
The greatest security issue with Wi-Fi (and all other wireless networks) is the easy of connectivity compared to traditional wired networks like Ethernet. Wireless communication (bluetooth especially) is designed to be simple and easily connected to. To make an attack on a wired network, the attacker must physically connect to the internal network or break through an external firewall. External access however is usually disallowed by business networks in order to protect sensitive data. It is because firewall encryption could be broken that most business networks disallow external access. Getting wireless reception is considered an attack to most business networks.&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The nature most wireless networks is to allow external access in order to maintain an degree of usability. If attackers gain access to a wireless network they can harm the user in a variety of ways from monitoring others' activity to fabricating a DNS spoofing attack. &lt;br /&gt;
&lt;br /&gt;
===Preventative Measures===&lt;br /&gt;
[[Image:Wep.gif|thumb|The WEP encryption standard. The vunerabilities are shown by malicious software and a single key for all users on the network.]]&lt;br /&gt;
WEP (Wired Equivalent Privacy) keys uses a deprecated algorithm to secure Wireless networks. First introduced in 1997, WEP keys were intended to make wireless networks have comparable security to that of wired networks. A WEP key could be interpreted as a 26 digit password allowing access to a home network. There are several security flaws in the WEP keys currently being used and there exists readily available software (such as AirSnort or AirCrack) that can obtain a WEP key in minutes. WEP keys are now considered completely broken. The security flaws of WEP keys was first counteracted in 2002 with 'Wi-Fi Protected Access' (WPA) but the attack vector are now known. Now (as of 2004), full IEEE 802.11i (WPA2) encryption standards have been release and are still considered secure as of 2009. &lt;br /&gt;
&lt;br /&gt;
Another security measure in effect involves suppressing the Access Points' SSID broadcast to only allow a predefined set of MAC addresses the ability to join the network. This security measure has since proven ineffective, since if an allowed MAC address is known (or found out) by an attacker then they could potentially change their own MAC address to spoof as an allowed machine.  &lt;br /&gt;
&lt;br /&gt;
===DNS Spoofing and Kaminsky Attack===&lt;br /&gt;
In June 2005 Dan Kaminsky used a DNS hack in order to get free Wi-Fi at an area starbucks. He later realized the huge security issues this presented and brought attention to the Wi-Fi and DNS security flaws. Starbucks offers a Wi-Fi service but it costs a premium, the Kaminsky hack fools the domain name system and thorough Wi-Fi, exposed a glaring Internet security flaw. &lt;br /&gt;
&lt;br /&gt;
The following is an excerpt from WIRED magazine:&lt;br /&gt;
&lt;br /&gt;
'''How DNS works'''&lt;br /&gt;
&lt;br /&gt;
1. Type anybank.com into your Web brower and the query packet is sent to your internet service provider (ISP)&lt;br /&gt;
&lt;br /&gt;
2. If anybank.com's location isn't cached, your ISP's name server repeatedly searches the domain name system for it. Each search is assigned a 16-bit transaction ID for security and tracking. Responses to the searches must carry the correct transaction ID to be accepted by the name server. The packet would travel through the root name server, the .com name server then anybank.com name server.&lt;br /&gt;
&lt;br /&gt;
3. Eventually, anybank.com sends an answer to your ISP; Our home page is at 60.190.216.103. This authenticated address is cached.&lt;br /&gt;
&lt;br /&gt;
4. Your browser connects you.&lt;br /&gt;
&lt;br /&gt;
'''How the Kaminsky DNS hack works'''&lt;br /&gt;
&lt;br /&gt;
1. The attacker tries to hijack anybank.com by sending thousands of requests for fake Web pages. Malicious query packets are sent to your ISP.&lt;br /&gt;
&lt;br /&gt;
2. The ISP gives each query a transaction ID (unknown to the attacker) and attempts to locates the pages.&lt;br /&gt;
&lt;br /&gt;
3. At the same time, the attacker sends hundreds of responses for each malicious request. Every answer includes a randomly generated ID number.&lt;br /&gt;
&lt;br /&gt;
4. Eventually one of the answers carries an ID that matches, tricking the ISP into accepting and caching the information. The now-legitimized answer contains false details about anybank.com, such as the location of its servers. Legitimate answers from anybank.com(&amp;quot;No such page exists&amp;quot;) will now be rejected.&lt;br /&gt;
&lt;br /&gt;
5. Users looking for anybank.com get sent to the fake location already in the ISP's cache.&lt;br /&gt;
&lt;br /&gt;
6. Anybank.com customers are now using a look-alike site built by the hacker.&lt;br /&gt;
&lt;br /&gt;
'''Patch fixing Kaminsky attack'''&lt;br /&gt;
&lt;br /&gt;
Most computers have 63, 536 ports, but DNS commonly uses only port 53 for all queries and responses. The patch works by randomly changing the port number for each DNS request. Now any response to a request must contain an accurate transaction ID number and return to the same port. The change increases the odds of beating the system from one in 65, 536 to one in 4 billion.&amp;lt;sup&amp;gt;[4]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Piggybacking===&lt;br /&gt;
Piggybacking refers to accessing a wireless internet connection by bringing a wireless device in range of another connection and using the service without the owners knowledge or permission. Piggybacking is completely outlawed in some jurisdictions, but allowed in others. It is not considered piggybacking if a bussiness offers a Wi-Fi hotspot for free or as a pay service. &lt;br /&gt;
&lt;br /&gt;
Piggybacking ofter goes unnoticed since most people only use a fraction of their upstream bandwidth. Piggybacking may also be carried out unintentionally, as most access points are configured without encryption (WPA2) and operating systems can automatically connect to wireless networks. The danger in piggybacking exists in users logging into an insecure network where illicit activity is conducted (danger for network owner) or sensitive information is broadcast (danger for user).&amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===The Wi-Fi Scam, Home Security Scam and Bluetooth Scam===&lt;br /&gt;
'The Real Hustle' a UK television show is premised as an educational program demonstrating how people are getting ripped-off by confidence men around the world. The hustlers demonstrate how easy it is to gain access to a Wireless network through various scams. &lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=jqic_aY3TqQ&amp;amp;feature=related Wi-Fi Scam], the hustlers hijack a wireless network then rename their own wireless network and route people to a dummy site that looks completely legitimate. &lt;br /&gt;
&lt;br /&gt;
In the Home Security Scam, the hustlers walk through a residential neighborhood and enter home wireless networks by either hacking WEP keys or finding an unlocked network. The hustlers then monitor others online activity.&lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=gvDp-DBh4Gc&amp;amp;feature=related Bluetooth Scam], the hustlers scan a shopping mall for bluetooth signals from mobile phones. Once a signal is found and a connection is made, the hustlers call their premium rate line and rack up a bill for the cell phone owner.&lt;br /&gt;
&lt;br /&gt;
There exists dozens of tutorials on the Internet on how to use Wi-Fi for illicit purposes, demonstrating just how vunerable a wireless network is.&lt;br /&gt;
&lt;br /&gt;
==Other 802 Standards and Amendments==&lt;br /&gt;
[http://en.wikipedia.org/wiki/IEEE_802 See: IEEE 802 Wiki]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
# Comer, D. E. (2006). Wi-Fi. ''Internetworking with TCP/IP'' (Fifth ed., pp. 419-441). Upper Saddle River, NJ: Pearson Prentice Hall.&lt;br /&gt;
# &amp;quot;[http://www.wilcorpinc.com/wifi_history.htm Wi-Fi History]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# &amp;quot;[http://networkbits.net/wireless-printing/80211-g-pros-cons-of-a-wireless-network-in-a-business-environment/ Pros and Cons...]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# Davis, Joshua (Dec 2008). Collapse. ''WIRED Magazine'' (pp. 200-205,224, 231)&lt;br /&gt;
# &amp;quot;[http://en.wikipedia.org/wiki/Piggybacking_(internet_access) Piggybacking]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# &amp;quot;[http://www.wi-fi.org/about_overview.php Overview of the Wi-Fi Alliance]&amp;quot;. Retrieved on 2009-04-08&lt;br /&gt;
# &amp;quot;[http://computer.howstuffworks.com/municipal-wifi.htm How Municipal Wi-Fi works]&amp;quot;. Retrieved on 2009-04-09&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks Denial of Service Attacks]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Security_for_Small_Home_Networks Security for Small Home Networks]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Peer_To_Peer_Network_Security Peer To Peer Network Security]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Man_in_the_Middle_Attack Man in the Middle Attacks]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Domain_Name_System Domain Name System (DNS)]&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Hamilr3|Hamilr3]] 20:19, 12 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Wi-Fi</id>
		<title>Wi-Fi</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Wi-Fi"/>
				<updated>2009-04-13T00:18:56Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;/* History */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Wifilogo.jpg|thumb|Wi-Fi logo]]&lt;br /&gt;
''Wi-Fi is a consortium that verifies 802.11b wireless network products interoperate, and a marketing term vendors use to sell their products.''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Wi-Fi is a subsection of the IEEE 802, a subcategory in the link layer of the TCP/IP [[The Five-Layer TCP/IP Model: Description/Attacks/Defense|Internet Protocol Suite]]. The Wi-Fi alliance is a trade group that owns the 'Wi-Fi' trademark, a symbol that certifies interoperability between wireless devices. Not every Internet product is Wi-Fi certified however, and there exists many devices that are able to interoperate wirelessly without the Wi-Fi logo. Some products have chosen to omit having Wi-Fi certification to avoid paying certification costs.&lt;br /&gt;
&lt;br /&gt;
The use of Wi-Fi has boomed in recent years and is supported by a multitude of different devices. Laptops. game consoles, smartphones, printers and other peripherals usually have Wi-Fi certification. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
[[Image:Metro Wireless Node.jpg|thumb|A municipal wireless antenna. Such devices are integral in creating a mesh network of access points. ]]&lt;br /&gt;
Wi-Fi was invented by Vic Hayes (dubbed 'the father of Wi-Fi') at the NCR Corporation/AT &amp;amp; T (later Lucent &amp;amp; Agere Systems), in 1991. Hayes had been designing IEEE standards for 802.11b, 802.11a and 802.11g and subsequent technology, initially meant for cashier systems. NCR initially released the technology under the name of 'WaveLAN' which operated in a range of 1Mbps-2 Mbps. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; The Wi-Fi alliance was created soon after the technology. &lt;br /&gt;
&lt;br /&gt;
The alliance is a consortium of separate, independent companies that promotes and develops IEEE 802.11 standards. The alliance also tests products to establish interoperability and certifies products that pass. The 'Wi-Fi' logo is allowed to be used by manufacturers who subscribe to the alliance and whose products pass testing. There exists sever unofficial &amp;quot;Wi-Fi&amp;quot; products that may work, but lack true certification.&amp;lt;sup&amp;gt;[6]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The term &amp;quot;Wi-Fi&amp;quot; was coined by Interbrand Corporation in August 1999 when hired by the Alliance to change the name from 'IEEE 802.11b Direct Sequence.' Interbrand also created the official 'Wi-Fi' logo. It is often assumed that Wi-Fi stands for &amp;quot;Wireless Fidelity&amp;quot;, however officially Wi-Fi is an abstract term and the Wi-Fi alliance is trying to downplay any association to &amp;quot;Hi-Fi&amp;quot; (High Fidelity).&lt;br /&gt;
&lt;br /&gt;
Many cities globally, have announced plans for a city-wide Wi-Fi network. Many such project have since been cancelled due to unforseen difficulties however, a few (such as Sunnyvale, California) were successful. The city-wide networks were created by meshing several wireless antenna together and effectively creating a very large hotspot.&lt;br /&gt;
&lt;br /&gt;
==Uses==&lt;br /&gt;
There are typically two ses for Wi-Fi: it can be used as an access technology whereby a single base station (access point) accomodates multiple clients, or it can be used in a point-to-point configuration, connecting exactly 2 access points. The latter is typically reserved for standard 802.16 (Wi-Max) and used by network providers or corporations to connect two sites. &lt;br /&gt;
&lt;br /&gt;
A Wi-Fi enabled device can connect to the internet if the access point it reaches is part of a network containing the internet. A wi-Fi enabled device can essentially use the internet for any networking purpose. &lt;br /&gt;
&lt;br /&gt;
There exists many wireless 'hotspots' which integrate one or more access points and the hotspots can span a range of a few meters to several kilometers( Sunnyvale, California for example, offers free city-wide Wi-Fi). Many businesses offer wireless hotspots as either free or pay services in order to attract customers. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi devices can operate in different modes such as peer-to-peer mode, which allows a direct connection between two people. In ad-hoc mode Wi-Fi devices are able to make client-to-client connections without a router. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi can enable wireless voice application (VoIP). The widespread growth of Wi-Fi now allows access to the internet outside 'traditional' setups (such as the bathroom). Wi-Fi installations can ultimately provide: a sequre computer networking gateway, firewall, DHCP server, intrusion detection system and many other services.&amp;lt;sup&amp;gt;[7]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Advantages and Challenges==&lt;br /&gt;
Wi-Fi uses an unlicensed radio spectrum (unlike packet radio systems) and does not require regulatory approval for individual developers, which makes Wi-Fi products widely available. Different brands are able to make products that are interoperable at a basic service level because of the technological foundations in Wi-Fi. Competition amounsts vendors has also considerably lowered prices of Wi-Fi products, and they continue to drop as technology improves. &amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Wi-Fi  allows local area networks (LANs) to be set up without wires, which simultaneously lowers costs (of creating and exapnding) and allows much freedom in where a network can be accessed. The Wi-Fi certification aheres to a global set of standards as well so Wi-Fi products are compatible in any region. &lt;br /&gt;
&lt;br /&gt;
===Range===&lt;br /&gt;
[[Image:Point-to-point-wifi-antenna.jpg|thumb|A point-to-point parabolic Wi-Fi antenna. Such devices can dramatically increase the range of a Wi-Fi network (in a single direction). The devices may be costly to buy and run however.]]&lt;br /&gt;
&lt;br /&gt;
Typically a Wi-Fi router in a home setup with a 802.11b stock antenna has a range of about 32m indoors (due to barriers like walls) and about 95m with no obstructions, outdoors. The frequency block a router uses also affects the range: 2.4GHz has a greater range than 5 GHz. Wi-Fi has greater range compared to bluetooth and can provide huge outdoor range if a network incorporates a directional antenna.&lt;br /&gt;
&lt;br /&gt;
Wi-Fi began with IEEE standards for short range wireless broadband technology, and appointed the standard numbers: 802.11b(Wi-Fi), 802.11a and 802.11g (can interoperate with 802.11b). Typically Wi-Fi operates between 2.5 to 4Mbps, but can go as high as 11 Mbps.&lt;br /&gt;
&lt;br /&gt;
===Mobility===&lt;br /&gt;
Wi-Fi technology allows LANs to be deployed without cabling, potentially reducing the costs of network deployment and expansion. Spaces where cables cannont be run, such as outdoor areas or historical buildings can host wireless LANs. Wi-Fi technology increases the ease of setting up a network as well. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi networks support roaming, in which a mobile client station (like a laptop or smartphone) can move from one access point to another as the user moves. It is because Wi-Fi certified devices are able to interoperate that this is possible without complications as well.&lt;br /&gt;
&lt;br /&gt;
==Security==&lt;br /&gt;
The greatest security issue with Wi-Fi (and all other wireless networks) is the easy of connectivity compared to traditional wired networks like Ethernet. Wireless communication (bluetooth especially) is designed to be simple and easily connected to. To make an attack on a wired network, the attacker must physically connect to the internal network or break through an external firewall. External access however is usually disallowed by business networks in order to protect sensitive data. It is because firewall encryption could be broken that most business networks disallow external access. Getting wireless reception is considered an attack to most business networks.&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The nature most wireless networks is to allow external access in order to maintain an degree of usability. If attackers gain access to a wireless network they can harm the user in a variety of ways from monitoring others' activity to fabricating a DNS spoofing attack. &lt;br /&gt;
&lt;br /&gt;
===Preventative Measures===&lt;br /&gt;
[[Image:Wep.gif|thumb|The WEP encryption standard. The vunerabilities are shown by malicious software and a single key for all users on the network.]]&lt;br /&gt;
WEP (Wired Equivalent Privacy) keys uses a deprecated algorithm to secure Wireless networks. First introduced in 1997, WEP keys were intended to make wireless networks have comparable security to that of wired networks. A WEP key could be interpreted as a 26 digit password allowing access to a home network. There are several security flaws in the WEP keys currently being used and there exists readily available software (such as AirSnort or AirCrack) that can obtain a WEP key in minutes. WEP keys are now considered completely broken. The security flaws of WEP keys was first counteracted in 2002 with 'Wi-Fi Protected Access' (WPA) but the attack vector are now known. Now (as of 2004), full IEEE 802.11i (WPA2) encryption standards have been release and are still considered secure as of 2009. &lt;br /&gt;
&lt;br /&gt;
Another security measure in effect involves suppressing the Access Points' SSID broadcast to only allow a predefined set of MAC addresses the ability to join the network. This security measure has since proven ineffective, since if an allowed MAC address is known (or found out) by an attacker then they could potentially change their own MAC address to spoof as an allowed machine.  &lt;br /&gt;
&lt;br /&gt;
===DNS Spoofing and Kaminsky Attack===&lt;br /&gt;
In June 2005 Dan Kaminsky used a DNS hack in order to get free Wi-Fi at an area starbucks. He later realized the huge security issues this presented and brought attention to the Wi-Fi and DNS security flaws. Starbucks offers a Wi-Fi service but it costs a premium, the Kaminsky hack fools the domain name system and thorough Wi-Fi, exposed a glaring Internet security flaw. &lt;br /&gt;
&lt;br /&gt;
The following is an excerpt from WIRED magazine:&lt;br /&gt;
&lt;br /&gt;
'''How DNS works'''&lt;br /&gt;
&lt;br /&gt;
1. Type anybank.com into your Web brower and the query packet is sent to your internet service provider (ISP)&lt;br /&gt;
&lt;br /&gt;
2. If anybank.com's location isn't cached, your ISP's name server repeatedly searches the domain name system for it. Each search is assigned a 16-bit transaction ID for security and tracking. Responses to the searches must carry the correct transaction ID to be accepted by the name server. The packet would travel through the root name server, the .com name server then anybank.com name server.&lt;br /&gt;
&lt;br /&gt;
3. Eventually, anybank.com sends an answer to your ISP; Our home page is at 60.190.216.103. This authenticated address is cached.&lt;br /&gt;
&lt;br /&gt;
4. Your browser connects you.&lt;br /&gt;
&lt;br /&gt;
'''How the Kaminsky DNS hack works'''&lt;br /&gt;
&lt;br /&gt;
1. The attacker tries to hijack anybank.com by sending thousands of requests for fake Web pages. Malicious query packets are sent to your ISP.&lt;br /&gt;
&lt;br /&gt;
2. The ISP gives each query a transaction ID (unknown to the attacker) and attempts to locates the pages.&lt;br /&gt;
&lt;br /&gt;
3. At the same time, the attacker sends hundreds of responses for each malicious request. Every answer includes a randomly generated ID number.&lt;br /&gt;
&lt;br /&gt;
4. Eventually one of the answers carries an ID that matches, tricking the ISP into accepting and caching the information. The now-legitimized answer contains false details about anybank.com, such as the location of its servers. Legitimate answers from anybank.com(&amp;quot;No such page exists&amp;quot;) will now be rejected.&lt;br /&gt;
&lt;br /&gt;
5. Users looking for anybank.com get sent to the fake location already in the ISP's cache.&lt;br /&gt;
&lt;br /&gt;
6. Anybank.com customers are now using a look-alike site built by the hacker.&lt;br /&gt;
&lt;br /&gt;
'''Patch fixing Kaminsky attack'''&lt;br /&gt;
&lt;br /&gt;
Most computers have 63, 536 ports, but DNS commonly uses only port 53 for all queries and responses. The patch works by randomly changing the port number for each DNS request. Now any response to a request must contain an accurate transaction ID number and return to the same port. The change increases the odds of beating the system from one in 65, 536 to one in 4 billion.&amp;lt;sup&amp;gt;[4]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Piggybacking===&lt;br /&gt;
Piggybacking refers to accessing a wireless internet connection by bringing a wireless device in range of another connection and using the service without the owners knowledge or permission. Piggybacking is completely outlawed in some jurisdictions, but allowed in others. It is not considered piggybacking if a bussiness offers a Wi-Fi hotspot for free or as a pay service. &lt;br /&gt;
&lt;br /&gt;
Piggybacking ofter goes unnoticed since most people only use a fraction of their upstream bandwidth. Piggybacking may also be carried out unintentionally, as most access points are configured without encryption (WPA2) and operating systems can automatically connect to wireless networks. The danger in piggybacking exists in users logging into an insecure network where illicit activity is conducted (danger for network owner) or sensitive information is broadcast (danger for user).&amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===The Wi-Fi Scam, Home Security Scam and Bluetooth Scam===&lt;br /&gt;
'The Real Hustle' a UK television show is premised as an educational program demonstrating how people are getting ripped-off by confidence men around the world. The hustlers demonstrate how easy it is to gain access to a Wireless network through various scams. &lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=jqic_aY3TqQ&amp;amp;feature=related Wi-Fi Scam], the hustlers hijack a wireless network then rename their own wireless network and route people to a dummy site that looks completely legitimate. &lt;br /&gt;
&lt;br /&gt;
In the Home Security Scam, the hustlers walk through a residential neighborhood and enter home wireless networks by either hacking WEP keys or finding an unlocked network. The hustlers then monitor others online activity.&lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=gvDp-DBh4Gc&amp;amp;feature=related Bluetooth Scam], the hustlers scan a shopping mall for bluetooth signals from mobile phones. Once a signal is found and a connection is made, the hustlers call their premium rate line and rack up a bill for the cell phone owner.&lt;br /&gt;
&lt;br /&gt;
There exists dozens of tutorials on the Internet on how to use Wi-Fi for illicit purposes, demonstrating just how vunerable a wireless network is.&lt;br /&gt;
&lt;br /&gt;
==Other 802 Standards and Amendments==&lt;br /&gt;
[http://en.wikipedia.org/wiki/IEEE_802 See: IEEE 802 Wiki]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
# Comer, D. E. (2006). Wi-Fi. ''Internetworking with TCP/IP'' (Fifth ed., pp. 419-441). Upper Saddle River, NJ: Pearson Prentice Hall.&lt;br /&gt;
# &amp;quot;[http://www.wilcorpinc.com/wifi_history.htm Wi-Fi History]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# &amp;quot;[http://networkbits.net/wireless-printing/80211-g-pros-cons-of-a-wireless-network-in-a-business-environment/ Pros and Cons...]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# Davis, Joshua (Dec 2008). Collapse. ''WIRED Magazine'' (pp. 200-205,224, 231)&lt;br /&gt;
# &amp;quot;[http://en.wikipedia.org/wiki/Piggybacking_(internet_access) Piggybacking]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# &amp;quot;[http://www.wi-fi.org/about_overview.php Overview of the Wi-Fi Alliance]&amp;quot;. Retrieved on 2009-04-08&lt;br /&gt;
# &amp;quot;[http://computer.howstuffworks.com/municipal-wifi.htm How Municipal Wi-Fi works]&amp;quot;. Retrieved on 2009-04-09&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks Denial of Service Attacks]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Security_for_Small_Home_Networks Security for Small Home Networks]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Peer_To_Peer_Network_Security Peer To Peer Network Security]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Man_in_the_Middle_Attack Man in the Middle Attacks]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Domain_Name_System Domain Name System (DNS)]&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Hamilr3|Hamilr3]] 00:51, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Wi-Fi</id>
		<title>Wi-Fi</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Wi-Fi"/>
				<updated>2009-04-13T00:18:20Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;/* Advantages and Challenges */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Wifilogo.jpg|thumb|Wi-Fi logo]]&lt;br /&gt;
''Wi-Fi is a consortium that verifies 802.11b wireless network products interoperate, and a marketing term vendors use to sell their products.''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Wi-Fi is a subsection of the IEEE 802, a subcategory in the link layer of the TCP/IP [[The Five-Layer TCP/IP Model: Description/Attacks/Defense|Internet Protocol Suite]]. The Wi-Fi alliance is a trade group that owns the 'Wi-Fi' trademark, a symbol that certifies interoperability between wireless devices. Not every Internet product is Wi-Fi certified however, and there exists many devices that are able to interoperate wirelessly without the Wi-Fi logo. Some products have chosen to omit having Wi-Fi certification to avoid paying certification costs.&lt;br /&gt;
&lt;br /&gt;
The use of Wi-Fi has boomed in recent years and is supported by a multitude of different devices. Laptops. game consoles, smartphones, printers and other peripherals usually have Wi-Fi certification. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
[[Image:Metro Wireless Node.jpg|thumb|A municipal wireless antenna. Such devices are integral in creating a mesh network of access points. ]]&lt;br /&gt;
Wi-Fi was invented by Vic Hayes (dubbed 'the father of Wi-Fi') at the NCR Corporation/AT &amp;amp; T (later Lucent &amp;amp; Agere Systems), in 1991. Hayes had been designing IEEE standards for 802.11b, 802.11a and 802.11g and subsequent technology, initially meant for cashier systems. NCR initially released the technology under the name of 'WaveLAN' which operated in a range of 1Mbps-2 Mbps. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; The Wi-Fi alliance was created soon after the technology. &lt;br /&gt;
&lt;br /&gt;
The alliance is a consortium of separate, independent companies that promotes and develops IEEE 802.11 standards. The alliance also tests products to establish interoperability and certifies products that pass. The 'Wi-Fi' logo is allowed to be used by manufacturers who subscribe to the alliance and whose products pass testing. There exists sever unofficial &amp;quot;Wi-Fi&amp;quot; products that may work, but lack true certification.&lt;br /&gt;
&lt;br /&gt;
The term &amp;quot;Wi-Fi&amp;quot; was coined by Interbrand Corporation in August 1999 when hired by the Alliance to change the name from 'IEEE 802.11b Direct Sequence.' Interbrand also created the official 'Wi-Fi' logo. It is often assumed that Wi-Fi stands for &amp;quot;Wireless Fidelity&amp;quot;, however officially Wi-Fi is an abstract term and the Wi-Fi alliance is trying to downplay any association to &amp;quot;Hi-Fi&amp;quot; (High Fidelity).&lt;br /&gt;
&lt;br /&gt;
Many cities globally, have announced plans for a city-wide Wi-Fi network. Many such project have since been cancelled due to unforseen difficulties however, a few (such as Sunnyvale, California) were successful. The city-wide networks were created by meshing several wireless antenna together and effectively creating a very large hotspot.&lt;br /&gt;
&lt;br /&gt;
==Uses==&lt;br /&gt;
There are typically two ses for Wi-Fi: it can be used as an access technology whereby a single base station (access point) accomodates multiple clients, or it can be used in a point-to-point configuration, connecting exactly 2 access points. The latter is typically reserved for standard 802.16 (Wi-Max) and used by network providers or corporations to connect two sites. &lt;br /&gt;
&lt;br /&gt;
A Wi-Fi enabled device can connect to the internet if the access point it reaches is part of a network containing the internet. A wi-Fi enabled device can essentially use the internet for any networking purpose. &lt;br /&gt;
&lt;br /&gt;
There exists many wireless 'hotspots' which integrate one or more access points and the hotspots can span a range of a few meters to several kilometers( Sunnyvale, California for example, offers free city-wide Wi-Fi). Many businesses offer wireless hotspots as either free or pay services in order to attract customers. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi devices can operate in different modes such as peer-to-peer mode, which allows a direct connection between two people. In ad-hoc mode Wi-Fi devices are able to make client-to-client connections without a router. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi can enable wireless voice application (VoIP). The widespread growth of Wi-Fi now allows access to the internet outside 'traditional' setups (such as the bathroom). Wi-Fi installations can ultimately provide: a sequre computer networking gateway, firewall, DHCP server, intrusion detection system and many other services.&amp;lt;sup&amp;gt;[7]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Advantages and Challenges==&lt;br /&gt;
Wi-Fi uses an unlicensed radio spectrum (unlike packet radio systems) and does not require regulatory approval for individual developers, which makes Wi-Fi products widely available. Different brands are able to make products that are interoperable at a basic service level because of the technological foundations in Wi-Fi. Competition amounsts vendors has also considerably lowered prices of Wi-Fi products, and they continue to drop as technology improves. &amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Wi-Fi  allows local area networks (LANs) to be set up without wires, which simultaneously lowers costs (of creating and exapnding) and allows much freedom in where a network can be accessed. The Wi-Fi certification aheres to a global set of standards as well so Wi-Fi products are compatible in any region. &lt;br /&gt;
&lt;br /&gt;
===Range===&lt;br /&gt;
[[Image:Point-to-point-wifi-antenna.jpg|thumb|A point-to-point parabolic Wi-Fi antenna. Such devices can dramatically increase the range of a Wi-Fi network (in a single direction). The devices may be costly to buy and run however.]]&lt;br /&gt;
&lt;br /&gt;
Typically a Wi-Fi router in a home setup with a 802.11b stock antenna has a range of about 32m indoors (due to barriers like walls) and about 95m with no obstructions, outdoors. The frequency block a router uses also affects the range: 2.4GHz has a greater range than 5 GHz. Wi-Fi has greater range compared to bluetooth and can provide huge outdoor range if a network incorporates a directional antenna.&lt;br /&gt;
&lt;br /&gt;
Wi-Fi began with IEEE standards for short range wireless broadband technology, and appointed the standard numbers: 802.11b(Wi-Fi), 802.11a and 802.11g (can interoperate with 802.11b). Typically Wi-Fi operates between 2.5 to 4Mbps, but can go as high as 11 Mbps.&lt;br /&gt;
&lt;br /&gt;
===Mobility===&lt;br /&gt;
Wi-Fi technology allows LANs to be deployed without cabling, potentially reducing the costs of network deployment and expansion. Spaces where cables cannont be run, such as outdoor areas or historical buildings can host wireless LANs. Wi-Fi technology increases the ease of setting up a network as well. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi networks support roaming, in which a mobile client station (like a laptop or smartphone) can move from one access point to another as the user moves. It is because Wi-Fi certified devices are able to interoperate that this is possible without complications as well.&lt;br /&gt;
&lt;br /&gt;
==Security==&lt;br /&gt;
The greatest security issue with Wi-Fi (and all other wireless networks) is the easy of connectivity compared to traditional wired networks like Ethernet. Wireless communication (bluetooth especially) is designed to be simple and easily connected to. To make an attack on a wired network, the attacker must physically connect to the internal network or break through an external firewall. External access however is usually disallowed by business networks in order to protect sensitive data. It is because firewall encryption could be broken that most business networks disallow external access. Getting wireless reception is considered an attack to most business networks.&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The nature most wireless networks is to allow external access in order to maintain an degree of usability. If attackers gain access to a wireless network they can harm the user in a variety of ways from monitoring others' activity to fabricating a DNS spoofing attack. &lt;br /&gt;
&lt;br /&gt;
===Preventative Measures===&lt;br /&gt;
[[Image:Wep.gif|thumb|The WEP encryption standard. The vunerabilities are shown by malicious software and a single key for all users on the network.]]&lt;br /&gt;
WEP (Wired Equivalent Privacy) keys uses a deprecated algorithm to secure Wireless networks. First introduced in 1997, WEP keys were intended to make wireless networks have comparable security to that of wired networks. A WEP key could be interpreted as a 26 digit password allowing access to a home network. There are several security flaws in the WEP keys currently being used and there exists readily available software (such as AirSnort or AirCrack) that can obtain a WEP key in minutes. WEP keys are now considered completely broken. The security flaws of WEP keys was first counteracted in 2002 with 'Wi-Fi Protected Access' (WPA) but the attack vector are now known. Now (as of 2004), full IEEE 802.11i (WPA2) encryption standards have been release and are still considered secure as of 2009. &lt;br /&gt;
&lt;br /&gt;
Another security measure in effect involves suppressing the Access Points' SSID broadcast to only allow a predefined set of MAC addresses the ability to join the network. This security measure has since proven ineffective, since if an allowed MAC address is known (or found out) by an attacker then they could potentially change their own MAC address to spoof as an allowed machine.  &lt;br /&gt;
&lt;br /&gt;
===DNS Spoofing and Kaminsky Attack===&lt;br /&gt;
In June 2005 Dan Kaminsky used a DNS hack in order to get free Wi-Fi at an area starbucks. He later realized the huge security issues this presented and brought attention to the Wi-Fi and DNS security flaws. Starbucks offers a Wi-Fi service but it costs a premium, the Kaminsky hack fools the domain name system and thorough Wi-Fi, exposed a glaring Internet security flaw. &lt;br /&gt;
&lt;br /&gt;
The following is an excerpt from WIRED magazine:&lt;br /&gt;
&lt;br /&gt;
'''How DNS works'''&lt;br /&gt;
&lt;br /&gt;
1. Type anybank.com into your Web brower and the query packet is sent to your internet service provider (ISP)&lt;br /&gt;
&lt;br /&gt;
2. If anybank.com's location isn't cached, your ISP's name server repeatedly searches the domain name system for it. Each search is assigned a 16-bit transaction ID for security and tracking. Responses to the searches must carry the correct transaction ID to be accepted by the name server. The packet would travel through the root name server, the .com name server then anybank.com name server.&lt;br /&gt;
&lt;br /&gt;
3. Eventually, anybank.com sends an answer to your ISP; Our home page is at 60.190.216.103. This authenticated address is cached.&lt;br /&gt;
&lt;br /&gt;
4. Your browser connects you.&lt;br /&gt;
&lt;br /&gt;
'''How the Kaminsky DNS hack works'''&lt;br /&gt;
&lt;br /&gt;
1. The attacker tries to hijack anybank.com by sending thousands of requests for fake Web pages. Malicious query packets are sent to your ISP.&lt;br /&gt;
&lt;br /&gt;
2. The ISP gives each query a transaction ID (unknown to the attacker) and attempts to locates the pages.&lt;br /&gt;
&lt;br /&gt;
3. At the same time, the attacker sends hundreds of responses for each malicious request. Every answer includes a randomly generated ID number.&lt;br /&gt;
&lt;br /&gt;
4. Eventually one of the answers carries an ID that matches, tricking the ISP into accepting and caching the information. The now-legitimized answer contains false details about anybank.com, such as the location of its servers. Legitimate answers from anybank.com(&amp;quot;No such page exists&amp;quot;) will now be rejected.&lt;br /&gt;
&lt;br /&gt;
5. Users looking for anybank.com get sent to the fake location already in the ISP's cache.&lt;br /&gt;
&lt;br /&gt;
6. Anybank.com customers are now using a look-alike site built by the hacker.&lt;br /&gt;
&lt;br /&gt;
'''Patch fixing Kaminsky attack'''&lt;br /&gt;
&lt;br /&gt;
Most computers have 63, 536 ports, but DNS commonly uses only port 53 for all queries and responses. The patch works by randomly changing the port number for each DNS request. Now any response to a request must contain an accurate transaction ID number and return to the same port. The change increases the odds of beating the system from one in 65, 536 to one in 4 billion.&amp;lt;sup&amp;gt;[4]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Piggybacking===&lt;br /&gt;
Piggybacking refers to accessing a wireless internet connection by bringing a wireless device in range of another connection and using the service without the owners knowledge or permission. Piggybacking is completely outlawed in some jurisdictions, but allowed in others. It is not considered piggybacking if a bussiness offers a Wi-Fi hotspot for free or as a pay service. &lt;br /&gt;
&lt;br /&gt;
Piggybacking ofter goes unnoticed since most people only use a fraction of their upstream bandwidth. Piggybacking may also be carried out unintentionally, as most access points are configured without encryption (WPA2) and operating systems can automatically connect to wireless networks. The danger in piggybacking exists in users logging into an insecure network where illicit activity is conducted (danger for network owner) or sensitive information is broadcast (danger for user).&amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===The Wi-Fi Scam, Home Security Scam and Bluetooth Scam===&lt;br /&gt;
'The Real Hustle' a UK television show is premised as an educational program demonstrating how people are getting ripped-off by confidence men around the world. The hustlers demonstrate how easy it is to gain access to a Wireless network through various scams. &lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=jqic_aY3TqQ&amp;amp;feature=related Wi-Fi Scam], the hustlers hijack a wireless network then rename their own wireless network and route people to a dummy site that looks completely legitimate. &lt;br /&gt;
&lt;br /&gt;
In the Home Security Scam, the hustlers walk through a residential neighborhood and enter home wireless networks by either hacking WEP keys or finding an unlocked network. The hustlers then monitor others online activity.&lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=gvDp-DBh4Gc&amp;amp;feature=related Bluetooth Scam], the hustlers scan a shopping mall for bluetooth signals from mobile phones. Once a signal is found and a connection is made, the hustlers call their premium rate line and rack up a bill for the cell phone owner.&lt;br /&gt;
&lt;br /&gt;
There exists dozens of tutorials on the Internet on how to use Wi-Fi for illicit purposes, demonstrating just how vunerable a wireless network is.&lt;br /&gt;
&lt;br /&gt;
==Other 802 Standards and Amendments==&lt;br /&gt;
[http://en.wikipedia.org/wiki/IEEE_802 See: IEEE 802 Wiki]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
# Comer, D. E. (2006). Wi-Fi. ''Internetworking with TCP/IP'' (Fifth ed., pp. 419-441). Upper Saddle River, NJ: Pearson Prentice Hall.&lt;br /&gt;
# &amp;quot;[http://www.wilcorpinc.com/wifi_history.htm Wi-Fi History]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# &amp;quot;[http://networkbits.net/wireless-printing/80211-g-pros-cons-of-a-wireless-network-in-a-business-environment/ Pros and Cons...]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# Davis, Joshua (Dec 2008). Collapse. ''WIRED Magazine'' (pp. 200-205,224, 231)&lt;br /&gt;
# &amp;quot;[http://en.wikipedia.org/wiki/Piggybacking_(internet_access) Piggybacking]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# &amp;quot;[http://www.wi-fi.org/about_overview.php Overview of the Wi-Fi Alliance]&amp;quot;. Retrieved on 2009-04-08&lt;br /&gt;
# &amp;quot;[http://computer.howstuffworks.com/municipal-wifi.htm How Municipal Wi-Fi works]&amp;quot;. Retrieved on 2009-04-09&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks Denial of Service Attacks]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Security_for_Small_Home_Networks Security for Small Home Networks]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Peer_To_Peer_Network_Security Peer To Peer Network Security]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Man_in_the_Middle_Attack Man in the Middle Attacks]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Domain_Name_System Domain Name System (DNS)]&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Hamilr3|Hamilr3]] 00:51, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Wi-Fi</id>
		<title>Wi-Fi</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Wi-Fi"/>
				<updated>2009-04-13T00:17:40Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;/* Uses */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Wifilogo.jpg|thumb|Wi-Fi logo]]&lt;br /&gt;
''Wi-Fi is a consortium that verifies 802.11b wireless network products interoperate, and a marketing term vendors use to sell their products.''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Wi-Fi is a subsection of the IEEE 802, a subcategory in the link layer of the TCP/IP [[The Five-Layer TCP/IP Model: Description/Attacks/Defense|Internet Protocol Suite]]. The Wi-Fi alliance is a trade group that owns the 'Wi-Fi' trademark, a symbol that certifies interoperability between wireless devices. Not every Internet product is Wi-Fi certified however, and there exists many devices that are able to interoperate wirelessly without the Wi-Fi logo. Some products have chosen to omit having Wi-Fi certification to avoid paying certification costs.&lt;br /&gt;
&lt;br /&gt;
The use of Wi-Fi has boomed in recent years and is supported by a multitude of different devices. Laptops. game consoles, smartphones, printers and other peripherals usually have Wi-Fi certification. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
[[Image:Metro Wireless Node.jpg|thumb|A municipal wireless antenna. Such devices are integral in creating a mesh network of access points. ]]&lt;br /&gt;
Wi-Fi was invented by Vic Hayes (dubbed 'the father of Wi-Fi') at the NCR Corporation/AT &amp;amp; T (later Lucent &amp;amp; Agere Systems), in 1991. Hayes had been designing IEEE standards for 802.11b, 802.11a and 802.11g and subsequent technology, initially meant for cashier systems. NCR initially released the technology under the name of 'WaveLAN' which operated in a range of 1Mbps-2 Mbps. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; The Wi-Fi alliance was created soon after the technology. &lt;br /&gt;
&lt;br /&gt;
The alliance is a consortium of separate, independent companies that promotes and develops IEEE 802.11 standards. The alliance also tests products to establish interoperability and certifies products that pass. The 'Wi-Fi' logo is allowed to be used by manufacturers who subscribe to the alliance and whose products pass testing. There exists sever unofficial &amp;quot;Wi-Fi&amp;quot; products that may work, but lack true certification.&lt;br /&gt;
&lt;br /&gt;
The term &amp;quot;Wi-Fi&amp;quot; was coined by Interbrand Corporation in August 1999 when hired by the Alliance to change the name from 'IEEE 802.11b Direct Sequence.' Interbrand also created the official 'Wi-Fi' logo. It is often assumed that Wi-Fi stands for &amp;quot;Wireless Fidelity&amp;quot;, however officially Wi-Fi is an abstract term and the Wi-Fi alliance is trying to downplay any association to &amp;quot;Hi-Fi&amp;quot; (High Fidelity).&lt;br /&gt;
&lt;br /&gt;
Many cities globally, have announced plans for a city-wide Wi-Fi network. Many such project have since been cancelled due to unforseen difficulties however, a few (such as Sunnyvale, California) were successful. The city-wide networks were created by meshing several wireless antenna together and effectively creating a very large hotspot.&lt;br /&gt;
&lt;br /&gt;
==Uses==&lt;br /&gt;
There are typically two ses for Wi-Fi: it can be used as an access technology whereby a single base station (access point) accomodates multiple clients, or it can be used in a point-to-point configuration, connecting exactly 2 access points. The latter is typically reserved for standard 802.16 (Wi-Max) and used by network providers or corporations to connect two sites. &lt;br /&gt;
&lt;br /&gt;
A Wi-Fi enabled device can connect to the internet if the access point it reaches is part of a network containing the internet. A wi-Fi enabled device can essentially use the internet for any networking purpose. &lt;br /&gt;
&lt;br /&gt;
There exists many wireless 'hotspots' which integrate one or more access points and the hotspots can span a range of a few meters to several kilometers( Sunnyvale, California for example, offers free city-wide Wi-Fi). Many businesses offer wireless hotspots as either free or pay services in order to attract customers. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi devices can operate in different modes such as peer-to-peer mode, which allows a direct connection between two people. In ad-hoc mode Wi-Fi devices are able to make client-to-client connections without a router. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi can enable wireless voice application (VoIP). The widespread growth of Wi-Fi now allows access to the internet outside 'traditional' setups (such as the bathroom). Wi-Fi installations can ultimately provide: a sequre computer networking gateway, firewall, DHCP server, intrusion detection system and many other services.&amp;lt;sup&amp;gt;[7]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Advantages and Challenges==&lt;br /&gt;
Wi-Fi uses an unlicensed radio spectrum (unlike packet radio systems) and does not require regulatory approval for individual developers, which makes Wi-Fi products widely available. Different brands are able to make products that are interoperable at a basic service level because of the technological foundations in Wi-Fi. Competition amounsts vendors has also considerably lowered prices of Wi-Fi products, and they continue to drop as technology improves. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi  allows local area networks (LANs) to be set up without wires, which simultaneously lowers costs (of creating and exapnding) and allows much freedom in where a network can be accessed. The Wi-Fi certification aheres to a global set of standards as well so Wi-Fi products are compatible in any region. &lt;br /&gt;
&lt;br /&gt;
===Range===&lt;br /&gt;
[[Image:Point-to-point-wifi-antenna.jpg|thumb|A point-to-point parabolic Wi-Fi antenna. Such devices can dramatically increase the range of a Wi-Fi network (in a single direction). The devices may be costly to buy and run however.]]&lt;br /&gt;
&lt;br /&gt;
Typically a Wi-Fi router in a home setup with a 802.11b stock antenna has a range of about 32m indoors (due to barriers like walls) and about 95m with no obstructions, outdoors. The frequency block a router uses also affects the range: 2.4GHz has a greater range than 5 GHz. Wi-Fi has greater range compared to bluetooth and can provide huge outdoor range if a network incorporates a directional antenna.&lt;br /&gt;
&lt;br /&gt;
Wi-Fi began with IEEE standards for short range wireless broadband technology, and appointed the standard numbers: 802.11b(Wi-Fi), 802.11a and 802.11g (can interoperate with 802.11b). Typically Wi-Fi operates between 2.5 to 4Mbps, but can go as high as 11 Mbps.&lt;br /&gt;
&lt;br /&gt;
===Mobility===&lt;br /&gt;
Wi-Fi technology allows LANs to be deployed without cabling, potentially reducing the costs of network deployment and expansion. Spaces where cables cannont be run, such as outdoor areas or historical buildings can host wireless LANs. Wi-Fi technology increases the ease of setting up a network as well. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi networks support roaming, in which a mobile client station (like a laptop or smartphone) can move from one access point to another as the user moves. It is because Wi-Fi certified devices are able to interoperate that this is possible without complications as well.&lt;br /&gt;
&lt;br /&gt;
==Security==&lt;br /&gt;
The greatest security issue with Wi-Fi (and all other wireless networks) is the easy of connectivity compared to traditional wired networks like Ethernet. Wireless communication (bluetooth especially) is designed to be simple and easily connected to. To make an attack on a wired network, the attacker must physically connect to the internal network or break through an external firewall. External access however is usually disallowed by business networks in order to protect sensitive data. It is because firewall encryption could be broken that most business networks disallow external access. Getting wireless reception is considered an attack to most business networks.&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The nature most wireless networks is to allow external access in order to maintain an degree of usability. If attackers gain access to a wireless network they can harm the user in a variety of ways from monitoring others' activity to fabricating a DNS spoofing attack. &lt;br /&gt;
&lt;br /&gt;
===Preventative Measures===&lt;br /&gt;
[[Image:Wep.gif|thumb|The WEP encryption standard. The vunerabilities are shown by malicious software and a single key for all users on the network.]]&lt;br /&gt;
WEP (Wired Equivalent Privacy) keys uses a deprecated algorithm to secure Wireless networks. First introduced in 1997, WEP keys were intended to make wireless networks have comparable security to that of wired networks. A WEP key could be interpreted as a 26 digit password allowing access to a home network. There are several security flaws in the WEP keys currently being used and there exists readily available software (such as AirSnort or AirCrack) that can obtain a WEP key in minutes. WEP keys are now considered completely broken. The security flaws of WEP keys was first counteracted in 2002 with 'Wi-Fi Protected Access' (WPA) but the attack vector are now known. Now (as of 2004), full IEEE 802.11i (WPA2) encryption standards have been release and are still considered secure as of 2009. &lt;br /&gt;
&lt;br /&gt;
Another security measure in effect involves suppressing the Access Points' SSID broadcast to only allow a predefined set of MAC addresses the ability to join the network. This security measure has since proven ineffective, since if an allowed MAC address is known (or found out) by an attacker then they could potentially change their own MAC address to spoof as an allowed machine.  &lt;br /&gt;
&lt;br /&gt;
===DNS Spoofing and Kaminsky Attack===&lt;br /&gt;
In June 2005 Dan Kaminsky used a DNS hack in order to get free Wi-Fi at an area starbucks. He later realized the huge security issues this presented and brought attention to the Wi-Fi and DNS security flaws. Starbucks offers a Wi-Fi service but it costs a premium, the Kaminsky hack fools the domain name system and thorough Wi-Fi, exposed a glaring Internet security flaw. &lt;br /&gt;
&lt;br /&gt;
The following is an excerpt from WIRED magazine:&lt;br /&gt;
&lt;br /&gt;
'''How DNS works'''&lt;br /&gt;
&lt;br /&gt;
1. Type anybank.com into your Web brower and the query packet is sent to your internet service provider (ISP)&lt;br /&gt;
&lt;br /&gt;
2. If anybank.com's location isn't cached, your ISP's name server repeatedly searches the domain name system for it. Each search is assigned a 16-bit transaction ID for security and tracking. Responses to the searches must carry the correct transaction ID to be accepted by the name server. The packet would travel through the root name server, the .com name server then anybank.com name server.&lt;br /&gt;
&lt;br /&gt;
3. Eventually, anybank.com sends an answer to your ISP; Our home page is at 60.190.216.103. This authenticated address is cached.&lt;br /&gt;
&lt;br /&gt;
4. Your browser connects you.&lt;br /&gt;
&lt;br /&gt;
'''How the Kaminsky DNS hack works'''&lt;br /&gt;
&lt;br /&gt;
1. The attacker tries to hijack anybank.com by sending thousands of requests for fake Web pages. Malicious query packets are sent to your ISP.&lt;br /&gt;
&lt;br /&gt;
2. The ISP gives each query a transaction ID (unknown to the attacker) and attempts to locates the pages.&lt;br /&gt;
&lt;br /&gt;
3. At the same time, the attacker sends hundreds of responses for each malicious request. Every answer includes a randomly generated ID number.&lt;br /&gt;
&lt;br /&gt;
4. Eventually one of the answers carries an ID that matches, tricking the ISP into accepting and caching the information. The now-legitimized answer contains false details about anybank.com, such as the location of its servers. Legitimate answers from anybank.com(&amp;quot;No such page exists&amp;quot;) will now be rejected.&lt;br /&gt;
&lt;br /&gt;
5. Users looking for anybank.com get sent to the fake location already in the ISP's cache.&lt;br /&gt;
&lt;br /&gt;
6. Anybank.com customers are now using a look-alike site built by the hacker.&lt;br /&gt;
&lt;br /&gt;
'''Patch fixing Kaminsky attack'''&lt;br /&gt;
&lt;br /&gt;
Most computers have 63, 536 ports, but DNS commonly uses only port 53 for all queries and responses. The patch works by randomly changing the port number for each DNS request. Now any response to a request must contain an accurate transaction ID number and return to the same port. The change increases the odds of beating the system from one in 65, 536 to one in 4 billion.&amp;lt;sup&amp;gt;[4]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Piggybacking===&lt;br /&gt;
Piggybacking refers to accessing a wireless internet connection by bringing a wireless device in range of another connection and using the service without the owners knowledge or permission. Piggybacking is completely outlawed in some jurisdictions, but allowed in others. It is not considered piggybacking if a bussiness offers a Wi-Fi hotspot for free or as a pay service. &lt;br /&gt;
&lt;br /&gt;
Piggybacking ofter goes unnoticed since most people only use a fraction of their upstream bandwidth. Piggybacking may also be carried out unintentionally, as most access points are configured without encryption (WPA2) and operating systems can automatically connect to wireless networks. The danger in piggybacking exists in users logging into an insecure network where illicit activity is conducted (danger for network owner) or sensitive information is broadcast (danger for user).&amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===The Wi-Fi Scam, Home Security Scam and Bluetooth Scam===&lt;br /&gt;
'The Real Hustle' a UK television show is premised as an educational program demonstrating how people are getting ripped-off by confidence men around the world. The hustlers demonstrate how easy it is to gain access to a Wireless network through various scams. &lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=jqic_aY3TqQ&amp;amp;feature=related Wi-Fi Scam], the hustlers hijack a wireless network then rename their own wireless network and route people to a dummy site that looks completely legitimate. &lt;br /&gt;
&lt;br /&gt;
In the Home Security Scam, the hustlers walk through a residential neighborhood and enter home wireless networks by either hacking WEP keys or finding an unlocked network. The hustlers then monitor others online activity.&lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=gvDp-DBh4Gc&amp;amp;feature=related Bluetooth Scam], the hustlers scan a shopping mall for bluetooth signals from mobile phones. Once a signal is found and a connection is made, the hustlers call their premium rate line and rack up a bill for the cell phone owner.&lt;br /&gt;
&lt;br /&gt;
There exists dozens of tutorials on the Internet on how to use Wi-Fi for illicit purposes, demonstrating just how vunerable a wireless network is.&lt;br /&gt;
&lt;br /&gt;
==Other 802 Standards and Amendments==&lt;br /&gt;
[http://en.wikipedia.org/wiki/IEEE_802 See: IEEE 802 Wiki]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
# Comer, D. E. (2006). Wi-Fi. ''Internetworking with TCP/IP'' (Fifth ed., pp. 419-441). Upper Saddle River, NJ: Pearson Prentice Hall.&lt;br /&gt;
# &amp;quot;[http://www.wilcorpinc.com/wifi_history.htm Wi-Fi History]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# &amp;quot;[http://networkbits.net/wireless-printing/80211-g-pros-cons-of-a-wireless-network-in-a-business-environment/ Pros and Cons...]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# Davis, Joshua (Dec 2008). Collapse. ''WIRED Magazine'' (pp. 200-205,224, 231)&lt;br /&gt;
# &amp;quot;[http://en.wikipedia.org/wiki/Piggybacking_(internet_access) Piggybacking]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# &amp;quot;[http://www.wi-fi.org/about_overview.php Overview of the Wi-Fi Alliance]&amp;quot;. Retrieved on 2009-04-08&lt;br /&gt;
# &amp;quot;[http://computer.howstuffworks.com/municipal-wifi.htm How Municipal Wi-Fi works]&amp;quot;. Retrieved on 2009-04-09&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks Denial of Service Attacks]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Security_for_Small_Home_Networks Security for Small Home Networks]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Peer_To_Peer_Network_Security Peer To Peer Network Security]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Man_in_the_Middle_Attack Man in the Middle Attacks]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Domain_Name_System Domain Name System (DNS)]&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Hamilr3|Hamilr3]] 00:51, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Wi-Fi</id>
		<title>Wi-Fi</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Wi-Fi"/>
				<updated>2009-04-13T00:16:11Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;/* DNS Spoofing and Kaminsky Attack */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Wifilogo.jpg|thumb|Wi-Fi logo]]&lt;br /&gt;
''Wi-Fi is a consortium that verifies 802.11b wireless network products interoperate, and a marketing term vendors use to sell their products.''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Wi-Fi is a subsection of the IEEE 802, a subcategory in the link layer of the TCP/IP [[The Five-Layer TCP/IP Model: Description/Attacks/Defense|Internet Protocol Suite]]. The Wi-Fi alliance is a trade group that owns the 'Wi-Fi' trademark, a symbol that certifies interoperability between wireless devices. Not every Internet product is Wi-Fi certified however, and there exists many devices that are able to interoperate wirelessly without the Wi-Fi logo. Some products have chosen to omit having Wi-Fi certification to avoid paying certification costs.&lt;br /&gt;
&lt;br /&gt;
The use of Wi-Fi has boomed in recent years and is supported by a multitude of different devices. Laptops. game consoles, smartphones, printers and other peripherals usually have Wi-Fi certification. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
[[Image:Metro Wireless Node.jpg|thumb|A municipal wireless antenna. Such devices are integral in creating a mesh network of access points. ]]&lt;br /&gt;
Wi-Fi was invented by Vic Hayes (dubbed 'the father of Wi-Fi') at the NCR Corporation/AT &amp;amp; T (later Lucent &amp;amp; Agere Systems), in 1991. Hayes had been designing IEEE standards for 802.11b, 802.11a and 802.11g and subsequent technology, initially meant for cashier systems. NCR initially released the technology under the name of 'WaveLAN' which operated in a range of 1Mbps-2 Mbps. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; The Wi-Fi alliance was created soon after the technology. &lt;br /&gt;
&lt;br /&gt;
The alliance is a consortium of separate, independent companies that promotes and develops IEEE 802.11 standards. The alliance also tests products to establish interoperability and certifies products that pass. The 'Wi-Fi' logo is allowed to be used by manufacturers who subscribe to the alliance and whose products pass testing. There exists sever unofficial &amp;quot;Wi-Fi&amp;quot; products that may work, but lack true certification.&lt;br /&gt;
&lt;br /&gt;
The term &amp;quot;Wi-Fi&amp;quot; was coined by Interbrand Corporation in August 1999 when hired by the Alliance to change the name from 'IEEE 802.11b Direct Sequence.' Interbrand also created the official 'Wi-Fi' logo. It is often assumed that Wi-Fi stands for &amp;quot;Wireless Fidelity&amp;quot;, however officially Wi-Fi is an abstract term and the Wi-Fi alliance is trying to downplay any association to &amp;quot;Hi-Fi&amp;quot; (High Fidelity).&lt;br /&gt;
&lt;br /&gt;
Many cities globally, have announced plans for a city-wide Wi-Fi network. Many such project have since been cancelled due to unforseen difficulties however, a few (such as Sunnyvale, California) were successful. The city-wide networks were created by meshing several wireless antenna together and effectively creating a very large hotspot.&lt;br /&gt;
&lt;br /&gt;
==Uses==&lt;br /&gt;
There are typically two ses for Wi-Fi: it can be used as an access technology whereby a single base station (access point) accomodates multiple clients, or it can be used in a point-to-point configuration, connecting exactly 2 access points. The latter is typically reserved for standard 802.16 (Wi-Max) and used by network providers or corporations to connect two sites. &lt;br /&gt;
&lt;br /&gt;
A Wi-Fi enabled device can connect to the internet if the access point it reaches is part of a network containing the internet. A wi-Fi enabled device can essentially use the internet for any networking purpose. &lt;br /&gt;
&lt;br /&gt;
There exists many wireless 'hotspots' which integrate one or more access points and the hotspots can span a range of a few meters to several kilometers( Sunnyvale, California for example, offers free city-wide Wi-Fi). Many businesses offer wireless hotspots as either free or pay services in order to attract customers. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi devices can operate in different modes such as peer-to-peer mode, which allows a direct connection between two people. In ad-hoc mode Wi-Fi devices are able to make client-to-client connections without a router. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi can enable wireless voice application (VoIP). The widespread growth of Wi-Fi now allows access to the internet outside 'traditional' setups (such as the bathroom). Wi-Fi installations can ultimately provide: a sequre computer networking gateway, firewall, DHCP server, intrusion detection system and many other services.&lt;br /&gt;
&lt;br /&gt;
==Advantages and Challenges==&lt;br /&gt;
Wi-Fi uses an unlicensed radio spectrum (unlike packet radio systems) and does not require regulatory approval for individual developers, which makes Wi-Fi products widely available. Different brands are able to make products that are interoperable at a basic service level because of the technological foundations in Wi-Fi. Competition amounsts vendors has also considerably lowered prices of Wi-Fi products, and they continue to drop as technology improves. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi  allows local area networks (LANs) to be set up without wires, which simultaneously lowers costs (of creating and exapnding) and allows much freedom in where a network can be accessed. The Wi-Fi certification aheres to a global set of standards as well so Wi-Fi products are compatible in any region. &lt;br /&gt;
&lt;br /&gt;
===Range===&lt;br /&gt;
[[Image:Point-to-point-wifi-antenna.jpg|thumb|A point-to-point parabolic Wi-Fi antenna. Such devices can dramatically increase the range of a Wi-Fi network (in a single direction). The devices may be costly to buy and run however.]]&lt;br /&gt;
&lt;br /&gt;
Typically a Wi-Fi router in a home setup with a 802.11b stock antenna has a range of about 32m indoors (due to barriers like walls) and about 95m with no obstructions, outdoors. The frequency block a router uses also affects the range: 2.4GHz has a greater range than 5 GHz. Wi-Fi has greater range compared to bluetooth and can provide huge outdoor range if a network incorporates a directional antenna.&lt;br /&gt;
&lt;br /&gt;
Wi-Fi began with IEEE standards for short range wireless broadband technology, and appointed the standard numbers: 802.11b(Wi-Fi), 802.11a and 802.11g (can interoperate with 802.11b). Typically Wi-Fi operates between 2.5 to 4Mbps, but can go as high as 11 Mbps.&lt;br /&gt;
&lt;br /&gt;
===Mobility===&lt;br /&gt;
Wi-Fi technology allows LANs to be deployed without cabling, potentially reducing the costs of network deployment and expansion. Spaces where cables cannont be run, such as outdoor areas or historical buildings can host wireless LANs. Wi-Fi technology increases the ease of setting up a network as well. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi networks support roaming, in which a mobile client station (like a laptop or smartphone) can move from one access point to another as the user moves. It is because Wi-Fi certified devices are able to interoperate that this is possible without complications as well.&lt;br /&gt;
&lt;br /&gt;
==Security==&lt;br /&gt;
The greatest security issue with Wi-Fi (and all other wireless networks) is the easy of connectivity compared to traditional wired networks like Ethernet. Wireless communication (bluetooth especially) is designed to be simple and easily connected to. To make an attack on a wired network, the attacker must physically connect to the internal network or break through an external firewall. External access however is usually disallowed by business networks in order to protect sensitive data. It is because firewall encryption could be broken that most business networks disallow external access. Getting wireless reception is considered an attack to most business networks.&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The nature most wireless networks is to allow external access in order to maintain an degree of usability. If attackers gain access to a wireless network they can harm the user in a variety of ways from monitoring others' activity to fabricating a DNS spoofing attack. &lt;br /&gt;
&lt;br /&gt;
===Preventative Measures===&lt;br /&gt;
[[Image:Wep.gif|thumb|The WEP encryption standard. The vunerabilities are shown by malicious software and a single key for all users on the network.]]&lt;br /&gt;
WEP (Wired Equivalent Privacy) keys uses a deprecated algorithm to secure Wireless networks. First introduced in 1997, WEP keys were intended to make wireless networks have comparable security to that of wired networks. A WEP key could be interpreted as a 26 digit password allowing access to a home network. There are several security flaws in the WEP keys currently being used and there exists readily available software (such as AirSnort or AirCrack) that can obtain a WEP key in minutes. WEP keys are now considered completely broken. The security flaws of WEP keys was first counteracted in 2002 with 'Wi-Fi Protected Access' (WPA) but the attack vector are now known. Now (as of 2004), full IEEE 802.11i (WPA2) encryption standards have been release and are still considered secure as of 2009. &lt;br /&gt;
&lt;br /&gt;
Another security measure in effect involves suppressing the Access Points' SSID broadcast to only allow a predefined set of MAC addresses the ability to join the network. This security measure has since proven ineffective, since if an allowed MAC address is known (or found out) by an attacker then they could potentially change their own MAC address to spoof as an allowed machine.  &lt;br /&gt;
&lt;br /&gt;
===DNS Spoofing and Kaminsky Attack===&lt;br /&gt;
In June 2005 Dan Kaminsky used a DNS hack in order to get free Wi-Fi at an area starbucks. He later realized the huge security issues this presented and brought attention to the Wi-Fi and DNS security flaws. Starbucks offers a Wi-Fi service but it costs a premium, the Kaminsky hack fools the domain name system and thorough Wi-Fi, exposed a glaring Internet security flaw. &lt;br /&gt;
&lt;br /&gt;
The following is an excerpt from WIRED magazine:&lt;br /&gt;
&lt;br /&gt;
'''How DNS works'''&lt;br /&gt;
&lt;br /&gt;
1. Type anybank.com into your Web brower and the query packet is sent to your internet service provider (ISP)&lt;br /&gt;
&lt;br /&gt;
2. If anybank.com's location isn't cached, your ISP's name server repeatedly searches the domain name system for it. Each search is assigned a 16-bit transaction ID for security and tracking. Responses to the searches must carry the correct transaction ID to be accepted by the name server. The packet would travel through the root name server, the .com name server then anybank.com name server.&lt;br /&gt;
&lt;br /&gt;
3. Eventually, anybank.com sends an answer to your ISP; Our home page is at 60.190.216.103. This authenticated address is cached.&lt;br /&gt;
&lt;br /&gt;
4. Your browser connects you.&lt;br /&gt;
&lt;br /&gt;
'''How the Kaminsky DNS hack works'''&lt;br /&gt;
&lt;br /&gt;
1. The attacker tries to hijack anybank.com by sending thousands of requests for fake Web pages. Malicious query packets are sent to your ISP.&lt;br /&gt;
&lt;br /&gt;
2. The ISP gives each query a transaction ID (unknown to the attacker) and attempts to locates the pages.&lt;br /&gt;
&lt;br /&gt;
3. At the same time, the attacker sends hundreds of responses for each malicious request. Every answer includes a randomly generated ID number.&lt;br /&gt;
&lt;br /&gt;
4. Eventually one of the answers carries an ID that matches, tricking the ISP into accepting and caching the information. The now-legitimized answer contains false details about anybank.com, such as the location of its servers. Legitimate answers from anybank.com(&amp;quot;No such page exists&amp;quot;) will now be rejected.&lt;br /&gt;
&lt;br /&gt;
5. Users looking for anybank.com get sent to the fake location already in the ISP's cache.&lt;br /&gt;
&lt;br /&gt;
6. Anybank.com customers are now using a look-alike site built by the hacker.&lt;br /&gt;
&lt;br /&gt;
'''Patch fixing Kaminsky attack'''&lt;br /&gt;
&lt;br /&gt;
Most computers have 63, 536 ports, but DNS commonly uses only port 53 for all queries and responses. The patch works by randomly changing the port number for each DNS request. Now any response to a request must contain an accurate transaction ID number and return to the same port. The change increases the odds of beating the system from one in 65, 536 to one in 4 billion.&amp;lt;sup&amp;gt;[4]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Piggybacking===&lt;br /&gt;
Piggybacking refers to accessing a wireless internet connection by bringing a wireless device in range of another connection and using the service without the owners knowledge or permission. Piggybacking is completely outlawed in some jurisdictions, but allowed in others. It is not considered piggybacking if a bussiness offers a Wi-Fi hotspot for free or as a pay service. &lt;br /&gt;
&lt;br /&gt;
Piggybacking ofter goes unnoticed since most people only use a fraction of their upstream bandwidth. Piggybacking may also be carried out unintentionally, as most access points are configured without encryption (WPA2) and operating systems can automatically connect to wireless networks. The danger in piggybacking exists in users logging into an insecure network where illicit activity is conducted (danger for network owner) or sensitive information is broadcast (danger for user).&amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===The Wi-Fi Scam, Home Security Scam and Bluetooth Scam===&lt;br /&gt;
'The Real Hustle' a UK television show is premised as an educational program demonstrating how people are getting ripped-off by confidence men around the world. The hustlers demonstrate how easy it is to gain access to a Wireless network through various scams. &lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=jqic_aY3TqQ&amp;amp;feature=related Wi-Fi Scam], the hustlers hijack a wireless network then rename their own wireless network and route people to a dummy site that looks completely legitimate. &lt;br /&gt;
&lt;br /&gt;
In the Home Security Scam, the hustlers walk through a residential neighborhood and enter home wireless networks by either hacking WEP keys or finding an unlocked network. The hustlers then monitor others online activity.&lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=gvDp-DBh4Gc&amp;amp;feature=related Bluetooth Scam], the hustlers scan a shopping mall for bluetooth signals from mobile phones. Once a signal is found and a connection is made, the hustlers call their premium rate line and rack up a bill for the cell phone owner.&lt;br /&gt;
&lt;br /&gt;
There exists dozens of tutorials on the Internet on how to use Wi-Fi for illicit purposes, demonstrating just how vunerable a wireless network is.&lt;br /&gt;
&lt;br /&gt;
==Other 802 Standards and Amendments==&lt;br /&gt;
[http://en.wikipedia.org/wiki/IEEE_802 See: IEEE 802 Wiki]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
# Comer, D. E. (2006). Wi-Fi. ''Internetworking with TCP/IP'' (Fifth ed., pp. 419-441). Upper Saddle River, NJ: Pearson Prentice Hall.&lt;br /&gt;
# &amp;quot;[http://www.wilcorpinc.com/wifi_history.htm Wi-Fi History]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# &amp;quot;[http://networkbits.net/wireless-printing/80211-g-pros-cons-of-a-wireless-network-in-a-business-environment/ Pros and Cons...]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# Davis, Joshua (Dec 2008). Collapse. ''WIRED Magazine'' (pp. 200-205,224, 231)&lt;br /&gt;
# &amp;quot;[http://en.wikipedia.org/wiki/Piggybacking_(internet_access) Piggybacking]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# &amp;quot;[http://www.wi-fi.org/about_overview.php Overview of the Wi-Fi Alliance]&amp;quot;. Retrieved on 2009-04-08&lt;br /&gt;
# &amp;quot;[http://computer.howstuffworks.com/municipal-wifi.htm How Municipal Wi-Fi works]&amp;quot;. Retrieved on 2009-04-09&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks Denial of Service Attacks]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Security_for_Small_Home_Networks Security for Small Home Networks]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Peer_To_Peer_Network_Security Peer To Peer Network Security]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Man_in_the_Middle_Attack Man in the Middle Attacks]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Domain_Name_System Domain Name System (DNS)]&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Hamilr3|Hamilr3]] 00:51, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Wi-Fi</id>
		<title>Wi-Fi</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Wi-Fi"/>
				<updated>2009-04-13T00:15:49Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;/* Piggybacking */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Wifilogo.jpg|thumb|Wi-Fi logo]]&lt;br /&gt;
''Wi-Fi is a consortium that verifies 802.11b wireless network products interoperate, and a marketing term vendors use to sell their products.''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Wi-Fi is a subsection of the IEEE 802, a subcategory in the link layer of the TCP/IP [[The Five-Layer TCP/IP Model: Description/Attacks/Defense|Internet Protocol Suite]]. The Wi-Fi alliance is a trade group that owns the 'Wi-Fi' trademark, a symbol that certifies interoperability between wireless devices. Not every Internet product is Wi-Fi certified however, and there exists many devices that are able to interoperate wirelessly without the Wi-Fi logo. Some products have chosen to omit having Wi-Fi certification to avoid paying certification costs.&lt;br /&gt;
&lt;br /&gt;
The use of Wi-Fi has boomed in recent years and is supported by a multitude of different devices. Laptops. game consoles, smartphones, printers and other peripherals usually have Wi-Fi certification. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
[[Image:Metro Wireless Node.jpg|thumb|A municipal wireless antenna. Such devices are integral in creating a mesh network of access points. ]]&lt;br /&gt;
Wi-Fi was invented by Vic Hayes (dubbed 'the father of Wi-Fi') at the NCR Corporation/AT &amp;amp; T (later Lucent &amp;amp; Agere Systems), in 1991. Hayes had been designing IEEE standards for 802.11b, 802.11a and 802.11g and subsequent technology, initially meant for cashier systems. NCR initially released the technology under the name of 'WaveLAN' which operated in a range of 1Mbps-2 Mbps. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; The Wi-Fi alliance was created soon after the technology. &lt;br /&gt;
&lt;br /&gt;
The alliance is a consortium of separate, independent companies that promotes and develops IEEE 802.11 standards. The alliance also tests products to establish interoperability and certifies products that pass. The 'Wi-Fi' logo is allowed to be used by manufacturers who subscribe to the alliance and whose products pass testing. There exists sever unofficial &amp;quot;Wi-Fi&amp;quot; products that may work, but lack true certification.&lt;br /&gt;
&lt;br /&gt;
The term &amp;quot;Wi-Fi&amp;quot; was coined by Interbrand Corporation in August 1999 when hired by the Alliance to change the name from 'IEEE 802.11b Direct Sequence.' Interbrand also created the official 'Wi-Fi' logo. It is often assumed that Wi-Fi stands for &amp;quot;Wireless Fidelity&amp;quot;, however officially Wi-Fi is an abstract term and the Wi-Fi alliance is trying to downplay any association to &amp;quot;Hi-Fi&amp;quot; (High Fidelity).&lt;br /&gt;
&lt;br /&gt;
Many cities globally, have announced plans for a city-wide Wi-Fi network. Many such project have since been cancelled due to unforseen difficulties however, a few (such as Sunnyvale, California) were successful. The city-wide networks were created by meshing several wireless antenna together and effectively creating a very large hotspot.&lt;br /&gt;
&lt;br /&gt;
==Uses==&lt;br /&gt;
There are typically two ses for Wi-Fi: it can be used as an access technology whereby a single base station (access point) accomodates multiple clients, or it can be used in a point-to-point configuration, connecting exactly 2 access points. The latter is typically reserved for standard 802.16 (Wi-Max) and used by network providers or corporations to connect two sites. &lt;br /&gt;
&lt;br /&gt;
A Wi-Fi enabled device can connect to the internet if the access point it reaches is part of a network containing the internet. A wi-Fi enabled device can essentially use the internet for any networking purpose. &lt;br /&gt;
&lt;br /&gt;
There exists many wireless 'hotspots' which integrate one or more access points and the hotspots can span a range of a few meters to several kilometers( Sunnyvale, California for example, offers free city-wide Wi-Fi). Many businesses offer wireless hotspots as either free or pay services in order to attract customers. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi devices can operate in different modes such as peer-to-peer mode, which allows a direct connection between two people. In ad-hoc mode Wi-Fi devices are able to make client-to-client connections without a router. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi can enable wireless voice application (VoIP). The widespread growth of Wi-Fi now allows access to the internet outside 'traditional' setups (such as the bathroom). Wi-Fi installations can ultimately provide: a sequre computer networking gateway, firewall, DHCP server, intrusion detection system and many other services.&lt;br /&gt;
&lt;br /&gt;
==Advantages and Challenges==&lt;br /&gt;
Wi-Fi uses an unlicensed radio spectrum (unlike packet radio systems) and does not require regulatory approval for individual developers, which makes Wi-Fi products widely available. Different brands are able to make products that are interoperable at a basic service level because of the technological foundations in Wi-Fi. Competition amounsts vendors has also considerably lowered prices of Wi-Fi products, and they continue to drop as technology improves. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi  allows local area networks (LANs) to be set up without wires, which simultaneously lowers costs (of creating and exapnding) and allows much freedom in where a network can be accessed. The Wi-Fi certification aheres to a global set of standards as well so Wi-Fi products are compatible in any region. &lt;br /&gt;
&lt;br /&gt;
===Range===&lt;br /&gt;
[[Image:Point-to-point-wifi-antenna.jpg|thumb|A point-to-point parabolic Wi-Fi antenna. Such devices can dramatically increase the range of a Wi-Fi network (in a single direction). The devices may be costly to buy and run however.]]&lt;br /&gt;
&lt;br /&gt;
Typically a Wi-Fi router in a home setup with a 802.11b stock antenna has a range of about 32m indoors (due to barriers like walls) and about 95m with no obstructions, outdoors. The frequency block a router uses also affects the range: 2.4GHz has a greater range than 5 GHz. Wi-Fi has greater range compared to bluetooth and can provide huge outdoor range if a network incorporates a directional antenna.&lt;br /&gt;
&lt;br /&gt;
Wi-Fi began with IEEE standards for short range wireless broadband technology, and appointed the standard numbers: 802.11b(Wi-Fi), 802.11a and 802.11g (can interoperate with 802.11b). Typically Wi-Fi operates between 2.5 to 4Mbps, but can go as high as 11 Mbps.&lt;br /&gt;
&lt;br /&gt;
===Mobility===&lt;br /&gt;
Wi-Fi technology allows LANs to be deployed without cabling, potentially reducing the costs of network deployment and expansion. Spaces where cables cannont be run, such as outdoor areas or historical buildings can host wireless LANs. Wi-Fi technology increases the ease of setting up a network as well. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi networks support roaming, in which a mobile client station (like a laptop or smartphone) can move from one access point to another as the user moves. It is because Wi-Fi certified devices are able to interoperate that this is possible without complications as well.&lt;br /&gt;
&lt;br /&gt;
==Security==&lt;br /&gt;
The greatest security issue with Wi-Fi (and all other wireless networks) is the easy of connectivity compared to traditional wired networks like Ethernet. Wireless communication (bluetooth especially) is designed to be simple and easily connected to. To make an attack on a wired network, the attacker must physically connect to the internal network or break through an external firewall. External access however is usually disallowed by business networks in order to protect sensitive data. It is because firewall encryption could be broken that most business networks disallow external access. Getting wireless reception is considered an attack to most business networks.&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The nature most wireless networks is to allow external access in order to maintain an degree of usability. If attackers gain access to a wireless network they can harm the user in a variety of ways from monitoring others' activity to fabricating a DNS spoofing attack. &lt;br /&gt;
&lt;br /&gt;
===Preventative Measures===&lt;br /&gt;
[[Image:Wep.gif|thumb|The WEP encryption standard. The vunerabilities are shown by malicious software and a single key for all users on the network.]]&lt;br /&gt;
WEP (Wired Equivalent Privacy) keys uses a deprecated algorithm to secure Wireless networks. First introduced in 1997, WEP keys were intended to make wireless networks have comparable security to that of wired networks. A WEP key could be interpreted as a 26 digit password allowing access to a home network. There are several security flaws in the WEP keys currently being used and there exists readily available software (such as AirSnort or AirCrack) that can obtain a WEP key in minutes. WEP keys are now considered completely broken. The security flaws of WEP keys was first counteracted in 2002 with 'Wi-Fi Protected Access' (WPA) but the attack vector are now known. Now (as of 2004), full IEEE 802.11i (WPA2) encryption standards have been release and are still considered secure as of 2009. &lt;br /&gt;
&lt;br /&gt;
Another security measure in effect involves suppressing the Access Points' SSID broadcast to only allow a predefined set of MAC addresses the ability to join the network. This security measure has since proven ineffective, since if an allowed MAC address is known (or found out) by an attacker then they could potentially change their own MAC address to spoof as an allowed machine.  &lt;br /&gt;
&lt;br /&gt;
===DNS Spoofing and Kaminsky Attack===&lt;br /&gt;
In June 2005 Dan Kaminsky used a DNS hack in order to get free Wi-Fi at an area starbucks. He later realized the huge security issues this presented and brought attention to the Wi-Fi and DNS security flaws. Starbucks offers a Wi-Fi service but it costs a premium, the Kaminsky hack fools the domain name system and thorough Wi-Fi, exposed a glaring Internet security flaw. &lt;br /&gt;
&lt;br /&gt;
The following is an excerpt from WIRED magazine:&lt;br /&gt;
&lt;br /&gt;
'''How DNS works'''&lt;br /&gt;
&lt;br /&gt;
1. Type anybank.com into your Web brower and the query packet is sent to your internet service provider (ISP)&lt;br /&gt;
&lt;br /&gt;
2. If anybank.com's location isn't cached, your ISP's name server repeatedly searches the domain name system for it. Each search is assigned a 16-bit transaction ID for security and tracking. Responses to the searches must carry the correct transaction ID to be accepted by the name server. The packet would travel through the root name server, the .com name server then anybank.com name server.&lt;br /&gt;
&lt;br /&gt;
3. Eventually, anybank.com sends an answer to your ISP; Our home page is at 60.190.216.103. This authenticated address is cached.&lt;br /&gt;
&lt;br /&gt;
4. Your browser connects you.&lt;br /&gt;
&lt;br /&gt;
'''How the Kaminsky DNS hack works'''&lt;br /&gt;
&lt;br /&gt;
1. The attacker tries to hijack anybank.com by sending thousands of requests for fake Web pages. Malicious query packets are sent to your ISP.&lt;br /&gt;
&lt;br /&gt;
2. The ISP gives each query a transaction ID (unknown to the attacker) and attempts to locates the pages.&lt;br /&gt;
&lt;br /&gt;
3. At the same time, the attacker sends hundreds of responses for each malicious request. Every answer includes a randomly generated ID number.&lt;br /&gt;
&lt;br /&gt;
4. Eventually one of the answers carries an ID that matches, tricking the ISP into accepting and caching the information. The now-legitimized answer contains false details about anybank.com, such as the location of its servers. Legitimate answers from anybank.com(&amp;quot;No such page exists&amp;quot;) will now be rejected.&lt;br /&gt;
&lt;br /&gt;
5. Users looking for anybank.com get sent to the fake location already in the ISP's cache.&lt;br /&gt;
&lt;br /&gt;
6. Anybank.com customers are now using a look-alike site built by the hacker.&lt;br /&gt;
&lt;br /&gt;
'''Patch fixing Kaminsky attack'''&lt;br /&gt;
&lt;br /&gt;
Most computers have 63, 536 ports, but DNS commonly uses only port 53 for all queries and responses. The patch works by randomly changing the port number for each DNS request. Now any response to a request must contain an accurate transaction ID number and return to the same port. The change increases the odds of beating the system from one in 65, 536 to one in 4 billion.&amp;lt;sup&amp;gt;[numb]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Piggybacking===&lt;br /&gt;
Piggybacking refers to accessing a wireless internet connection by bringing a wireless device in range of another connection and using the service without the owners knowledge or permission. Piggybacking is completely outlawed in some jurisdictions, but allowed in others. It is not considered piggybacking if a bussiness offers a Wi-Fi hotspot for free or as a pay service. &lt;br /&gt;
&lt;br /&gt;
Piggybacking ofter goes unnoticed since most people only use a fraction of their upstream bandwidth. Piggybacking may also be carried out unintentionally, as most access points are configured without encryption (WPA2) and operating systems can automatically connect to wireless networks. The danger in piggybacking exists in users logging into an insecure network where illicit activity is conducted (danger for network owner) or sensitive information is broadcast (danger for user).&amp;lt;sup&amp;gt;[5]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===The Wi-Fi Scam, Home Security Scam and Bluetooth Scam===&lt;br /&gt;
'The Real Hustle' a UK television show is premised as an educational program demonstrating how people are getting ripped-off by confidence men around the world. The hustlers demonstrate how easy it is to gain access to a Wireless network through various scams. &lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=jqic_aY3TqQ&amp;amp;feature=related Wi-Fi Scam], the hustlers hijack a wireless network then rename their own wireless network and route people to a dummy site that looks completely legitimate. &lt;br /&gt;
&lt;br /&gt;
In the Home Security Scam, the hustlers walk through a residential neighborhood and enter home wireless networks by either hacking WEP keys or finding an unlocked network. The hustlers then monitor others online activity.&lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=gvDp-DBh4Gc&amp;amp;feature=related Bluetooth Scam], the hustlers scan a shopping mall for bluetooth signals from mobile phones. Once a signal is found and a connection is made, the hustlers call their premium rate line and rack up a bill for the cell phone owner.&lt;br /&gt;
&lt;br /&gt;
There exists dozens of tutorials on the Internet on how to use Wi-Fi for illicit purposes, demonstrating just how vunerable a wireless network is.&lt;br /&gt;
&lt;br /&gt;
==Other 802 Standards and Amendments==&lt;br /&gt;
[http://en.wikipedia.org/wiki/IEEE_802 See: IEEE 802 Wiki]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
# Comer, D. E. (2006). Wi-Fi. ''Internetworking with TCP/IP'' (Fifth ed., pp. 419-441). Upper Saddle River, NJ: Pearson Prentice Hall.&lt;br /&gt;
# &amp;quot;[http://www.wilcorpinc.com/wifi_history.htm Wi-Fi History]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# &amp;quot;[http://networkbits.net/wireless-printing/80211-g-pros-cons-of-a-wireless-network-in-a-business-environment/ Pros and Cons...]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# Davis, Joshua (Dec 2008). Collapse. ''WIRED Magazine'' (pp. 200-205,224, 231)&lt;br /&gt;
# &amp;quot;[http://en.wikipedia.org/wiki/Piggybacking_(internet_access) Piggybacking]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# &amp;quot;[http://www.wi-fi.org/about_overview.php Overview of the Wi-Fi Alliance]&amp;quot;. Retrieved on 2009-04-08&lt;br /&gt;
# &amp;quot;[http://computer.howstuffworks.com/municipal-wifi.htm How Municipal Wi-Fi works]&amp;quot;. Retrieved on 2009-04-09&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks Denial of Service Attacks]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Security_for_Small_Home_Networks Security for Small Home Networks]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Peer_To_Peer_Network_Security Peer To Peer Network Security]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Man_in_the_Middle_Attack Man in the Middle Attacks]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Domain_Name_System Domain Name System (DNS)]&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Hamilr3|Hamilr3]] 00:51, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Wi-Fi</id>
		<title>Wi-Fi</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Wi-Fi"/>
				<updated>2009-04-13T00:14:15Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;/* References */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Wifilogo.jpg|thumb|Wi-Fi logo]]&lt;br /&gt;
''Wi-Fi is a consortium that verifies 802.11b wireless network products interoperate, and a marketing term vendors use to sell their products.''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Wi-Fi is a subsection of the IEEE 802, a subcategory in the link layer of the TCP/IP [[The Five-Layer TCP/IP Model: Description/Attacks/Defense|Internet Protocol Suite]]. The Wi-Fi alliance is a trade group that owns the 'Wi-Fi' trademark, a symbol that certifies interoperability between wireless devices. Not every Internet product is Wi-Fi certified however, and there exists many devices that are able to interoperate wirelessly without the Wi-Fi logo. Some products have chosen to omit having Wi-Fi certification to avoid paying certification costs.&lt;br /&gt;
&lt;br /&gt;
The use of Wi-Fi has boomed in recent years and is supported by a multitude of different devices. Laptops. game consoles, smartphones, printers and other peripherals usually have Wi-Fi certification. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
[[Image:Metro Wireless Node.jpg|thumb|A municipal wireless antenna. Such devices are integral in creating a mesh network of access points. ]]&lt;br /&gt;
Wi-Fi was invented by Vic Hayes (dubbed 'the father of Wi-Fi') at the NCR Corporation/AT &amp;amp; T (later Lucent &amp;amp; Agere Systems), in 1991. Hayes had been designing IEEE standards for 802.11b, 802.11a and 802.11g and subsequent technology, initially meant for cashier systems. NCR initially released the technology under the name of 'WaveLAN' which operated in a range of 1Mbps-2 Mbps. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; The Wi-Fi alliance was created soon after the technology. &lt;br /&gt;
&lt;br /&gt;
The alliance is a consortium of separate, independent companies that promotes and develops IEEE 802.11 standards. The alliance also tests products to establish interoperability and certifies products that pass. The 'Wi-Fi' logo is allowed to be used by manufacturers who subscribe to the alliance and whose products pass testing. There exists sever unofficial &amp;quot;Wi-Fi&amp;quot; products that may work, but lack true certification.&lt;br /&gt;
&lt;br /&gt;
The term &amp;quot;Wi-Fi&amp;quot; was coined by Interbrand Corporation in August 1999 when hired by the Alliance to change the name from 'IEEE 802.11b Direct Sequence.' Interbrand also created the official 'Wi-Fi' logo. It is often assumed that Wi-Fi stands for &amp;quot;Wireless Fidelity&amp;quot;, however officially Wi-Fi is an abstract term and the Wi-Fi alliance is trying to downplay any association to &amp;quot;Hi-Fi&amp;quot; (High Fidelity).&lt;br /&gt;
&lt;br /&gt;
Many cities globally, have announced plans for a city-wide Wi-Fi network. Many such project have since been cancelled due to unforseen difficulties however, a few (such as Sunnyvale, California) were successful. The city-wide networks were created by meshing several wireless antenna together and effectively creating a very large hotspot.&lt;br /&gt;
&lt;br /&gt;
==Uses==&lt;br /&gt;
There are typically two ses for Wi-Fi: it can be used as an access technology whereby a single base station (access point) accomodates multiple clients, or it can be used in a point-to-point configuration, connecting exactly 2 access points. The latter is typically reserved for standard 802.16 (Wi-Max) and used by network providers or corporations to connect two sites. &lt;br /&gt;
&lt;br /&gt;
A Wi-Fi enabled device can connect to the internet if the access point it reaches is part of a network containing the internet. A wi-Fi enabled device can essentially use the internet for any networking purpose. &lt;br /&gt;
&lt;br /&gt;
There exists many wireless 'hotspots' which integrate one or more access points and the hotspots can span a range of a few meters to several kilometers( Sunnyvale, California for example, offers free city-wide Wi-Fi). Many businesses offer wireless hotspots as either free or pay services in order to attract customers. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi devices can operate in different modes such as peer-to-peer mode, which allows a direct connection between two people. In ad-hoc mode Wi-Fi devices are able to make client-to-client connections without a router. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi can enable wireless voice application (VoIP). The widespread growth of Wi-Fi now allows access to the internet outside 'traditional' setups (such as the bathroom). Wi-Fi installations can ultimately provide: a sequre computer networking gateway, firewall, DHCP server, intrusion detection system and many other services.&lt;br /&gt;
&lt;br /&gt;
==Advantages and Challenges==&lt;br /&gt;
Wi-Fi uses an unlicensed radio spectrum (unlike packet radio systems) and does not require regulatory approval for individual developers, which makes Wi-Fi products widely available. Different brands are able to make products that are interoperable at a basic service level because of the technological foundations in Wi-Fi. Competition amounsts vendors has also considerably lowered prices of Wi-Fi products, and they continue to drop as technology improves. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi  allows local area networks (LANs) to be set up without wires, which simultaneously lowers costs (of creating and exapnding) and allows much freedom in where a network can be accessed. The Wi-Fi certification aheres to a global set of standards as well so Wi-Fi products are compatible in any region. &lt;br /&gt;
&lt;br /&gt;
===Range===&lt;br /&gt;
[[Image:Point-to-point-wifi-antenna.jpg|thumb|A point-to-point parabolic Wi-Fi antenna. Such devices can dramatically increase the range of a Wi-Fi network (in a single direction). The devices may be costly to buy and run however.]]&lt;br /&gt;
&lt;br /&gt;
Typically a Wi-Fi router in a home setup with a 802.11b stock antenna has a range of about 32m indoors (due to barriers like walls) and about 95m with no obstructions, outdoors. The frequency block a router uses also affects the range: 2.4GHz has a greater range than 5 GHz. Wi-Fi has greater range compared to bluetooth and can provide huge outdoor range if a network incorporates a directional antenna.&lt;br /&gt;
&lt;br /&gt;
Wi-Fi began with IEEE standards for short range wireless broadband technology, and appointed the standard numbers: 802.11b(Wi-Fi), 802.11a and 802.11g (can interoperate with 802.11b). Typically Wi-Fi operates between 2.5 to 4Mbps, but can go as high as 11 Mbps.&lt;br /&gt;
&lt;br /&gt;
===Mobility===&lt;br /&gt;
Wi-Fi technology allows LANs to be deployed without cabling, potentially reducing the costs of network deployment and expansion. Spaces where cables cannont be run, such as outdoor areas or historical buildings can host wireless LANs. Wi-Fi technology increases the ease of setting up a network as well. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi networks support roaming, in which a mobile client station (like a laptop or smartphone) can move from one access point to another as the user moves. It is because Wi-Fi certified devices are able to interoperate that this is possible without complications as well.&lt;br /&gt;
&lt;br /&gt;
==Security==&lt;br /&gt;
The greatest security issue with Wi-Fi (and all other wireless networks) is the easy of connectivity compared to traditional wired networks like Ethernet. Wireless communication (bluetooth especially) is designed to be simple and easily connected to. To make an attack on a wired network, the attacker must physically connect to the internal network or break through an external firewall. External access however is usually disallowed by business networks in order to protect sensitive data. It is because firewall encryption could be broken that most business networks disallow external access. Getting wireless reception is considered an attack to most business networks.&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The nature most wireless networks is to allow external access in order to maintain an degree of usability. If attackers gain access to a wireless network they can harm the user in a variety of ways from monitoring others' activity to fabricating a DNS spoofing attack. &lt;br /&gt;
&lt;br /&gt;
===Preventative Measures===&lt;br /&gt;
[[Image:Wep.gif|thumb|The WEP encryption standard. The vunerabilities are shown by malicious software and a single key for all users on the network.]]&lt;br /&gt;
WEP (Wired Equivalent Privacy) keys uses a deprecated algorithm to secure Wireless networks. First introduced in 1997, WEP keys were intended to make wireless networks have comparable security to that of wired networks. A WEP key could be interpreted as a 26 digit password allowing access to a home network. There are several security flaws in the WEP keys currently being used and there exists readily available software (such as AirSnort or AirCrack) that can obtain a WEP key in minutes. WEP keys are now considered completely broken. The security flaws of WEP keys was first counteracted in 2002 with 'Wi-Fi Protected Access' (WPA) but the attack vector are now known. Now (as of 2004), full IEEE 802.11i (WPA2) encryption standards have been release and are still considered secure as of 2009. &lt;br /&gt;
&lt;br /&gt;
Another security measure in effect involves suppressing the Access Points' SSID broadcast to only allow a predefined set of MAC addresses the ability to join the network. This security measure has since proven ineffective, since if an allowed MAC address is known (or found out) by an attacker then they could potentially change their own MAC address to spoof as an allowed machine.  &lt;br /&gt;
&lt;br /&gt;
===DNS Spoofing and Kaminsky Attack===&lt;br /&gt;
In June 2005 Dan Kaminsky used a DNS hack in order to get free Wi-Fi at an area starbucks. He later realized the huge security issues this presented and brought attention to the Wi-Fi and DNS security flaws. Starbucks offers a Wi-Fi service but it costs a premium, the Kaminsky hack fools the domain name system and thorough Wi-Fi, exposed a glaring Internet security flaw. &lt;br /&gt;
&lt;br /&gt;
The following is an excerpt from WIRED magazine:&lt;br /&gt;
&lt;br /&gt;
'''How DNS works'''&lt;br /&gt;
&lt;br /&gt;
1. Type anybank.com into your Web brower and the query packet is sent to your internet service provider (ISP)&lt;br /&gt;
&lt;br /&gt;
2. If anybank.com's location isn't cached, your ISP's name server repeatedly searches the domain name system for it. Each search is assigned a 16-bit transaction ID for security and tracking. Responses to the searches must carry the correct transaction ID to be accepted by the name server. The packet would travel through the root name server, the .com name server then anybank.com name server.&lt;br /&gt;
&lt;br /&gt;
3. Eventually, anybank.com sends an answer to your ISP; Our home page is at 60.190.216.103. This authenticated address is cached.&lt;br /&gt;
&lt;br /&gt;
4. Your browser connects you.&lt;br /&gt;
&lt;br /&gt;
'''How the Kaminsky DNS hack works'''&lt;br /&gt;
&lt;br /&gt;
1. The attacker tries to hijack anybank.com by sending thousands of requests for fake Web pages. Malicious query packets are sent to your ISP.&lt;br /&gt;
&lt;br /&gt;
2. The ISP gives each query a transaction ID (unknown to the attacker) and attempts to locates the pages.&lt;br /&gt;
&lt;br /&gt;
3. At the same time, the attacker sends hundreds of responses for each malicious request. Every answer includes a randomly generated ID number.&lt;br /&gt;
&lt;br /&gt;
4. Eventually one of the answers carries an ID that matches, tricking the ISP into accepting and caching the information. The now-legitimized answer contains false details about anybank.com, such as the location of its servers. Legitimate answers from anybank.com(&amp;quot;No such page exists&amp;quot;) will now be rejected.&lt;br /&gt;
&lt;br /&gt;
5. Users looking for anybank.com get sent to the fake location already in the ISP's cache.&lt;br /&gt;
&lt;br /&gt;
6. Anybank.com customers are now using a look-alike site built by the hacker.&lt;br /&gt;
&lt;br /&gt;
'''Patch fixing Kaminsky attack'''&lt;br /&gt;
&lt;br /&gt;
Most computers have 63, 536 ports, but DNS commonly uses only port 53 for all queries and responses. The patch works by randomly changing the port number for each DNS request. Now any response to a request must contain an accurate transaction ID number and return to the same port. The change increases the odds of beating the system from one in 65, 536 to one in 4 billion.&amp;lt;sup&amp;gt;[numb]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Piggybacking===&lt;br /&gt;
Piggybacking refers to accessing a wireless internet connection by bringing a wireless device in range of another connection and using the service without the owners knowledge or permission. Piggybacking is completely outlawed in some jurisdictions, but allowed in others. It is not considered piggybacking if a bussiness offers a Wi-Fi hotspot for free or as a pay service. &lt;br /&gt;
&lt;br /&gt;
Piggybacking ofter goes unnoticed since most people only use a fraction of their upstream bandwidth. Piggybacking may also be carried out unintentionally, as most access points are configured without encryption (WPA2) and operating systems can automatically connect to wireless networks. The danger in piggybacking exists in users logging into an insecure network where illicit activity is conducted (danger for network owner) or sensitive information is broadcast (danger for user).&amp;lt;sup&amp;gt;[ffffffff]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===The Wi-Fi Scam, Home Security Scam and Bluetooth Scam===&lt;br /&gt;
'The Real Hustle' a UK television show is premised as an educational program demonstrating how people are getting ripped-off by confidence men around the world. The hustlers demonstrate how easy it is to gain access to a Wireless network through various scams. &lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=jqic_aY3TqQ&amp;amp;feature=related Wi-Fi Scam], the hustlers hijack a wireless network then rename their own wireless network and route people to a dummy site that looks completely legitimate. &lt;br /&gt;
&lt;br /&gt;
In the Home Security Scam, the hustlers walk through a residential neighborhood and enter home wireless networks by either hacking WEP keys or finding an unlocked network. The hustlers then monitor others online activity.&lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=gvDp-DBh4Gc&amp;amp;feature=related Bluetooth Scam], the hustlers scan a shopping mall for bluetooth signals from mobile phones. Once a signal is found and a connection is made, the hustlers call their premium rate line and rack up a bill for the cell phone owner.&lt;br /&gt;
&lt;br /&gt;
There exists dozens of tutorials on the Internet on how to use Wi-Fi for illicit purposes, demonstrating just how vunerable a wireless network is.&lt;br /&gt;
&lt;br /&gt;
==Other 802 Standards and Amendments==&lt;br /&gt;
[http://en.wikipedia.org/wiki/IEEE_802 See: IEEE 802 Wiki]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
# Comer, D. E. (2006). Wi-Fi. ''Internetworking with TCP/IP'' (Fifth ed., pp. 419-441). Upper Saddle River, NJ: Pearson Prentice Hall.&lt;br /&gt;
# &amp;quot;[http://www.wilcorpinc.com/wifi_history.htm Wi-Fi History]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# &amp;quot;[http://networkbits.net/wireless-printing/80211-g-pros-cons-of-a-wireless-network-in-a-business-environment/ Pros and Cons...]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# Davis, Joshua (Dec 2008). Collapse. ''WIRED Magazine'' (pp. 200-205,224, 231)&lt;br /&gt;
# &amp;quot;[http://en.wikipedia.org/wiki/Piggybacking_(internet_access) Piggybacking]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# &amp;quot;[http://www.wi-fi.org/about_overview.php Overview of the Wi-Fi Alliance]&amp;quot;. Retrieved on 2009-04-08&lt;br /&gt;
# &amp;quot;[http://computer.howstuffworks.com/municipal-wifi.htm How Municipal Wi-Fi works]&amp;quot;. Retrieved on 2009-04-09&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks Denial of Service Attacks]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Security_for_Small_Home_Networks Security for Small Home Networks]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Peer_To_Peer_Network_Security Peer To Peer Network Security]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Man_in_the_Middle_Attack Man in the Middle Attacks]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Domain_Name_System Domain Name System (DNS)]&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Hamilr3|Hamilr3]] 00:51, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Wi-Fi</id>
		<title>Wi-Fi</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Wi-Fi"/>
				<updated>2009-04-13T00:10:41Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;/* See Also */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Wifilogo.jpg|thumb|Wi-Fi logo]]&lt;br /&gt;
''Wi-Fi is a consortium that verifies 802.11b wireless network products interoperate, and a marketing term vendors use to sell their products.''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Wi-Fi is a subsection of the IEEE 802, a subcategory in the link layer of the TCP/IP [[The Five-Layer TCP/IP Model: Description/Attacks/Defense|Internet Protocol Suite]]. The Wi-Fi alliance is a trade group that owns the 'Wi-Fi' trademark, a symbol that certifies interoperability between wireless devices. Not every Internet product is Wi-Fi certified however, and there exists many devices that are able to interoperate wirelessly without the Wi-Fi logo. Some products have chosen to omit having Wi-Fi certification to avoid paying certification costs.&lt;br /&gt;
&lt;br /&gt;
The use of Wi-Fi has boomed in recent years and is supported by a multitude of different devices. Laptops. game consoles, smartphones, printers and other peripherals usually have Wi-Fi certification. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
[[Image:Metro Wireless Node.jpg|thumb|A municipal wireless antenna. Such devices are integral in creating a mesh network of access points. ]]&lt;br /&gt;
Wi-Fi was invented by Vic Hayes (dubbed 'the father of Wi-Fi') at the NCR Corporation/AT &amp;amp; T (later Lucent &amp;amp; Agere Systems), in 1991. Hayes had been designing IEEE standards for 802.11b, 802.11a and 802.11g and subsequent technology, initially meant for cashier systems. NCR initially released the technology under the name of 'WaveLAN' which operated in a range of 1Mbps-2 Mbps. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; The Wi-Fi alliance was created soon after the technology. &lt;br /&gt;
&lt;br /&gt;
The alliance is a consortium of separate, independent companies that promotes and develops IEEE 802.11 standards. The alliance also tests products to establish interoperability and certifies products that pass. The 'Wi-Fi' logo is allowed to be used by manufacturers who subscribe to the alliance and whose products pass testing. There exists sever unofficial &amp;quot;Wi-Fi&amp;quot; products that may work, but lack true certification.&lt;br /&gt;
&lt;br /&gt;
The term &amp;quot;Wi-Fi&amp;quot; was coined by Interbrand Corporation in August 1999 when hired by the Alliance to change the name from 'IEEE 802.11b Direct Sequence.' Interbrand also created the official 'Wi-Fi' logo. It is often assumed that Wi-Fi stands for &amp;quot;Wireless Fidelity&amp;quot;, however officially Wi-Fi is an abstract term and the Wi-Fi alliance is trying to downplay any association to &amp;quot;Hi-Fi&amp;quot; (High Fidelity).&lt;br /&gt;
&lt;br /&gt;
Many cities globally, have announced plans for a city-wide Wi-Fi network. Many such project have since been cancelled due to unforseen difficulties however, a few (such as Sunnyvale, California) were successful. The city-wide networks were created by meshing several wireless antenna together and effectively creating a very large hotspot.&lt;br /&gt;
&lt;br /&gt;
==Uses==&lt;br /&gt;
There are typically two ses for Wi-Fi: it can be used as an access technology whereby a single base station (access point) accomodates multiple clients, or it can be used in a point-to-point configuration, connecting exactly 2 access points. The latter is typically reserved for standard 802.16 (Wi-Max) and used by network providers or corporations to connect two sites. &lt;br /&gt;
&lt;br /&gt;
A Wi-Fi enabled device can connect to the internet if the access point it reaches is part of a network containing the internet. A wi-Fi enabled device can essentially use the internet for any networking purpose. &lt;br /&gt;
&lt;br /&gt;
There exists many wireless 'hotspots' which integrate one or more access points and the hotspots can span a range of a few meters to several kilometers( Sunnyvale, California for example, offers free city-wide Wi-Fi). Many businesses offer wireless hotspots as either free or pay services in order to attract customers. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi devices can operate in different modes such as peer-to-peer mode, which allows a direct connection between two people. In ad-hoc mode Wi-Fi devices are able to make client-to-client connections without a router. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi can enable wireless voice application (VoIP). The widespread growth of Wi-Fi now allows access to the internet outside 'traditional' setups (such as the bathroom). Wi-Fi installations can ultimately provide: a sequre computer networking gateway, firewall, DHCP server, intrusion detection system and many other services.&lt;br /&gt;
&lt;br /&gt;
==Advantages and Challenges==&lt;br /&gt;
Wi-Fi uses an unlicensed radio spectrum (unlike packet radio systems) and does not require regulatory approval for individual developers, which makes Wi-Fi products widely available. Different brands are able to make products that are interoperable at a basic service level because of the technological foundations in Wi-Fi. Competition amounsts vendors has also considerably lowered prices of Wi-Fi products, and they continue to drop as technology improves. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi  allows local area networks (LANs) to be set up without wires, which simultaneously lowers costs (of creating and exapnding) and allows much freedom in where a network can be accessed. The Wi-Fi certification aheres to a global set of standards as well so Wi-Fi products are compatible in any region. &lt;br /&gt;
&lt;br /&gt;
===Range===&lt;br /&gt;
[[Image:Point-to-point-wifi-antenna.jpg|thumb|A point-to-point parabolic Wi-Fi antenna. Such devices can dramatically increase the range of a Wi-Fi network (in a single direction). The devices may be costly to buy and run however.]]&lt;br /&gt;
&lt;br /&gt;
Typically a Wi-Fi router in a home setup with a 802.11b stock antenna has a range of about 32m indoors (due to barriers like walls) and about 95m with no obstructions, outdoors. The frequency block a router uses also affects the range: 2.4GHz has a greater range than 5 GHz. Wi-Fi has greater range compared to bluetooth and can provide huge outdoor range if a network incorporates a directional antenna.&lt;br /&gt;
&lt;br /&gt;
Wi-Fi began with IEEE standards for short range wireless broadband technology, and appointed the standard numbers: 802.11b(Wi-Fi), 802.11a and 802.11g (can interoperate with 802.11b). Typically Wi-Fi operates between 2.5 to 4Mbps, but can go as high as 11 Mbps.&lt;br /&gt;
&lt;br /&gt;
===Mobility===&lt;br /&gt;
Wi-Fi technology allows LANs to be deployed without cabling, potentially reducing the costs of network deployment and expansion. Spaces where cables cannont be run, such as outdoor areas or historical buildings can host wireless LANs. Wi-Fi technology increases the ease of setting up a network as well. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi networks support roaming, in which a mobile client station (like a laptop or smartphone) can move from one access point to another as the user moves. It is because Wi-Fi certified devices are able to interoperate that this is possible without complications as well.&lt;br /&gt;
&lt;br /&gt;
==Security==&lt;br /&gt;
The greatest security issue with Wi-Fi (and all other wireless networks) is the easy of connectivity compared to traditional wired networks like Ethernet. Wireless communication (bluetooth especially) is designed to be simple and easily connected to. To make an attack on a wired network, the attacker must physically connect to the internal network or break through an external firewall. External access however is usually disallowed by business networks in order to protect sensitive data. It is because firewall encryption could be broken that most business networks disallow external access. Getting wireless reception is considered an attack to most business networks.&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The nature most wireless networks is to allow external access in order to maintain an degree of usability. If attackers gain access to a wireless network they can harm the user in a variety of ways from monitoring others' activity to fabricating a DNS spoofing attack. &lt;br /&gt;
&lt;br /&gt;
===Preventative Measures===&lt;br /&gt;
[[Image:Wep.gif|thumb|The WEP encryption standard. The vunerabilities are shown by malicious software and a single key for all users on the network.]]&lt;br /&gt;
WEP (Wired Equivalent Privacy) keys uses a deprecated algorithm to secure Wireless networks. First introduced in 1997, WEP keys were intended to make wireless networks have comparable security to that of wired networks. A WEP key could be interpreted as a 26 digit password allowing access to a home network. There are several security flaws in the WEP keys currently being used and there exists readily available software (such as AirSnort or AirCrack) that can obtain a WEP key in minutes. WEP keys are now considered completely broken. The security flaws of WEP keys was first counteracted in 2002 with 'Wi-Fi Protected Access' (WPA) but the attack vector are now known. Now (as of 2004), full IEEE 802.11i (WPA2) encryption standards have been release and are still considered secure as of 2009. &lt;br /&gt;
&lt;br /&gt;
Another security measure in effect involves suppressing the Access Points' SSID broadcast to only allow a predefined set of MAC addresses the ability to join the network. This security measure has since proven ineffective, since if an allowed MAC address is known (or found out) by an attacker then they could potentially change their own MAC address to spoof as an allowed machine.  &lt;br /&gt;
&lt;br /&gt;
===DNS Spoofing and Kaminsky Attack===&lt;br /&gt;
In June 2005 Dan Kaminsky used a DNS hack in order to get free Wi-Fi at an area starbucks. He later realized the huge security issues this presented and brought attention to the Wi-Fi and DNS security flaws. Starbucks offers a Wi-Fi service but it costs a premium, the Kaminsky hack fools the domain name system and thorough Wi-Fi, exposed a glaring Internet security flaw. &lt;br /&gt;
&lt;br /&gt;
The following is an excerpt from WIRED magazine:&lt;br /&gt;
&lt;br /&gt;
'''How DNS works'''&lt;br /&gt;
&lt;br /&gt;
1. Type anybank.com into your Web brower and the query packet is sent to your internet service provider (ISP)&lt;br /&gt;
&lt;br /&gt;
2. If anybank.com's location isn't cached, your ISP's name server repeatedly searches the domain name system for it. Each search is assigned a 16-bit transaction ID for security and tracking. Responses to the searches must carry the correct transaction ID to be accepted by the name server. The packet would travel through the root name server, the .com name server then anybank.com name server.&lt;br /&gt;
&lt;br /&gt;
3. Eventually, anybank.com sends an answer to your ISP; Our home page is at 60.190.216.103. This authenticated address is cached.&lt;br /&gt;
&lt;br /&gt;
4. Your browser connects you.&lt;br /&gt;
&lt;br /&gt;
'''How the Kaminsky DNS hack works'''&lt;br /&gt;
&lt;br /&gt;
1. The attacker tries to hijack anybank.com by sending thousands of requests for fake Web pages. Malicious query packets are sent to your ISP.&lt;br /&gt;
&lt;br /&gt;
2. The ISP gives each query a transaction ID (unknown to the attacker) and attempts to locates the pages.&lt;br /&gt;
&lt;br /&gt;
3. At the same time, the attacker sends hundreds of responses for each malicious request. Every answer includes a randomly generated ID number.&lt;br /&gt;
&lt;br /&gt;
4. Eventually one of the answers carries an ID that matches, tricking the ISP into accepting and caching the information. The now-legitimized answer contains false details about anybank.com, such as the location of its servers. Legitimate answers from anybank.com(&amp;quot;No such page exists&amp;quot;) will now be rejected.&lt;br /&gt;
&lt;br /&gt;
5. Users looking for anybank.com get sent to the fake location already in the ISP's cache.&lt;br /&gt;
&lt;br /&gt;
6. Anybank.com customers are now using a look-alike site built by the hacker.&lt;br /&gt;
&lt;br /&gt;
'''Patch fixing Kaminsky attack'''&lt;br /&gt;
&lt;br /&gt;
Most computers have 63, 536 ports, but DNS commonly uses only port 53 for all queries and responses. The patch works by randomly changing the port number for each DNS request. Now any response to a request must contain an accurate transaction ID number and return to the same port. The change increases the odds of beating the system from one in 65, 536 to one in 4 billion.&amp;lt;sup&amp;gt;[numb]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Piggybacking===&lt;br /&gt;
Piggybacking refers to accessing a wireless internet connection by bringing a wireless device in range of another connection and using the service without the owners knowledge or permission. Piggybacking is completely outlawed in some jurisdictions, but allowed in others. It is not considered piggybacking if a bussiness offers a Wi-Fi hotspot for free or as a pay service. &lt;br /&gt;
&lt;br /&gt;
Piggybacking ofter goes unnoticed since most people only use a fraction of their upstream bandwidth. Piggybacking may also be carried out unintentionally, as most access points are configured without encryption (WPA2) and operating systems can automatically connect to wireless networks. The danger in piggybacking exists in users logging into an insecure network where illicit activity is conducted (danger for network owner) or sensitive information is broadcast (danger for user).&amp;lt;sup&amp;gt;[ffffffff]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===The Wi-Fi Scam, Home Security Scam and Bluetooth Scam===&lt;br /&gt;
'The Real Hustle' a UK television show is premised as an educational program demonstrating how people are getting ripped-off by confidence men around the world. The hustlers demonstrate how easy it is to gain access to a Wireless network through various scams. &lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=jqic_aY3TqQ&amp;amp;feature=related Wi-Fi Scam], the hustlers hijack a wireless network then rename their own wireless network and route people to a dummy site that looks completely legitimate. &lt;br /&gt;
&lt;br /&gt;
In the Home Security Scam, the hustlers walk through a residential neighborhood and enter home wireless networks by either hacking WEP keys or finding an unlocked network. The hustlers then monitor others online activity.&lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=gvDp-DBh4Gc&amp;amp;feature=related Bluetooth Scam], the hustlers scan a shopping mall for bluetooth signals from mobile phones. Once a signal is found and a connection is made, the hustlers call their premium rate line and rack up a bill for the cell phone owner.&lt;br /&gt;
&lt;br /&gt;
There exists dozens of tutorials on the Internet on how to use Wi-Fi for illicit purposes, demonstrating just how vunerable a wireless network is.&lt;br /&gt;
&lt;br /&gt;
==Other 802 Standards and Amendments==&lt;br /&gt;
[http://en.wikipedia.org/wiki/IEEE_802 See: IEEE 802 Wiki]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
# Comer, D. E. (2006). Wi-Fi. ''Internetworking with TCP/IP'' (Fifth ed., pp. 419-441). Upper Saddle River, NJ: Pearson Prentice Hall.&lt;br /&gt;
# &amp;quot;[http://www.wilcorpinc.com/wifi_history.htm Wi-Fi History]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# &amp;quot;[http://networkbits.net/wireless-printing/80211-g-pros-cons-of-a-wireless-network-in-a-business-environment/ Pros and Cons...]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# Davis, Joshua (Dec 2008). Collapse. ''WIRED Magazine'' (pp. 200-205,224, 231)&lt;br /&gt;
# &amp;quot;[http://en.wikipedia.org/wiki/Piggybacking_(internet_access) Piggybacking]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks Denial of Service Attacks]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Security_for_Small_Home_Networks Security for Small Home Networks]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Peer_To_Peer_Network_Security Peer To Peer Network Security]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Man_in_the_Middle_Attack Man in the Middle Attacks]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Domain_Name_System Domain Name System (DNS)]&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Hamilr3|Hamilr3]] 00:51, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Wi-Fi</id>
		<title>Wi-Fi</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Wi-Fi"/>
				<updated>2009-04-13T00:08:58Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;/* References */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Wifilogo.jpg|thumb|Wi-Fi logo]]&lt;br /&gt;
''Wi-Fi is a consortium that verifies 802.11b wireless network products interoperate, and a marketing term vendors use to sell their products.''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Wi-Fi is a subsection of the IEEE 802, a subcategory in the link layer of the TCP/IP [[The Five-Layer TCP/IP Model: Description/Attacks/Defense|Internet Protocol Suite]]. The Wi-Fi alliance is a trade group that owns the 'Wi-Fi' trademark, a symbol that certifies interoperability between wireless devices. Not every Internet product is Wi-Fi certified however, and there exists many devices that are able to interoperate wirelessly without the Wi-Fi logo. Some products have chosen to omit having Wi-Fi certification to avoid paying certification costs.&lt;br /&gt;
&lt;br /&gt;
The use of Wi-Fi has boomed in recent years and is supported by a multitude of different devices. Laptops. game consoles, smartphones, printers and other peripherals usually have Wi-Fi certification. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
[[Image:Metro Wireless Node.jpg|thumb|A municipal wireless antenna. Such devices are integral in creating a mesh network of access points. ]]&lt;br /&gt;
Wi-Fi was invented by Vic Hayes (dubbed 'the father of Wi-Fi') at the NCR Corporation/AT &amp;amp; T (later Lucent &amp;amp; Agere Systems), in 1991. Hayes had been designing IEEE standards for 802.11b, 802.11a and 802.11g and subsequent technology, initially meant for cashier systems. NCR initially released the technology under the name of 'WaveLAN' which operated in a range of 1Mbps-2 Mbps. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; The Wi-Fi alliance was created soon after the technology. &lt;br /&gt;
&lt;br /&gt;
The alliance is a consortium of separate, independent companies that promotes and develops IEEE 802.11 standards. The alliance also tests products to establish interoperability and certifies products that pass. The 'Wi-Fi' logo is allowed to be used by manufacturers who subscribe to the alliance and whose products pass testing. There exists sever unofficial &amp;quot;Wi-Fi&amp;quot; products that may work, but lack true certification.&lt;br /&gt;
&lt;br /&gt;
The term &amp;quot;Wi-Fi&amp;quot; was coined by Interbrand Corporation in August 1999 when hired by the Alliance to change the name from 'IEEE 802.11b Direct Sequence.' Interbrand also created the official 'Wi-Fi' logo. It is often assumed that Wi-Fi stands for &amp;quot;Wireless Fidelity&amp;quot;, however officially Wi-Fi is an abstract term and the Wi-Fi alliance is trying to downplay any association to &amp;quot;Hi-Fi&amp;quot; (High Fidelity).&lt;br /&gt;
&lt;br /&gt;
Many cities globally, have announced plans for a city-wide Wi-Fi network. Many such project have since been cancelled due to unforseen difficulties however, a few (such as Sunnyvale, California) were successful. The city-wide networks were created by meshing several wireless antenna together and effectively creating a very large hotspot.&lt;br /&gt;
&lt;br /&gt;
==Uses==&lt;br /&gt;
There are typically two ses for Wi-Fi: it can be used as an access technology whereby a single base station (access point) accomodates multiple clients, or it can be used in a point-to-point configuration, connecting exactly 2 access points. The latter is typically reserved for standard 802.16 (Wi-Max) and used by network providers or corporations to connect two sites. &lt;br /&gt;
&lt;br /&gt;
A Wi-Fi enabled device can connect to the internet if the access point it reaches is part of a network containing the internet. A wi-Fi enabled device can essentially use the internet for any networking purpose. &lt;br /&gt;
&lt;br /&gt;
There exists many wireless 'hotspots' which integrate one or more access points and the hotspots can span a range of a few meters to several kilometers( Sunnyvale, California for example, offers free city-wide Wi-Fi). Many businesses offer wireless hotspots as either free or pay services in order to attract customers. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi devices can operate in different modes such as peer-to-peer mode, which allows a direct connection between two people. In ad-hoc mode Wi-Fi devices are able to make client-to-client connections without a router. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi can enable wireless voice application (VoIP). The widespread growth of Wi-Fi now allows access to the internet outside 'traditional' setups (such as the bathroom). Wi-Fi installations can ultimately provide: a sequre computer networking gateway, firewall, DHCP server, intrusion detection system and many other services.&lt;br /&gt;
&lt;br /&gt;
==Advantages and Challenges==&lt;br /&gt;
Wi-Fi uses an unlicensed radio spectrum (unlike packet radio systems) and does not require regulatory approval for individual developers, which makes Wi-Fi products widely available. Different brands are able to make products that are interoperable at a basic service level because of the technological foundations in Wi-Fi. Competition amounsts vendors has also considerably lowered prices of Wi-Fi products, and they continue to drop as technology improves. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi  allows local area networks (LANs) to be set up without wires, which simultaneously lowers costs (of creating and exapnding) and allows much freedom in where a network can be accessed. The Wi-Fi certification aheres to a global set of standards as well so Wi-Fi products are compatible in any region. &lt;br /&gt;
&lt;br /&gt;
===Range===&lt;br /&gt;
[[Image:Point-to-point-wifi-antenna.jpg|thumb|A point-to-point parabolic Wi-Fi antenna. Such devices can dramatically increase the range of a Wi-Fi network (in a single direction). The devices may be costly to buy and run however.]]&lt;br /&gt;
&lt;br /&gt;
Typically a Wi-Fi router in a home setup with a 802.11b stock antenna has a range of about 32m indoors (due to barriers like walls) and about 95m with no obstructions, outdoors. The frequency block a router uses also affects the range: 2.4GHz has a greater range than 5 GHz. Wi-Fi has greater range compared to bluetooth and can provide huge outdoor range if a network incorporates a directional antenna.&lt;br /&gt;
&lt;br /&gt;
Wi-Fi began with IEEE standards for short range wireless broadband technology, and appointed the standard numbers: 802.11b(Wi-Fi), 802.11a and 802.11g (can interoperate with 802.11b). Typically Wi-Fi operates between 2.5 to 4Mbps, but can go as high as 11 Mbps.&lt;br /&gt;
&lt;br /&gt;
===Mobility===&lt;br /&gt;
Wi-Fi technology allows LANs to be deployed without cabling, potentially reducing the costs of network deployment and expansion. Spaces where cables cannont be run, such as outdoor areas or historical buildings can host wireless LANs. Wi-Fi technology increases the ease of setting up a network as well. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi networks support roaming, in which a mobile client station (like a laptop or smartphone) can move from one access point to another as the user moves. It is because Wi-Fi certified devices are able to interoperate that this is possible without complications as well.&lt;br /&gt;
&lt;br /&gt;
==Security==&lt;br /&gt;
The greatest security issue with Wi-Fi (and all other wireless networks) is the easy of connectivity compared to traditional wired networks like Ethernet. Wireless communication (bluetooth especially) is designed to be simple and easily connected to. To make an attack on a wired network, the attacker must physically connect to the internal network or break through an external firewall. External access however is usually disallowed by business networks in order to protect sensitive data. It is because firewall encryption could be broken that most business networks disallow external access. Getting wireless reception is considered an attack to most business networks.&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The nature most wireless networks is to allow external access in order to maintain an degree of usability. If attackers gain access to a wireless network they can harm the user in a variety of ways from monitoring others' activity to fabricating a DNS spoofing attack. &lt;br /&gt;
&lt;br /&gt;
===Preventative Measures===&lt;br /&gt;
[[Image:Wep.gif|thumb|The WEP encryption standard. The vunerabilities are shown by malicious software and a single key for all users on the network.]]&lt;br /&gt;
WEP (Wired Equivalent Privacy) keys uses a deprecated algorithm to secure Wireless networks. First introduced in 1997, WEP keys were intended to make wireless networks have comparable security to that of wired networks. A WEP key could be interpreted as a 26 digit password allowing access to a home network. There are several security flaws in the WEP keys currently being used and there exists readily available software (such as AirSnort or AirCrack) that can obtain a WEP key in minutes. WEP keys are now considered completely broken. The security flaws of WEP keys was first counteracted in 2002 with 'Wi-Fi Protected Access' (WPA) but the attack vector are now known. Now (as of 2004), full IEEE 802.11i (WPA2) encryption standards have been release and are still considered secure as of 2009. &lt;br /&gt;
&lt;br /&gt;
Another security measure in effect involves suppressing the Access Points' SSID broadcast to only allow a predefined set of MAC addresses the ability to join the network. This security measure has since proven ineffective, since if an allowed MAC address is known (or found out) by an attacker then they could potentially change their own MAC address to spoof as an allowed machine.  &lt;br /&gt;
&lt;br /&gt;
===DNS Spoofing and Kaminsky Attack===&lt;br /&gt;
In June 2005 Dan Kaminsky used a DNS hack in order to get free Wi-Fi at an area starbucks. He later realized the huge security issues this presented and brought attention to the Wi-Fi and DNS security flaws. Starbucks offers a Wi-Fi service but it costs a premium, the Kaminsky hack fools the domain name system and thorough Wi-Fi, exposed a glaring Internet security flaw. &lt;br /&gt;
&lt;br /&gt;
The following is an excerpt from WIRED magazine:&lt;br /&gt;
&lt;br /&gt;
'''How DNS works'''&lt;br /&gt;
&lt;br /&gt;
1. Type anybank.com into your Web brower and the query packet is sent to your internet service provider (ISP)&lt;br /&gt;
&lt;br /&gt;
2. If anybank.com's location isn't cached, your ISP's name server repeatedly searches the domain name system for it. Each search is assigned a 16-bit transaction ID for security and tracking. Responses to the searches must carry the correct transaction ID to be accepted by the name server. The packet would travel through the root name server, the .com name server then anybank.com name server.&lt;br /&gt;
&lt;br /&gt;
3. Eventually, anybank.com sends an answer to your ISP; Our home page is at 60.190.216.103. This authenticated address is cached.&lt;br /&gt;
&lt;br /&gt;
4. Your browser connects you.&lt;br /&gt;
&lt;br /&gt;
'''How the Kaminsky DNS hack works'''&lt;br /&gt;
&lt;br /&gt;
1. The attacker tries to hijack anybank.com by sending thousands of requests for fake Web pages. Malicious query packets are sent to your ISP.&lt;br /&gt;
&lt;br /&gt;
2. The ISP gives each query a transaction ID (unknown to the attacker) and attempts to locates the pages.&lt;br /&gt;
&lt;br /&gt;
3. At the same time, the attacker sends hundreds of responses for each malicious request. Every answer includes a randomly generated ID number.&lt;br /&gt;
&lt;br /&gt;
4. Eventually one of the answers carries an ID that matches, tricking the ISP into accepting and caching the information. The now-legitimized answer contains false details about anybank.com, such as the location of its servers. Legitimate answers from anybank.com(&amp;quot;No such page exists&amp;quot;) will now be rejected.&lt;br /&gt;
&lt;br /&gt;
5. Users looking for anybank.com get sent to the fake location already in the ISP's cache.&lt;br /&gt;
&lt;br /&gt;
6. Anybank.com customers are now using a look-alike site built by the hacker.&lt;br /&gt;
&lt;br /&gt;
'''Patch fixing Kaminsky attack'''&lt;br /&gt;
&lt;br /&gt;
Most computers have 63, 536 ports, but DNS commonly uses only port 53 for all queries and responses. The patch works by randomly changing the port number for each DNS request. Now any response to a request must contain an accurate transaction ID number and return to the same port. The change increases the odds of beating the system from one in 65, 536 to one in 4 billion.&amp;lt;sup&amp;gt;[numb]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Piggybacking===&lt;br /&gt;
Piggybacking refers to accessing a wireless internet connection by bringing a wireless device in range of another connection and using the service without the owners knowledge or permission. Piggybacking is completely outlawed in some jurisdictions, but allowed in others. It is not considered piggybacking if a bussiness offers a Wi-Fi hotspot for free or as a pay service. &lt;br /&gt;
&lt;br /&gt;
Piggybacking ofter goes unnoticed since most people only use a fraction of their upstream bandwidth. Piggybacking may also be carried out unintentionally, as most access points are configured without encryption (WPA2) and operating systems can automatically connect to wireless networks. The danger in piggybacking exists in users logging into an insecure network where illicit activity is conducted (danger for network owner) or sensitive information is broadcast (danger for user).&amp;lt;sup&amp;gt;[ffffffff]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===The Wi-Fi Scam, Home Security Scam and Bluetooth Scam===&lt;br /&gt;
'The Real Hustle' a UK television show is premised as an educational program demonstrating how people are getting ripped-off by confidence men around the world. The hustlers demonstrate how easy it is to gain access to a Wireless network through various scams. &lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=jqic_aY3TqQ&amp;amp;feature=related Wi-Fi Scam], the hustlers hijack a wireless network then rename their own wireless network and route people to a dummy site that looks completely legitimate. &lt;br /&gt;
&lt;br /&gt;
In the Home Security Scam, the hustlers walk through a residential neighborhood and enter home wireless networks by either hacking WEP keys or finding an unlocked network. The hustlers then monitor others online activity.&lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=gvDp-DBh4Gc&amp;amp;feature=related Bluetooth Scam], the hustlers scan a shopping mall for bluetooth signals from mobile phones. Once a signal is found and a connection is made, the hustlers call their premium rate line and rack up a bill for the cell phone owner.&lt;br /&gt;
&lt;br /&gt;
There exists dozens of tutorials on the Internet on how to use Wi-Fi for illicit purposes, demonstrating just how vunerable a wireless network is.&lt;br /&gt;
&lt;br /&gt;
==Other 802 Standards and Amendments==&lt;br /&gt;
[http://en.wikipedia.org/wiki/IEEE_802 See: IEEE 802 Wiki]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
# Comer, D. E. (2006). Wi-Fi. ''Internetworking with TCP/IP'' (Fifth ed., pp. 419-441). Upper Saddle River, NJ: Pearson Prentice Hall.&lt;br /&gt;
# &amp;quot;[http://www.wilcorpinc.com/wifi_history.htm Wi-Fi History]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# &amp;quot;[http://networkbits.net/wireless-printing/80211-g-pros-cons-of-a-wireless-network-in-a-business-environment/ Pros and Cons...]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# Davis, Joshua (Dec 2008). Collapse. ''WIRED Magazine'' (pp. 200-205,224, 231)&lt;br /&gt;
# &amp;quot;[http://en.wikipedia.org/wiki/Piggybacking_(internet_access) Piggybacking]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks Denial of Service Attacks]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Security_for_Small_Home_Networks Security for Small Home Networks]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Peer_To_Peer_Network_Security Peer To Peer Network Security]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Man_in_the_Middle_Attack Man in the Middle Attacks]&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Hamilr3|Hamilr3]] 00:51, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Wi-Fi</id>
		<title>Wi-Fi</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Wi-Fi"/>
				<updated>2009-04-13T00:08:18Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;/* Piggybacking */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Wifilogo.jpg|thumb|Wi-Fi logo]]&lt;br /&gt;
''Wi-Fi is a consortium that verifies 802.11b wireless network products interoperate, and a marketing term vendors use to sell their products.''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Wi-Fi is a subsection of the IEEE 802, a subcategory in the link layer of the TCP/IP [[The Five-Layer TCP/IP Model: Description/Attacks/Defense|Internet Protocol Suite]]. The Wi-Fi alliance is a trade group that owns the 'Wi-Fi' trademark, a symbol that certifies interoperability between wireless devices. Not every Internet product is Wi-Fi certified however, and there exists many devices that are able to interoperate wirelessly without the Wi-Fi logo. Some products have chosen to omit having Wi-Fi certification to avoid paying certification costs.&lt;br /&gt;
&lt;br /&gt;
The use of Wi-Fi has boomed in recent years and is supported by a multitude of different devices. Laptops. game consoles, smartphones, printers and other peripherals usually have Wi-Fi certification. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
[[Image:Metro Wireless Node.jpg|thumb|A municipal wireless antenna. Such devices are integral in creating a mesh network of access points. ]]&lt;br /&gt;
Wi-Fi was invented by Vic Hayes (dubbed 'the father of Wi-Fi') at the NCR Corporation/AT &amp;amp; T (later Lucent &amp;amp; Agere Systems), in 1991. Hayes had been designing IEEE standards for 802.11b, 802.11a and 802.11g and subsequent technology, initially meant for cashier systems. NCR initially released the technology under the name of 'WaveLAN' which operated in a range of 1Mbps-2 Mbps. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; The Wi-Fi alliance was created soon after the technology. &lt;br /&gt;
&lt;br /&gt;
The alliance is a consortium of separate, independent companies that promotes and develops IEEE 802.11 standards. The alliance also tests products to establish interoperability and certifies products that pass. The 'Wi-Fi' logo is allowed to be used by manufacturers who subscribe to the alliance and whose products pass testing. There exists sever unofficial &amp;quot;Wi-Fi&amp;quot; products that may work, but lack true certification.&lt;br /&gt;
&lt;br /&gt;
The term &amp;quot;Wi-Fi&amp;quot; was coined by Interbrand Corporation in August 1999 when hired by the Alliance to change the name from 'IEEE 802.11b Direct Sequence.' Interbrand also created the official 'Wi-Fi' logo. It is often assumed that Wi-Fi stands for &amp;quot;Wireless Fidelity&amp;quot;, however officially Wi-Fi is an abstract term and the Wi-Fi alliance is trying to downplay any association to &amp;quot;Hi-Fi&amp;quot; (High Fidelity).&lt;br /&gt;
&lt;br /&gt;
Many cities globally, have announced plans for a city-wide Wi-Fi network. Many such project have since been cancelled due to unforseen difficulties however, a few (such as Sunnyvale, California) were successful. The city-wide networks were created by meshing several wireless antenna together and effectively creating a very large hotspot.&lt;br /&gt;
&lt;br /&gt;
==Uses==&lt;br /&gt;
There are typically two ses for Wi-Fi: it can be used as an access technology whereby a single base station (access point) accomodates multiple clients, or it can be used in a point-to-point configuration, connecting exactly 2 access points. The latter is typically reserved for standard 802.16 (Wi-Max) and used by network providers or corporations to connect two sites. &lt;br /&gt;
&lt;br /&gt;
A Wi-Fi enabled device can connect to the internet if the access point it reaches is part of a network containing the internet. A wi-Fi enabled device can essentially use the internet for any networking purpose. &lt;br /&gt;
&lt;br /&gt;
There exists many wireless 'hotspots' which integrate one or more access points and the hotspots can span a range of a few meters to several kilometers( Sunnyvale, California for example, offers free city-wide Wi-Fi). Many businesses offer wireless hotspots as either free or pay services in order to attract customers. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi devices can operate in different modes such as peer-to-peer mode, which allows a direct connection between two people. In ad-hoc mode Wi-Fi devices are able to make client-to-client connections without a router. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi can enable wireless voice application (VoIP). The widespread growth of Wi-Fi now allows access to the internet outside 'traditional' setups (such as the bathroom). Wi-Fi installations can ultimately provide: a sequre computer networking gateway, firewall, DHCP server, intrusion detection system and many other services.&lt;br /&gt;
&lt;br /&gt;
==Advantages and Challenges==&lt;br /&gt;
Wi-Fi uses an unlicensed radio spectrum (unlike packet radio systems) and does not require regulatory approval for individual developers, which makes Wi-Fi products widely available. Different brands are able to make products that are interoperable at a basic service level because of the technological foundations in Wi-Fi. Competition amounsts vendors has also considerably lowered prices of Wi-Fi products, and they continue to drop as technology improves. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi  allows local area networks (LANs) to be set up without wires, which simultaneously lowers costs (of creating and exapnding) and allows much freedom in where a network can be accessed. The Wi-Fi certification aheres to a global set of standards as well so Wi-Fi products are compatible in any region. &lt;br /&gt;
&lt;br /&gt;
===Range===&lt;br /&gt;
[[Image:Point-to-point-wifi-antenna.jpg|thumb|A point-to-point parabolic Wi-Fi antenna. Such devices can dramatically increase the range of a Wi-Fi network (in a single direction). The devices may be costly to buy and run however.]]&lt;br /&gt;
&lt;br /&gt;
Typically a Wi-Fi router in a home setup with a 802.11b stock antenna has a range of about 32m indoors (due to barriers like walls) and about 95m with no obstructions, outdoors. The frequency block a router uses also affects the range: 2.4GHz has a greater range than 5 GHz. Wi-Fi has greater range compared to bluetooth and can provide huge outdoor range if a network incorporates a directional antenna.&lt;br /&gt;
&lt;br /&gt;
Wi-Fi began with IEEE standards for short range wireless broadband technology, and appointed the standard numbers: 802.11b(Wi-Fi), 802.11a and 802.11g (can interoperate with 802.11b). Typically Wi-Fi operates between 2.5 to 4Mbps, but can go as high as 11 Mbps.&lt;br /&gt;
&lt;br /&gt;
===Mobility===&lt;br /&gt;
Wi-Fi technology allows LANs to be deployed without cabling, potentially reducing the costs of network deployment and expansion. Spaces where cables cannont be run, such as outdoor areas or historical buildings can host wireless LANs. Wi-Fi technology increases the ease of setting up a network as well. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi networks support roaming, in which a mobile client station (like a laptop or smartphone) can move from one access point to another as the user moves. It is because Wi-Fi certified devices are able to interoperate that this is possible without complications as well.&lt;br /&gt;
&lt;br /&gt;
==Security==&lt;br /&gt;
The greatest security issue with Wi-Fi (and all other wireless networks) is the easy of connectivity compared to traditional wired networks like Ethernet. Wireless communication (bluetooth especially) is designed to be simple and easily connected to. To make an attack on a wired network, the attacker must physically connect to the internal network or break through an external firewall. External access however is usually disallowed by business networks in order to protect sensitive data. It is because firewall encryption could be broken that most business networks disallow external access. Getting wireless reception is considered an attack to most business networks.&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The nature most wireless networks is to allow external access in order to maintain an degree of usability. If attackers gain access to a wireless network they can harm the user in a variety of ways from monitoring others' activity to fabricating a DNS spoofing attack. &lt;br /&gt;
&lt;br /&gt;
===Preventative Measures===&lt;br /&gt;
[[Image:Wep.gif|thumb|The WEP encryption standard. The vunerabilities are shown by malicious software and a single key for all users on the network.]]&lt;br /&gt;
WEP (Wired Equivalent Privacy) keys uses a deprecated algorithm to secure Wireless networks. First introduced in 1997, WEP keys were intended to make wireless networks have comparable security to that of wired networks. A WEP key could be interpreted as a 26 digit password allowing access to a home network. There are several security flaws in the WEP keys currently being used and there exists readily available software (such as AirSnort or AirCrack) that can obtain a WEP key in minutes. WEP keys are now considered completely broken. The security flaws of WEP keys was first counteracted in 2002 with 'Wi-Fi Protected Access' (WPA) but the attack vector are now known. Now (as of 2004), full IEEE 802.11i (WPA2) encryption standards have been release and are still considered secure as of 2009. &lt;br /&gt;
&lt;br /&gt;
Another security measure in effect involves suppressing the Access Points' SSID broadcast to only allow a predefined set of MAC addresses the ability to join the network. This security measure has since proven ineffective, since if an allowed MAC address is known (or found out) by an attacker then they could potentially change their own MAC address to spoof as an allowed machine.  &lt;br /&gt;
&lt;br /&gt;
===DNS Spoofing and Kaminsky Attack===&lt;br /&gt;
In June 2005 Dan Kaminsky used a DNS hack in order to get free Wi-Fi at an area starbucks. He later realized the huge security issues this presented and brought attention to the Wi-Fi and DNS security flaws. Starbucks offers a Wi-Fi service but it costs a premium, the Kaminsky hack fools the domain name system and thorough Wi-Fi, exposed a glaring Internet security flaw. &lt;br /&gt;
&lt;br /&gt;
The following is an excerpt from WIRED magazine:&lt;br /&gt;
&lt;br /&gt;
'''How DNS works'''&lt;br /&gt;
&lt;br /&gt;
1. Type anybank.com into your Web brower and the query packet is sent to your internet service provider (ISP)&lt;br /&gt;
&lt;br /&gt;
2. If anybank.com's location isn't cached, your ISP's name server repeatedly searches the domain name system for it. Each search is assigned a 16-bit transaction ID for security and tracking. Responses to the searches must carry the correct transaction ID to be accepted by the name server. The packet would travel through the root name server, the .com name server then anybank.com name server.&lt;br /&gt;
&lt;br /&gt;
3. Eventually, anybank.com sends an answer to your ISP; Our home page is at 60.190.216.103. This authenticated address is cached.&lt;br /&gt;
&lt;br /&gt;
4. Your browser connects you.&lt;br /&gt;
&lt;br /&gt;
'''How the Kaminsky DNS hack works'''&lt;br /&gt;
&lt;br /&gt;
1. The attacker tries to hijack anybank.com by sending thousands of requests for fake Web pages. Malicious query packets are sent to your ISP.&lt;br /&gt;
&lt;br /&gt;
2. The ISP gives each query a transaction ID (unknown to the attacker) and attempts to locates the pages.&lt;br /&gt;
&lt;br /&gt;
3. At the same time, the attacker sends hundreds of responses for each malicious request. Every answer includes a randomly generated ID number.&lt;br /&gt;
&lt;br /&gt;
4. Eventually one of the answers carries an ID that matches, tricking the ISP into accepting and caching the information. The now-legitimized answer contains false details about anybank.com, such as the location of its servers. Legitimate answers from anybank.com(&amp;quot;No such page exists&amp;quot;) will now be rejected.&lt;br /&gt;
&lt;br /&gt;
5. Users looking for anybank.com get sent to the fake location already in the ISP's cache.&lt;br /&gt;
&lt;br /&gt;
6. Anybank.com customers are now using a look-alike site built by the hacker.&lt;br /&gt;
&lt;br /&gt;
'''Patch fixing Kaminsky attack'''&lt;br /&gt;
&lt;br /&gt;
Most computers have 63, 536 ports, but DNS commonly uses only port 53 for all queries and responses. The patch works by randomly changing the port number for each DNS request. Now any response to a request must contain an accurate transaction ID number and return to the same port. The change increases the odds of beating the system from one in 65, 536 to one in 4 billion.&amp;lt;sup&amp;gt;[numb]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Piggybacking===&lt;br /&gt;
Piggybacking refers to accessing a wireless internet connection by bringing a wireless device in range of another connection and using the service without the owners knowledge or permission. Piggybacking is completely outlawed in some jurisdictions, but allowed in others. It is not considered piggybacking if a bussiness offers a Wi-Fi hotspot for free or as a pay service. &lt;br /&gt;
&lt;br /&gt;
Piggybacking ofter goes unnoticed since most people only use a fraction of their upstream bandwidth. Piggybacking may also be carried out unintentionally, as most access points are configured without encryption (WPA2) and operating systems can automatically connect to wireless networks. The danger in piggybacking exists in users logging into an insecure network where illicit activity is conducted (danger for network owner) or sensitive information is broadcast (danger for user).&amp;lt;sup&amp;gt;[ffffffff]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===The Wi-Fi Scam, Home Security Scam and Bluetooth Scam===&lt;br /&gt;
'The Real Hustle' a UK television show is premised as an educational program demonstrating how people are getting ripped-off by confidence men around the world. The hustlers demonstrate how easy it is to gain access to a Wireless network through various scams. &lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=jqic_aY3TqQ&amp;amp;feature=related Wi-Fi Scam], the hustlers hijack a wireless network then rename their own wireless network and route people to a dummy site that looks completely legitimate. &lt;br /&gt;
&lt;br /&gt;
In the Home Security Scam, the hustlers walk through a residential neighborhood and enter home wireless networks by either hacking WEP keys or finding an unlocked network. The hustlers then monitor others online activity.&lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=gvDp-DBh4Gc&amp;amp;feature=related Bluetooth Scam], the hustlers scan a shopping mall for bluetooth signals from mobile phones. Once a signal is found and a connection is made, the hustlers call their premium rate line and rack up a bill for the cell phone owner.&lt;br /&gt;
&lt;br /&gt;
There exists dozens of tutorials on the Internet on how to use Wi-Fi for illicit purposes, demonstrating just how vunerable a wireless network is.&lt;br /&gt;
&lt;br /&gt;
==Other 802 Standards and Amendments==&lt;br /&gt;
[http://en.wikipedia.org/wiki/IEEE_802 See: IEEE 802 Wiki]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
# Comer, D. E. (2006). Wi-Fi. ''Internetworking with TCP/IP'' (Fifth ed., pp. 419-441). Upper Saddle River, NJ: Pearson Prentice Hall.&lt;br /&gt;
# &amp;quot;[http://www.wilcorpinc.com/wifi_history.htm Wi-Fi History]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# &amp;quot;[http://networkbits.net/wireless-printing/80211-g-pros-cons-of-a-wireless-network-in-a-business-environment/ Pros and Cons...]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# Davis, Joshua (Dec 2008). Collapse. ''WIRED Magazine'' (pp. 200-205,224, 231)&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks Denial of Service Attacks]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Security_for_Small_Home_Networks Security for Small Home Networks]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Peer_To_Peer_Network_Security Peer To Peer Network Security]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Man_in_the_Middle_Attack Man in the Middle Attacks]&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Hamilr3|Hamilr3]] 00:51, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Wi-Fi</id>
		<title>Wi-Fi</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Wi-Fi"/>
				<updated>2009-04-13T00:07:16Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;/* References */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Wifilogo.jpg|thumb|Wi-Fi logo]]&lt;br /&gt;
''Wi-Fi is a consortium that verifies 802.11b wireless network products interoperate, and a marketing term vendors use to sell their products.''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Wi-Fi is a subsection of the IEEE 802, a subcategory in the link layer of the TCP/IP [[The Five-Layer TCP/IP Model: Description/Attacks/Defense|Internet Protocol Suite]]. The Wi-Fi alliance is a trade group that owns the 'Wi-Fi' trademark, a symbol that certifies interoperability between wireless devices. Not every Internet product is Wi-Fi certified however, and there exists many devices that are able to interoperate wirelessly without the Wi-Fi logo. Some products have chosen to omit having Wi-Fi certification to avoid paying certification costs.&lt;br /&gt;
&lt;br /&gt;
The use of Wi-Fi has boomed in recent years and is supported by a multitude of different devices. Laptops. game consoles, smartphones, printers and other peripherals usually have Wi-Fi certification. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
[[Image:Metro Wireless Node.jpg|thumb|A municipal wireless antenna. Such devices are integral in creating a mesh network of access points. ]]&lt;br /&gt;
Wi-Fi was invented by Vic Hayes (dubbed 'the father of Wi-Fi') at the NCR Corporation/AT &amp;amp; T (later Lucent &amp;amp; Agere Systems), in 1991. Hayes had been designing IEEE standards for 802.11b, 802.11a and 802.11g and subsequent technology, initially meant for cashier systems. NCR initially released the technology under the name of 'WaveLAN' which operated in a range of 1Mbps-2 Mbps. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; The Wi-Fi alliance was created soon after the technology. &lt;br /&gt;
&lt;br /&gt;
The alliance is a consortium of separate, independent companies that promotes and develops IEEE 802.11 standards. The alliance also tests products to establish interoperability and certifies products that pass. The 'Wi-Fi' logo is allowed to be used by manufacturers who subscribe to the alliance and whose products pass testing. There exists sever unofficial &amp;quot;Wi-Fi&amp;quot; products that may work, but lack true certification.&lt;br /&gt;
&lt;br /&gt;
The term &amp;quot;Wi-Fi&amp;quot; was coined by Interbrand Corporation in August 1999 when hired by the Alliance to change the name from 'IEEE 802.11b Direct Sequence.' Interbrand also created the official 'Wi-Fi' logo. It is often assumed that Wi-Fi stands for &amp;quot;Wireless Fidelity&amp;quot;, however officially Wi-Fi is an abstract term and the Wi-Fi alliance is trying to downplay any association to &amp;quot;Hi-Fi&amp;quot; (High Fidelity).&lt;br /&gt;
&lt;br /&gt;
Many cities globally, have announced plans for a city-wide Wi-Fi network. Many such project have since been cancelled due to unforseen difficulties however, a few (such as Sunnyvale, California) were successful. The city-wide networks were created by meshing several wireless antenna together and effectively creating a very large hotspot.&lt;br /&gt;
&lt;br /&gt;
==Uses==&lt;br /&gt;
There are typically two ses for Wi-Fi: it can be used as an access technology whereby a single base station (access point) accomodates multiple clients, or it can be used in a point-to-point configuration, connecting exactly 2 access points. The latter is typically reserved for standard 802.16 (Wi-Max) and used by network providers or corporations to connect two sites. &lt;br /&gt;
&lt;br /&gt;
A Wi-Fi enabled device can connect to the internet if the access point it reaches is part of a network containing the internet. A wi-Fi enabled device can essentially use the internet for any networking purpose. &lt;br /&gt;
&lt;br /&gt;
There exists many wireless 'hotspots' which integrate one or more access points and the hotspots can span a range of a few meters to several kilometers( Sunnyvale, California for example, offers free city-wide Wi-Fi). Many businesses offer wireless hotspots as either free or pay services in order to attract customers. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi devices can operate in different modes such as peer-to-peer mode, which allows a direct connection between two people. In ad-hoc mode Wi-Fi devices are able to make client-to-client connections without a router. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi can enable wireless voice application (VoIP). The widespread growth of Wi-Fi now allows access to the internet outside 'traditional' setups (such as the bathroom). Wi-Fi installations can ultimately provide: a sequre computer networking gateway, firewall, DHCP server, intrusion detection system and many other services.&lt;br /&gt;
&lt;br /&gt;
==Advantages and Challenges==&lt;br /&gt;
Wi-Fi uses an unlicensed radio spectrum (unlike packet radio systems) and does not require regulatory approval for individual developers, which makes Wi-Fi products widely available. Different brands are able to make products that are interoperable at a basic service level because of the technological foundations in Wi-Fi. Competition amounsts vendors has also considerably lowered prices of Wi-Fi products, and they continue to drop as technology improves. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi  allows local area networks (LANs) to be set up without wires, which simultaneously lowers costs (of creating and exapnding) and allows much freedom in where a network can be accessed. The Wi-Fi certification aheres to a global set of standards as well so Wi-Fi products are compatible in any region. &lt;br /&gt;
&lt;br /&gt;
===Range===&lt;br /&gt;
[[Image:Point-to-point-wifi-antenna.jpg|thumb|A point-to-point parabolic Wi-Fi antenna. Such devices can dramatically increase the range of a Wi-Fi network (in a single direction). The devices may be costly to buy and run however.]]&lt;br /&gt;
&lt;br /&gt;
Typically a Wi-Fi router in a home setup with a 802.11b stock antenna has a range of about 32m indoors (due to barriers like walls) and about 95m with no obstructions, outdoors. The frequency block a router uses also affects the range: 2.4GHz has a greater range than 5 GHz. Wi-Fi has greater range compared to bluetooth and can provide huge outdoor range if a network incorporates a directional antenna.&lt;br /&gt;
&lt;br /&gt;
Wi-Fi began with IEEE standards for short range wireless broadband technology, and appointed the standard numbers: 802.11b(Wi-Fi), 802.11a and 802.11g (can interoperate with 802.11b). Typically Wi-Fi operates between 2.5 to 4Mbps, but can go as high as 11 Mbps.&lt;br /&gt;
&lt;br /&gt;
===Mobility===&lt;br /&gt;
Wi-Fi technology allows LANs to be deployed without cabling, potentially reducing the costs of network deployment and expansion. Spaces where cables cannont be run, such as outdoor areas or historical buildings can host wireless LANs. Wi-Fi technology increases the ease of setting up a network as well. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi networks support roaming, in which a mobile client station (like a laptop or smartphone) can move from one access point to another as the user moves. It is because Wi-Fi certified devices are able to interoperate that this is possible without complications as well.&lt;br /&gt;
&lt;br /&gt;
==Security==&lt;br /&gt;
The greatest security issue with Wi-Fi (and all other wireless networks) is the easy of connectivity compared to traditional wired networks like Ethernet. Wireless communication (bluetooth especially) is designed to be simple and easily connected to. To make an attack on a wired network, the attacker must physically connect to the internal network or break through an external firewall. External access however is usually disallowed by business networks in order to protect sensitive data. It is because firewall encryption could be broken that most business networks disallow external access. Getting wireless reception is considered an attack to most business networks.&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The nature most wireless networks is to allow external access in order to maintain an degree of usability. If attackers gain access to a wireless network they can harm the user in a variety of ways from monitoring others' activity to fabricating a DNS spoofing attack. &lt;br /&gt;
&lt;br /&gt;
===Preventative Measures===&lt;br /&gt;
[[Image:Wep.gif|thumb|The WEP encryption standard. The vunerabilities are shown by malicious software and a single key for all users on the network.]]&lt;br /&gt;
WEP (Wired Equivalent Privacy) keys uses a deprecated algorithm to secure Wireless networks. First introduced in 1997, WEP keys were intended to make wireless networks have comparable security to that of wired networks. A WEP key could be interpreted as a 26 digit password allowing access to a home network. There are several security flaws in the WEP keys currently being used and there exists readily available software (such as AirSnort or AirCrack) that can obtain a WEP key in minutes. WEP keys are now considered completely broken. The security flaws of WEP keys was first counteracted in 2002 with 'Wi-Fi Protected Access' (WPA) but the attack vector are now known. Now (as of 2004), full IEEE 802.11i (WPA2) encryption standards have been release and are still considered secure as of 2009. &lt;br /&gt;
&lt;br /&gt;
Another security measure in effect involves suppressing the Access Points' SSID broadcast to only allow a predefined set of MAC addresses the ability to join the network. This security measure has since proven ineffective, since if an allowed MAC address is known (or found out) by an attacker then they could potentially change their own MAC address to spoof as an allowed machine.  &lt;br /&gt;
&lt;br /&gt;
===DNS Spoofing and Kaminsky Attack===&lt;br /&gt;
In June 2005 Dan Kaminsky used a DNS hack in order to get free Wi-Fi at an area starbucks. He later realized the huge security issues this presented and brought attention to the Wi-Fi and DNS security flaws. Starbucks offers a Wi-Fi service but it costs a premium, the Kaminsky hack fools the domain name system and thorough Wi-Fi, exposed a glaring Internet security flaw. &lt;br /&gt;
&lt;br /&gt;
The following is an excerpt from WIRED magazine:&lt;br /&gt;
&lt;br /&gt;
'''How DNS works'''&lt;br /&gt;
&lt;br /&gt;
1. Type anybank.com into your Web brower and the query packet is sent to your internet service provider (ISP)&lt;br /&gt;
&lt;br /&gt;
2. If anybank.com's location isn't cached, your ISP's name server repeatedly searches the domain name system for it. Each search is assigned a 16-bit transaction ID for security and tracking. Responses to the searches must carry the correct transaction ID to be accepted by the name server. The packet would travel through the root name server, the .com name server then anybank.com name server.&lt;br /&gt;
&lt;br /&gt;
3. Eventually, anybank.com sends an answer to your ISP; Our home page is at 60.190.216.103. This authenticated address is cached.&lt;br /&gt;
&lt;br /&gt;
4. Your browser connects you.&lt;br /&gt;
&lt;br /&gt;
'''How the Kaminsky DNS hack works'''&lt;br /&gt;
&lt;br /&gt;
1. The attacker tries to hijack anybank.com by sending thousands of requests for fake Web pages. Malicious query packets are sent to your ISP.&lt;br /&gt;
&lt;br /&gt;
2. The ISP gives each query a transaction ID (unknown to the attacker) and attempts to locates the pages.&lt;br /&gt;
&lt;br /&gt;
3. At the same time, the attacker sends hundreds of responses for each malicious request. Every answer includes a randomly generated ID number.&lt;br /&gt;
&lt;br /&gt;
4. Eventually one of the answers carries an ID that matches, tricking the ISP into accepting and caching the information. The now-legitimized answer contains false details about anybank.com, such as the location of its servers. Legitimate answers from anybank.com(&amp;quot;No such page exists&amp;quot;) will now be rejected.&lt;br /&gt;
&lt;br /&gt;
5. Users looking for anybank.com get sent to the fake location already in the ISP's cache.&lt;br /&gt;
&lt;br /&gt;
6. Anybank.com customers are now using a look-alike site built by the hacker.&lt;br /&gt;
&lt;br /&gt;
'''Patch fixing Kaminsky attack'''&lt;br /&gt;
&lt;br /&gt;
Most computers have 63, 536 ports, but DNS commonly uses only port 53 for all queries and responses. The patch works by randomly changing the port number for each DNS request. Now any response to a request must contain an accurate transaction ID number and return to the same port. The change increases the odds of beating the system from one in 65, 536 to one in 4 billion.&amp;lt;sup&amp;gt;[numb]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Piggybacking===&lt;br /&gt;
Piggybacking refers to accessing a wireless internet connection by bringing a wireless device in range of another connection and using the service without the owners knowledge or permission. Piggybacking is completely outlawed in some jurisdictions, but allowed in others. It is not considered piggybacking if a bussiness offers a Wi-Fi hotspot for free or as a pay service. &lt;br /&gt;
&lt;br /&gt;
Piggybacking ofter goes unnoticed since most people only use a fraction of their upstream bandwidth. Piggybacking may also be carried out unintentionally, as most access points are configured without encryption (WPA2) and operating systems can automatically connect to wireless networks. The danger in piggybacking exists in users logging into an insecure network where illicit activity is conducted (danger for network owner) or sensitive information is broadcast (danger for user).&lt;br /&gt;
&lt;br /&gt;
===The Wi-Fi Scam, Home Security Scam and Bluetooth Scam===&lt;br /&gt;
'The Real Hustle' a UK television show is premised as an educational program demonstrating how people are getting ripped-off by confidence men around the world. The hustlers demonstrate how easy it is to gain access to a Wireless network through various scams. &lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=jqic_aY3TqQ&amp;amp;feature=related Wi-Fi Scam], the hustlers hijack a wireless network then rename their own wireless network and route people to a dummy site that looks completely legitimate. &lt;br /&gt;
&lt;br /&gt;
In the Home Security Scam, the hustlers walk through a residential neighborhood and enter home wireless networks by either hacking WEP keys or finding an unlocked network. The hustlers then monitor others online activity.&lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=gvDp-DBh4Gc&amp;amp;feature=related Bluetooth Scam], the hustlers scan a shopping mall for bluetooth signals from mobile phones. Once a signal is found and a connection is made, the hustlers call their premium rate line and rack up a bill for the cell phone owner.&lt;br /&gt;
&lt;br /&gt;
There exists dozens of tutorials on the Internet on how to use Wi-Fi for illicit purposes, demonstrating just how vunerable a wireless network is.&lt;br /&gt;
&lt;br /&gt;
==Other 802 Standards and Amendments==&lt;br /&gt;
[http://en.wikipedia.org/wiki/IEEE_802 See: IEEE 802 Wiki]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
# Comer, D. E. (2006). Wi-Fi. ''Internetworking with TCP/IP'' (Fifth ed., pp. 419-441). Upper Saddle River, NJ: Pearson Prentice Hall.&lt;br /&gt;
# &amp;quot;[http://www.wilcorpinc.com/wifi_history.htm Wi-Fi History]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# &amp;quot;[http://networkbits.net/wireless-printing/80211-g-pros-cons-of-a-wireless-network-in-a-business-environment/ Pros and Cons...]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# Davis, Joshua (Dec 2008). Collapse. ''WIRED Magazine'' (pp. 200-205,224, 231)&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks Denial of Service Attacks]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Security_for_Small_Home_Networks Security for Small Home Networks]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Peer_To_Peer_Network_Security Peer To Peer Network Security]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Man_in_the_Middle_Attack Man in the Middle Attacks]&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Hamilr3|Hamilr3]] 00:51, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Wi-Fi</id>
		<title>Wi-Fi</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Wi-Fi"/>
				<updated>2009-04-13T00:02:45Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;/* DNS Spoofing and Kaminsky Attack */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Wifilogo.jpg|thumb|Wi-Fi logo]]&lt;br /&gt;
''Wi-Fi is a consortium that verifies 802.11b wireless network products interoperate, and a marketing term vendors use to sell their products.''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Wi-Fi is a subsection of the IEEE 802, a subcategory in the link layer of the TCP/IP [[The Five-Layer TCP/IP Model: Description/Attacks/Defense|Internet Protocol Suite]]. The Wi-Fi alliance is a trade group that owns the 'Wi-Fi' trademark, a symbol that certifies interoperability between wireless devices. Not every Internet product is Wi-Fi certified however, and there exists many devices that are able to interoperate wirelessly without the Wi-Fi logo. Some products have chosen to omit having Wi-Fi certification to avoid paying certification costs.&lt;br /&gt;
&lt;br /&gt;
The use of Wi-Fi has boomed in recent years and is supported by a multitude of different devices. Laptops. game consoles, smartphones, printers and other peripherals usually have Wi-Fi certification. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
[[Image:Metro Wireless Node.jpg|thumb|A municipal wireless antenna. Such devices are integral in creating a mesh network of access points. ]]&lt;br /&gt;
Wi-Fi was invented by Vic Hayes (dubbed 'the father of Wi-Fi') at the NCR Corporation/AT &amp;amp; T (later Lucent &amp;amp; Agere Systems), in 1991. Hayes had been designing IEEE standards for 802.11b, 802.11a and 802.11g and subsequent technology, initially meant for cashier systems. NCR initially released the technology under the name of 'WaveLAN' which operated in a range of 1Mbps-2 Mbps. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; The Wi-Fi alliance was created soon after the technology. &lt;br /&gt;
&lt;br /&gt;
The alliance is a consortium of separate, independent companies that promotes and develops IEEE 802.11 standards. The alliance also tests products to establish interoperability and certifies products that pass. The 'Wi-Fi' logo is allowed to be used by manufacturers who subscribe to the alliance and whose products pass testing. There exists sever unofficial &amp;quot;Wi-Fi&amp;quot; products that may work, but lack true certification.&lt;br /&gt;
&lt;br /&gt;
The term &amp;quot;Wi-Fi&amp;quot; was coined by Interbrand Corporation in August 1999 when hired by the Alliance to change the name from 'IEEE 802.11b Direct Sequence.' Interbrand also created the official 'Wi-Fi' logo. It is often assumed that Wi-Fi stands for &amp;quot;Wireless Fidelity&amp;quot;, however officially Wi-Fi is an abstract term and the Wi-Fi alliance is trying to downplay any association to &amp;quot;Hi-Fi&amp;quot; (High Fidelity).&lt;br /&gt;
&lt;br /&gt;
Many cities globally, have announced plans for a city-wide Wi-Fi network. Many such project have since been cancelled due to unforseen difficulties however, a few (such as Sunnyvale, California) were successful. The city-wide networks were created by meshing several wireless antenna together and effectively creating a very large hotspot.&lt;br /&gt;
&lt;br /&gt;
==Uses==&lt;br /&gt;
There are typically two ses for Wi-Fi: it can be used as an access technology whereby a single base station (access point) accomodates multiple clients, or it can be used in a point-to-point configuration, connecting exactly 2 access points. The latter is typically reserved for standard 802.16 (Wi-Max) and used by network providers or corporations to connect two sites. &lt;br /&gt;
&lt;br /&gt;
A Wi-Fi enabled device can connect to the internet if the access point it reaches is part of a network containing the internet. A wi-Fi enabled device can essentially use the internet for any networking purpose. &lt;br /&gt;
&lt;br /&gt;
There exists many wireless 'hotspots' which integrate one or more access points and the hotspots can span a range of a few meters to several kilometers( Sunnyvale, California for example, offers free city-wide Wi-Fi). Many businesses offer wireless hotspots as either free or pay services in order to attract customers. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi devices can operate in different modes such as peer-to-peer mode, which allows a direct connection between two people. In ad-hoc mode Wi-Fi devices are able to make client-to-client connections without a router. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi can enable wireless voice application (VoIP). The widespread growth of Wi-Fi now allows access to the internet outside 'traditional' setups (such as the bathroom). Wi-Fi installations can ultimately provide: a sequre computer networking gateway, firewall, DHCP server, intrusion detection system and many other services.&lt;br /&gt;
&lt;br /&gt;
==Advantages and Challenges==&lt;br /&gt;
Wi-Fi uses an unlicensed radio spectrum (unlike packet radio systems) and does not require regulatory approval for individual developers, which makes Wi-Fi products widely available. Different brands are able to make products that are interoperable at a basic service level because of the technological foundations in Wi-Fi. Competition amounsts vendors has also considerably lowered prices of Wi-Fi products, and they continue to drop as technology improves. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi  allows local area networks (LANs) to be set up without wires, which simultaneously lowers costs (of creating and exapnding) and allows much freedom in where a network can be accessed. The Wi-Fi certification aheres to a global set of standards as well so Wi-Fi products are compatible in any region. &lt;br /&gt;
&lt;br /&gt;
===Range===&lt;br /&gt;
[[Image:Point-to-point-wifi-antenna.jpg|thumb|A point-to-point parabolic Wi-Fi antenna. Such devices can dramatically increase the range of a Wi-Fi network (in a single direction). The devices may be costly to buy and run however.]]&lt;br /&gt;
&lt;br /&gt;
Typically a Wi-Fi router in a home setup with a 802.11b stock antenna has a range of about 32m indoors (due to barriers like walls) and about 95m with no obstructions, outdoors. The frequency block a router uses also affects the range: 2.4GHz has a greater range than 5 GHz. Wi-Fi has greater range compared to bluetooth and can provide huge outdoor range if a network incorporates a directional antenna.&lt;br /&gt;
&lt;br /&gt;
Wi-Fi began with IEEE standards for short range wireless broadband technology, and appointed the standard numbers: 802.11b(Wi-Fi), 802.11a and 802.11g (can interoperate with 802.11b). Typically Wi-Fi operates between 2.5 to 4Mbps, but can go as high as 11 Mbps.&lt;br /&gt;
&lt;br /&gt;
===Mobility===&lt;br /&gt;
Wi-Fi technology allows LANs to be deployed without cabling, potentially reducing the costs of network deployment and expansion. Spaces where cables cannont be run, such as outdoor areas or historical buildings can host wireless LANs. Wi-Fi technology increases the ease of setting up a network as well. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi networks support roaming, in which a mobile client station (like a laptop or smartphone) can move from one access point to another as the user moves. It is because Wi-Fi certified devices are able to interoperate that this is possible without complications as well.&lt;br /&gt;
&lt;br /&gt;
==Security==&lt;br /&gt;
The greatest security issue with Wi-Fi (and all other wireless networks) is the easy of connectivity compared to traditional wired networks like Ethernet. Wireless communication (bluetooth especially) is designed to be simple and easily connected to. To make an attack on a wired network, the attacker must physically connect to the internal network or break through an external firewall. External access however is usually disallowed by business networks in order to protect sensitive data. It is because firewall encryption could be broken that most business networks disallow external access. Getting wireless reception is considered an attack to most business networks.&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The nature most wireless networks is to allow external access in order to maintain an degree of usability. If attackers gain access to a wireless network they can harm the user in a variety of ways from monitoring others' activity to fabricating a DNS spoofing attack. &lt;br /&gt;
&lt;br /&gt;
===Preventative Measures===&lt;br /&gt;
[[Image:Wep.gif|thumb|The WEP encryption standard. The vunerabilities are shown by malicious software and a single key for all users on the network.]]&lt;br /&gt;
WEP (Wired Equivalent Privacy) keys uses a deprecated algorithm to secure Wireless networks. First introduced in 1997, WEP keys were intended to make wireless networks have comparable security to that of wired networks. A WEP key could be interpreted as a 26 digit password allowing access to a home network. There are several security flaws in the WEP keys currently being used and there exists readily available software (such as AirSnort or AirCrack) that can obtain a WEP key in minutes. WEP keys are now considered completely broken. The security flaws of WEP keys was first counteracted in 2002 with 'Wi-Fi Protected Access' (WPA) but the attack vector are now known. Now (as of 2004), full IEEE 802.11i (WPA2) encryption standards have been release and are still considered secure as of 2009. &lt;br /&gt;
&lt;br /&gt;
Another security measure in effect involves suppressing the Access Points' SSID broadcast to only allow a predefined set of MAC addresses the ability to join the network. This security measure has since proven ineffective, since if an allowed MAC address is known (or found out) by an attacker then they could potentially change their own MAC address to spoof as an allowed machine.  &lt;br /&gt;
&lt;br /&gt;
===DNS Spoofing and Kaminsky Attack===&lt;br /&gt;
In June 2005 Dan Kaminsky used a DNS hack in order to get free Wi-Fi at an area starbucks. He later realized the huge security issues this presented and brought attention to the Wi-Fi and DNS security flaws. Starbucks offers a Wi-Fi service but it costs a premium, the Kaminsky hack fools the domain name system and thorough Wi-Fi, exposed a glaring Internet security flaw. &lt;br /&gt;
&lt;br /&gt;
The following is an excerpt from WIRED magazine:&lt;br /&gt;
&lt;br /&gt;
'''How DNS works'''&lt;br /&gt;
&lt;br /&gt;
1. Type anybank.com into your Web brower and the query packet is sent to your internet service provider (ISP)&lt;br /&gt;
&lt;br /&gt;
2. If anybank.com's location isn't cached, your ISP's name server repeatedly searches the domain name system for it. Each search is assigned a 16-bit transaction ID for security and tracking. Responses to the searches must carry the correct transaction ID to be accepted by the name server. The packet would travel through the root name server, the .com name server then anybank.com name server.&lt;br /&gt;
&lt;br /&gt;
3. Eventually, anybank.com sends an answer to your ISP; Our home page is at 60.190.216.103. This authenticated address is cached.&lt;br /&gt;
&lt;br /&gt;
4. Your browser connects you.&lt;br /&gt;
&lt;br /&gt;
'''How the Kaminsky DNS hack works'''&lt;br /&gt;
&lt;br /&gt;
1. The attacker tries to hijack anybank.com by sending thousands of requests for fake Web pages. Malicious query packets are sent to your ISP.&lt;br /&gt;
&lt;br /&gt;
2. The ISP gives each query a transaction ID (unknown to the attacker) and attempts to locates the pages.&lt;br /&gt;
&lt;br /&gt;
3. At the same time, the attacker sends hundreds of responses for each malicious request. Every answer includes a randomly generated ID number.&lt;br /&gt;
&lt;br /&gt;
4. Eventually one of the answers carries an ID that matches, tricking the ISP into accepting and caching the information. The now-legitimized answer contains false details about anybank.com, such as the location of its servers. Legitimate answers from anybank.com(&amp;quot;No such page exists&amp;quot;) will now be rejected.&lt;br /&gt;
&lt;br /&gt;
5. Users looking for anybank.com get sent to the fake location already in the ISP's cache.&lt;br /&gt;
&lt;br /&gt;
6. Anybank.com customers are now using a look-alike site built by the hacker.&lt;br /&gt;
&lt;br /&gt;
'''Patch fixing Kaminsky attack'''&lt;br /&gt;
&lt;br /&gt;
Most computers have 63, 536 ports, but DNS commonly uses only port 53 for all queries and responses. The patch works by randomly changing the port number for each DNS request. Now any response to a request must contain an accurate transaction ID number and return to the same port. The change increases the odds of beating the system from one in 65, 536 to one in 4 billion.&amp;lt;sup&amp;gt;[numb]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Piggybacking===&lt;br /&gt;
Piggybacking refers to accessing a wireless internet connection by bringing a wireless device in range of another connection and using the service without the owners knowledge or permission. Piggybacking is completely outlawed in some jurisdictions, but allowed in others. It is not considered piggybacking if a bussiness offers a Wi-Fi hotspot for free or as a pay service. &lt;br /&gt;
&lt;br /&gt;
Piggybacking ofter goes unnoticed since most people only use a fraction of their upstream bandwidth. Piggybacking may also be carried out unintentionally, as most access points are configured without encryption (WPA2) and operating systems can automatically connect to wireless networks. The danger in piggybacking exists in users logging into an insecure network where illicit activity is conducted (danger for network owner) or sensitive information is broadcast (danger for user).&lt;br /&gt;
&lt;br /&gt;
===The Wi-Fi Scam, Home Security Scam and Bluetooth Scam===&lt;br /&gt;
'The Real Hustle' a UK television show is premised as an educational program demonstrating how people are getting ripped-off by confidence men around the world. The hustlers demonstrate how easy it is to gain access to a Wireless network through various scams. &lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=jqic_aY3TqQ&amp;amp;feature=related Wi-Fi Scam], the hustlers hijack a wireless network then rename their own wireless network and route people to a dummy site that looks completely legitimate. &lt;br /&gt;
&lt;br /&gt;
In the Home Security Scam, the hustlers walk through a residential neighborhood and enter home wireless networks by either hacking WEP keys or finding an unlocked network. The hustlers then monitor others online activity.&lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=gvDp-DBh4Gc&amp;amp;feature=related Bluetooth Scam], the hustlers scan a shopping mall for bluetooth signals from mobile phones. Once a signal is found and a connection is made, the hustlers call their premium rate line and rack up a bill for the cell phone owner.&lt;br /&gt;
&lt;br /&gt;
There exists dozens of tutorials on the Internet on how to use Wi-Fi for illicit purposes, demonstrating just how vunerable a wireless network is.&lt;br /&gt;
&lt;br /&gt;
==Other 802 Standards and Amendments==&lt;br /&gt;
[http://en.wikipedia.org/wiki/IEEE_802 See: IEEE 802 Wiki]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
# Comer, D. E. (2006). Wi-Fi. ''Internetworking with TCP/IP'' (Fifth ed., pp. 419-441). Upper Saddle River, NJ: Pearson Prentice Hall.&lt;br /&gt;
# &amp;quot;[http://www.wilcorpinc.com/wifi_history.htm Wi-Fi History]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# &amp;quot;[http://networkbits.net/wireless-printing/80211-g-pros-cons-of-a-wireless-network-in-a-business-environment/ Pros and Cons...]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks Denial of Service Attacks]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Security_for_Small_Home_Networks Security for Small Home Networks]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Peer_To_Peer_Network_Security Peer To Peer Network Security]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Man_in_the_Middle_Attack Man in the Middle Attacks]&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Hamilr3|Hamilr3]] 00:51, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Wi-Fi</id>
		<title>Wi-Fi</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Wi-Fi"/>
				<updated>2009-04-12T23:55:50Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;/* DNS Spoofing and Kaminsky Attack */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Wifilogo.jpg|thumb|Wi-Fi logo]]&lt;br /&gt;
''Wi-Fi is a consortium that verifies 802.11b wireless network products interoperate, and a marketing term vendors use to sell their products.''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Wi-Fi is a subsection of the IEEE 802, a subcategory in the link layer of the TCP/IP [[The Five-Layer TCP/IP Model: Description/Attacks/Defense|Internet Protocol Suite]]. The Wi-Fi alliance is a trade group that owns the 'Wi-Fi' trademark, a symbol that certifies interoperability between wireless devices. Not every Internet product is Wi-Fi certified however, and there exists many devices that are able to interoperate wirelessly without the Wi-Fi logo. Some products have chosen to omit having Wi-Fi certification to avoid paying certification costs.&lt;br /&gt;
&lt;br /&gt;
The use of Wi-Fi has boomed in recent years and is supported by a multitude of different devices. Laptops. game consoles, smartphones, printers and other peripherals usually have Wi-Fi certification. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
[[Image:Metro Wireless Node.jpg|thumb|A municipal wireless antenna. Such devices are integral in creating a mesh network of access points. ]]&lt;br /&gt;
Wi-Fi was invented by Vic Hayes (dubbed 'the father of Wi-Fi') at the NCR Corporation/AT &amp;amp; T (later Lucent &amp;amp; Agere Systems), in 1991. Hayes had been designing IEEE standards for 802.11b, 802.11a and 802.11g and subsequent technology, initially meant for cashier systems. NCR initially released the technology under the name of 'WaveLAN' which operated in a range of 1Mbps-2 Mbps. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; The Wi-Fi alliance was created soon after the technology. &lt;br /&gt;
&lt;br /&gt;
The alliance is a consortium of separate, independent companies that promotes and develops IEEE 802.11 standards. The alliance also tests products to establish interoperability and certifies products that pass. The 'Wi-Fi' logo is allowed to be used by manufacturers who subscribe to the alliance and whose products pass testing. There exists sever unofficial &amp;quot;Wi-Fi&amp;quot; products that may work, but lack true certification.&lt;br /&gt;
&lt;br /&gt;
The term &amp;quot;Wi-Fi&amp;quot; was coined by Interbrand Corporation in August 1999 when hired by the Alliance to change the name from 'IEEE 802.11b Direct Sequence.' Interbrand also created the official 'Wi-Fi' logo. It is often assumed that Wi-Fi stands for &amp;quot;Wireless Fidelity&amp;quot;, however officially Wi-Fi is an abstract term and the Wi-Fi alliance is trying to downplay any association to &amp;quot;Hi-Fi&amp;quot; (High Fidelity).&lt;br /&gt;
&lt;br /&gt;
Many cities globally, have announced plans for a city-wide Wi-Fi network. Many such project have since been cancelled due to unforseen difficulties however, a few (such as Sunnyvale, California) were successful. The city-wide networks were created by meshing several wireless antenna together and effectively creating a very large hotspot.&lt;br /&gt;
&lt;br /&gt;
==Uses==&lt;br /&gt;
There are typically two ses for Wi-Fi: it can be used as an access technology whereby a single base station (access point) accomodates multiple clients, or it can be used in a point-to-point configuration, connecting exactly 2 access points. The latter is typically reserved for standard 802.16 (Wi-Max) and used by network providers or corporations to connect two sites. &lt;br /&gt;
&lt;br /&gt;
A Wi-Fi enabled device can connect to the internet if the access point it reaches is part of a network containing the internet. A wi-Fi enabled device can essentially use the internet for any networking purpose. &lt;br /&gt;
&lt;br /&gt;
There exists many wireless 'hotspots' which integrate one or more access points and the hotspots can span a range of a few meters to several kilometers( Sunnyvale, California for example, offers free city-wide Wi-Fi). Many businesses offer wireless hotspots as either free or pay services in order to attract customers. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi devices can operate in different modes such as peer-to-peer mode, which allows a direct connection between two people. In ad-hoc mode Wi-Fi devices are able to make client-to-client connections without a router. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi can enable wireless voice application (VoIP). The widespread growth of Wi-Fi now allows access to the internet outside 'traditional' setups (such as the bathroom). Wi-Fi installations can ultimately provide: a sequre computer networking gateway, firewall, DHCP server, intrusion detection system and many other services.&lt;br /&gt;
&lt;br /&gt;
==Advantages and Challenges==&lt;br /&gt;
Wi-Fi uses an unlicensed radio spectrum (unlike packet radio systems) and does not require regulatory approval for individual developers, which makes Wi-Fi products widely available. Different brands are able to make products that are interoperable at a basic service level because of the technological foundations in Wi-Fi. Competition amounsts vendors has also considerably lowered prices of Wi-Fi products, and they continue to drop as technology improves. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi  allows local area networks (LANs) to be set up without wires, which simultaneously lowers costs (of creating and exapnding) and allows much freedom in where a network can be accessed. The Wi-Fi certification aheres to a global set of standards as well so Wi-Fi products are compatible in any region. &lt;br /&gt;
&lt;br /&gt;
===Range===&lt;br /&gt;
[[Image:Point-to-point-wifi-antenna.jpg|thumb|A point-to-point parabolic Wi-Fi antenna. Such devices can dramatically increase the range of a Wi-Fi network (in a single direction). The devices may be costly to buy and run however.]]&lt;br /&gt;
&lt;br /&gt;
Typically a Wi-Fi router in a home setup with a 802.11b stock antenna has a range of about 32m indoors (due to barriers like walls) and about 95m with no obstructions, outdoors. The frequency block a router uses also affects the range: 2.4GHz has a greater range than 5 GHz. Wi-Fi has greater range compared to bluetooth and can provide huge outdoor range if a network incorporates a directional antenna.&lt;br /&gt;
&lt;br /&gt;
Wi-Fi began with IEEE standards for short range wireless broadband technology, and appointed the standard numbers: 802.11b(Wi-Fi), 802.11a and 802.11g (can interoperate with 802.11b). Typically Wi-Fi operates between 2.5 to 4Mbps, but can go as high as 11 Mbps.&lt;br /&gt;
&lt;br /&gt;
===Mobility===&lt;br /&gt;
Wi-Fi technology allows LANs to be deployed without cabling, potentially reducing the costs of network deployment and expansion. Spaces where cables cannont be run, such as outdoor areas or historical buildings can host wireless LANs. Wi-Fi technology increases the ease of setting up a network as well. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi networks support roaming, in which a mobile client station (like a laptop or smartphone) can move from one access point to another as the user moves. It is because Wi-Fi certified devices are able to interoperate that this is possible without complications as well.&lt;br /&gt;
&lt;br /&gt;
==Security==&lt;br /&gt;
The greatest security issue with Wi-Fi (and all other wireless networks) is the easy of connectivity compared to traditional wired networks like Ethernet. Wireless communication (bluetooth especially) is designed to be simple and easily connected to. To make an attack on a wired network, the attacker must physically connect to the internal network or break through an external firewall. External access however is usually disallowed by business networks in order to protect sensitive data. It is because firewall encryption could be broken that most business networks disallow external access. Getting wireless reception is considered an attack to most business networks.&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The nature most wireless networks is to allow external access in order to maintain an degree of usability. If attackers gain access to a wireless network they can harm the user in a variety of ways from monitoring others' activity to fabricating a DNS spoofing attack. &lt;br /&gt;
&lt;br /&gt;
===Preventative Measures===&lt;br /&gt;
[[Image:Wep.gif|thumb|The WEP encryption standard. The vunerabilities are shown by malicious software and a single key for all users on the network.]]&lt;br /&gt;
WEP (Wired Equivalent Privacy) keys uses a deprecated algorithm to secure Wireless networks. First introduced in 1997, WEP keys were intended to make wireless networks have comparable security to that of wired networks. A WEP key could be interpreted as a 26 digit password allowing access to a home network. There are several security flaws in the WEP keys currently being used and there exists readily available software (such as AirSnort or AirCrack) that can obtain a WEP key in minutes. WEP keys are now considered completely broken. The security flaws of WEP keys was first counteracted in 2002 with 'Wi-Fi Protected Access' (WPA) but the attack vector are now known. Now (as of 2004), full IEEE 802.11i (WPA2) encryption standards have been release and are still considered secure as of 2009. &lt;br /&gt;
&lt;br /&gt;
Another security measure in effect involves suppressing the Access Points' SSID broadcast to only allow a predefined set of MAC addresses the ability to join the network. This security measure has since proven ineffective, since if an allowed MAC address is known (or found out) by an attacker then they could potentially change their own MAC address to spoof as an allowed machine.  &lt;br /&gt;
&lt;br /&gt;
===DNS Spoofing and Kaminsky Attack===&lt;br /&gt;
In June 2005 Dan Kaminsky used a DNS hack in order to get free Wi-Fi at an area starbucks. He later realized the huge security issues this presented and brought attention to the Wi-Fi and DNS security flaws. Starbucks offers a Wi-Fi service but it costs a premium, the Kaminsky hack fools the domain name system and thorough Wi-Fi, exposed a glaring Internet security flaw. &lt;br /&gt;
&lt;br /&gt;
The following is an excerpt from WIRED magazine:&lt;br /&gt;
&lt;br /&gt;
'''How DNS works'''&lt;br /&gt;
&lt;br /&gt;
1. Type anybank.com into your Web brower and the query packet is sent to your internet service provider (ISP)&lt;br /&gt;
&lt;br /&gt;
2. If anybank.com's location isn't cached, your ISP's name server repeatedly searches the domain name system for it. Each search is assigned a 16-bit transaction ID for security and tracking. Responses to the searches must carry the correct transaction ID to be accepted by the name server. The packet would travel through the root name server, the .com name server then anybank.com name server.&lt;br /&gt;
&lt;br /&gt;
3. Eventually, anybank.com sends an answer to your ISP; Our home page is at 60.190.216.103. This authenticated address is cached.&lt;br /&gt;
&lt;br /&gt;
4. Your browser connects you.&lt;br /&gt;
&lt;br /&gt;
'''How the Kaminsky DNS hack works'''&lt;br /&gt;
&lt;br /&gt;
1. The attacker tries to hijack anybank.com by sending thousands of requests for fake Web pages. Malicious query packets are sent to your ISP.&lt;br /&gt;
&lt;br /&gt;
2. The ISP gives each query a transaction ID (unknown to the attacker) and attempts to locates the pages.&lt;br /&gt;
&lt;br /&gt;
3. At the same time, the attacker sends hundreds of responses for each malicious request. Every answer includes a randomly generated ID number.&lt;br /&gt;
&lt;br /&gt;
4. Eventually one of the answers carries an ID that matches, tricking the ISP into accepting and caching the information. The now-legitimized answer contains false details about anybank.com, such as the location of its servers. Legitimate answers from anybank.com(&amp;quot;No such page exists&amp;quot;) will now be rejected.&lt;br /&gt;
&lt;br /&gt;
5. Users looking for anybank.com get sent to the fake location already in the ISP's cache.&lt;br /&gt;
&lt;br /&gt;
6. Anybank.com customers are now using a look-alike site built by the hacker.&lt;br /&gt;
&lt;br /&gt;
'''Patch fixing Kaminsky attack'''&lt;br /&gt;
&lt;br /&gt;
Most computers have 63, 536 ports, but DNS commonly uses only port 53 for all queries and responses. The patch works by randomly changing the port number for each DNS request. Now any response to a request must contain an accurate transaction ID number and return to the same port. The change increases the odds of beating the system from one in 65, 536 to one in 4 billion.[sup][numb][/sup]&lt;br /&gt;
&lt;br /&gt;
===Piggybacking===&lt;br /&gt;
Piggybacking refers to accessing a wireless internet connection by bringing a wireless device in range of another connection and using the service without the owners knowledge or permission. Piggybacking is completely outlawed in some jurisdictions, but allowed in others. It is not considered piggybacking if a bussiness offers a Wi-Fi hotspot for free or as a pay service. &lt;br /&gt;
&lt;br /&gt;
Piggybacking ofter goes unnoticed since most people only use a fraction of their upstream bandwidth. Piggybacking may also be carried out unintentionally, as most access points are configured without encryption (WPA2) and operating systems can automatically connect to wireless networks. The danger in piggybacking exists in users logging into an insecure network where illicit activity is conducted (danger for network owner) or sensitive information is broadcast (danger for user).&lt;br /&gt;
&lt;br /&gt;
===The Wi-Fi Scam, Home Security Scam and Bluetooth Scam===&lt;br /&gt;
'The Real Hustle' a UK television show is premised as an educational program demonstrating how people are getting ripped-off by confidence men around the world. The hustlers demonstrate how easy it is to gain access to a Wireless network through various scams. &lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=jqic_aY3TqQ&amp;amp;feature=related Wi-Fi Scam], the hustlers hijack a wireless network then rename their own wireless network and route people to a dummy site that looks completely legitimate. &lt;br /&gt;
&lt;br /&gt;
In the Home Security Scam, the hustlers walk through a residential neighborhood and enter home wireless networks by either hacking WEP keys or finding an unlocked network. The hustlers then monitor others online activity.&lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=gvDp-DBh4Gc&amp;amp;feature=related Bluetooth Scam], the hustlers scan a shopping mall for bluetooth signals from mobile phones. Once a signal is found and a connection is made, the hustlers call their premium rate line and rack up a bill for the cell phone owner.&lt;br /&gt;
&lt;br /&gt;
There exists dozens of tutorials on the Internet on how to use Wi-Fi for illicit purposes, demonstrating just how vunerable a wireless network is.&lt;br /&gt;
&lt;br /&gt;
==Other 802 Standards and Amendments==&lt;br /&gt;
[http://en.wikipedia.org/wiki/IEEE_802 See: IEEE 802 Wiki]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
# Comer, D. E. (2006). Wi-Fi. ''Internetworking with TCP/IP'' (Fifth ed., pp. 419-441). Upper Saddle River, NJ: Pearson Prentice Hall.&lt;br /&gt;
# &amp;quot;[http://www.wilcorpinc.com/wifi_history.htm Wi-Fi History]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# &amp;quot;[http://networkbits.net/wireless-printing/80211-g-pros-cons-of-a-wireless-network-in-a-business-environment/ Pros and Cons...]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks Denial of Service Attacks]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Security_for_Small_Home_Networks Security for Small Home Networks]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Peer_To_Peer_Network_Security Peer To Peer Network Security]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Man_in_the_Middle_Attack Man in the Middle Attacks]&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Hamilr3|Hamilr3]] 00:51, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Wi-Fi</id>
		<title>Wi-Fi</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Wi-Fi"/>
				<updated>2009-04-12T23:55:13Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;/* DNS Spoofing and Kaminsky Attack */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Wifilogo.jpg|thumb|Wi-Fi logo]]&lt;br /&gt;
''Wi-Fi is a consortium that verifies 802.11b wireless network products interoperate, and a marketing term vendors use to sell their products.''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Wi-Fi is a subsection of the IEEE 802, a subcategory in the link layer of the TCP/IP [[The Five-Layer TCP/IP Model: Description/Attacks/Defense|Internet Protocol Suite]]. The Wi-Fi alliance is a trade group that owns the 'Wi-Fi' trademark, a symbol that certifies interoperability between wireless devices. Not every Internet product is Wi-Fi certified however, and there exists many devices that are able to interoperate wirelessly without the Wi-Fi logo. Some products have chosen to omit having Wi-Fi certification to avoid paying certification costs.&lt;br /&gt;
&lt;br /&gt;
The use of Wi-Fi has boomed in recent years and is supported by a multitude of different devices. Laptops. game consoles, smartphones, printers and other peripherals usually have Wi-Fi certification. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
[[Image:Metro Wireless Node.jpg|thumb|A municipal wireless antenna. Such devices are integral in creating a mesh network of access points. ]]&lt;br /&gt;
Wi-Fi was invented by Vic Hayes (dubbed 'the father of Wi-Fi') at the NCR Corporation/AT &amp;amp; T (later Lucent &amp;amp; Agere Systems), in 1991. Hayes had been designing IEEE standards for 802.11b, 802.11a and 802.11g and subsequent technology, initially meant for cashier systems. NCR initially released the technology under the name of 'WaveLAN' which operated in a range of 1Mbps-2 Mbps. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; The Wi-Fi alliance was created soon after the technology. &lt;br /&gt;
&lt;br /&gt;
The alliance is a consortium of separate, independent companies that promotes and develops IEEE 802.11 standards. The alliance also tests products to establish interoperability and certifies products that pass. The 'Wi-Fi' logo is allowed to be used by manufacturers who subscribe to the alliance and whose products pass testing. There exists sever unofficial &amp;quot;Wi-Fi&amp;quot; products that may work, but lack true certification.&lt;br /&gt;
&lt;br /&gt;
The term &amp;quot;Wi-Fi&amp;quot; was coined by Interbrand Corporation in August 1999 when hired by the Alliance to change the name from 'IEEE 802.11b Direct Sequence.' Interbrand also created the official 'Wi-Fi' logo. It is often assumed that Wi-Fi stands for &amp;quot;Wireless Fidelity&amp;quot;, however officially Wi-Fi is an abstract term and the Wi-Fi alliance is trying to downplay any association to &amp;quot;Hi-Fi&amp;quot; (High Fidelity).&lt;br /&gt;
&lt;br /&gt;
Many cities globally, have announced plans for a city-wide Wi-Fi network. Many such project have since been cancelled due to unforseen difficulties however, a few (such as Sunnyvale, California) were successful. The city-wide networks were created by meshing several wireless antenna together and effectively creating a very large hotspot.&lt;br /&gt;
&lt;br /&gt;
==Uses==&lt;br /&gt;
There are typically two ses for Wi-Fi: it can be used as an access technology whereby a single base station (access point) accomodates multiple clients, or it can be used in a point-to-point configuration, connecting exactly 2 access points. The latter is typically reserved for standard 802.16 (Wi-Max) and used by network providers or corporations to connect two sites. &lt;br /&gt;
&lt;br /&gt;
A Wi-Fi enabled device can connect to the internet if the access point it reaches is part of a network containing the internet. A wi-Fi enabled device can essentially use the internet for any networking purpose. &lt;br /&gt;
&lt;br /&gt;
There exists many wireless 'hotspots' which integrate one or more access points and the hotspots can span a range of a few meters to several kilometers( Sunnyvale, California for example, offers free city-wide Wi-Fi). Many businesses offer wireless hotspots as either free or pay services in order to attract customers. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi devices can operate in different modes such as peer-to-peer mode, which allows a direct connection between two people. In ad-hoc mode Wi-Fi devices are able to make client-to-client connections without a router. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi can enable wireless voice application (VoIP). The widespread growth of Wi-Fi now allows access to the internet outside 'traditional' setups (such as the bathroom). Wi-Fi installations can ultimately provide: a sequre computer networking gateway, firewall, DHCP server, intrusion detection system and many other services.&lt;br /&gt;
&lt;br /&gt;
==Advantages and Challenges==&lt;br /&gt;
Wi-Fi uses an unlicensed radio spectrum (unlike packet radio systems) and does not require regulatory approval for individual developers, which makes Wi-Fi products widely available. Different brands are able to make products that are interoperable at a basic service level because of the technological foundations in Wi-Fi. Competition amounsts vendors has also considerably lowered prices of Wi-Fi products, and they continue to drop as technology improves. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi  allows local area networks (LANs) to be set up without wires, which simultaneously lowers costs (of creating and exapnding) and allows much freedom in where a network can be accessed. The Wi-Fi certification aheres to a global set of standards as well so Wi-Fi products are compatible in any region. &lt;br /&gt;
&lt;br /&gt;
===Range===&lt;br /&gt;
[[Image:Point-to-point-wifi-antenna.jpg|thumb|A point-to-point parabolic Wi-Fi antenna. Such devices can dramatically increase the range of a Wi-Fi network (in a single direction). The devices may be costly to buy and run however.]]&lt;br /&gt;
&lt;br /&gt;
Typically a Wi-Fi router in a home setup with a 802.11b stock antenna has a range of about 32m indoors (due to barriers like walls) and about 95m with no obstructions, outdoors. The frequency block a router uses also affects the range: 2.4GHz has a greater range than 5 GHz. Wi-Fi has greater range compared to bluetooth and can provide huge outdoor range if a network incorporates a directional antenna.&lt;br /&gt;
&lt;br /&gt;
Wi-Fi began with IEEE standards for short range wireless broadband technology, and appointed the standard numbers: 802.11b(Wi-Fi), 802.11a and 802.11g (can interoperate with 802.11b). Typically Wi-Fi operates between 2.5 to 4Mbps, but can go as high as 11 Mbps.&lt;br /&gt;
&lt;br /&gt;
===Mobility===&lt;br /&gt;
Wi-Fi technology allows LANs to be deployed without cabling, potentially reducing the costs of network deployment and expansion. Spaces where cables cannont be run, such as outdoor areas or historical buildings can host wireless LANs. Wi-Fi technology increases the ease of setting up a network as well. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi networks support roaming, in which a mobile client station (like a laptop or smartphone) can move from one access point to another as the user moves. It is because Wi-Fi certified devices are able to interoperate that this is possible without complications as well.&lt;br /&gt;
&lt;br /&gt;
==Security==&lt;br /&gt;
The greatest security issue with Wi-Fi (and all other wireless networks) is the easy of connectivity compared to traditional wired networks like Ethernet. Wireless communication (bluetooth especially) is designed to be simple and easily connected to. To make an attack on a wired network, the attacker must physically connect to the internal network or break through an external firewall. External access however is usually disallowed by business networks in order to protect sensitive data. It is because firewall encryption could be broken that most business networks disallow external access. Getting wireless reception is considered an attack to most business networks.&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The nature most wireless networks is to allow external access in order to maintain an degree of usability. If attackers gain access to a wireless network they can harm the user in a variety of ways from monitoring others' activity to fabricating a DNS spoofing attack. &lt;br /&gt;
&lt;br /&gt;
===Preventative Measures===&lt;br /&gt;
[[Image:Wep.gif|thumb|The WEP encryption standard. The vunerabilities are shown by malicious software and a single key for all users on the network.]]&lt;br /&gt;
WEP (Wired Equivalent Privacy) keys uses a deprecated algorithm to secure Wireless networks. First introduced in 1997, WEP keys were intended to make wireless networks have comparable security to that of wired networks. A WEP key could be interpreted as a 26 digit password allowing access to a home network. There are several security flaws in the WEP keys currently being used and there exists readily available software (such as AirSnort or AirCrack) that can obtain a WEP key in minutes. WEP keys are now considered completely broken. The security flaws of WEP keys was first counteracted in 2002 with 'Wi-Fi Protected Access' (WPA) but the attack vector are now known. Now (as of 2004), full IEEE 802.11i (WPA2) encryption standards have been release and are still considered secure as of 2009. &lt;br /&gt;
&lt;br /&gt;
Another security measure in effect involves suppressing the Access Points' SSID broadcast to only allow a predefined set of MAC addresses the ability to join the network. This security measure has since proven ineffective, since if an allowed MAC address is known (or found out) by an attacker then they could potentially change their own MAC address to spoof as an allowed machine.  &lt;br /&gt;
&lt;br /&gt;
===DNS Spoofing and Kaminsky Attack===&lt;br /&gt;
In June 2005 Dan Kaminsky used a DNS hack in order to get free Wi-Fi at an area starbucks. He later realized the huge security issues this presented and brought attention to the Wi-Fi and DNS security flaws. Starbucks offers a Wi-Fi service but it costs a premium, the Kaminsky hack fools the domain name system and thorough Wi-Fi, exposed a glaring Internet security flaw. &lt;br /&gt;
&lt;br /&gt;
The following is an excerpt from WIRED magazine:&lt;br /&gt;
&lt;br /&gt;
'''How DNS works'''&lt;br /&gt;
&lt;br /&gt;
1. Type anybank.com into your Web brower and the query packet is sent to your internet service provider (ISP)&lt;br /&gt;
&lt;br /&gt;
2. If anybank.com's location isn't cached, your ISP's name server repeatedly searches the domain name system for it. Each search is assigned a 16-bit transaction ID for security and tracking. Responses to the searches must carry the correct transaction ID to be accepted by the name server. The packet would travel through the root name server, the .com name server then anybank.com name server.&lt;br /&gt;
&lt;br /&gt;
3. Eventually, anybank.com sends an answer to your ISP; Our home page is at 60.190.216.103. This authenticated address is cached.&lt;br /&gt;
&lt;br /&gt;
4. Your browser connects you.&lt;br /&gt;
&lt;br /&gt;
'''How the Kaminsky DNS hack works'''&lt;br /&gt;
&lt;br /&gt;
1. The attacker tries to hijack anybank.com by sending thousands of requests for fake Web pages. Malicious query packets are sent to your ISP.&lt;br /&gt;
&lt;br /&gt;
2. The ISP gives each query a transaction ID (unknown to the attacker) and attempts to locates the pages.&lt;br /&gt;
&lt;br /&gt;
3. At the same time, the attacker sends hundreds of responses for each malicious request. Every answer includes a randomly generated ID number.&lt;br /&gt;
&lt;br /&gt;
4. Eventually one of the answers carries an ID that matches, tricking the ISP into accepting and caching the information. The now-legitimized answer contains false details about anybank.com, such as the location of its servers. Legitimate answers from anybank.com(&amp;quot;No such page exists&amp;quot;) will now be rejected.&lt;br /&gt;
&lt;br /&gt;
5. Users looking for anybank.com get sent to the fake location already in the ISP's cache.&lt;br /&gt;
&lt;br /&gt;
6. Anybank.com customers are now using a look-alike site built by the hacker.&lt;br /&gt;
&lt;br /&gt;
'''Patch fixing Kaminsky attack'''&lt;br /&gt;
&lt;br /&gt;
Most computers have 63, 536 ports, but DNS commonly uses only port 53 for all queries and responses. The patch works by randomly changing the port number for each DNS request. Now any response to a request must contain an accurate transaction ID number and return to the same port. The change increases the odds of beating the system from one in 65, 536 to one in 4 billion.&lt;br /&gt;
''&lt;br /&gt;
&lt;br /&gt;
===Piggybacking===&lt;br /&gt;
Piggybacking refers to accessing a wireless internet connection by bringing a wireless device in range of another connection and using the service without the owners knowledge or permission. Piggybacking is completely outlawed in some jurisdictions, but allowed in others. It is not considered piggybacking if a bussiness offers a Wi-Fi hotspot for free or as a pay service. &lt;br /&gt;
&lt;br /&gt;
Piggybacking ofter goes unnoticed since most people only use a fraction of their upstream bandwidth. Piggybacking may also be carried out unintentionally, as most access points are configured without encryption (WPA2) and operating systems can automatically connect to wireless networks. The danger in piggybacking exists in users logging into an insecure network where illicit activity is conducted (danger for network owner) or sensitive information is broadcast (danger for user).&lt;br /&gt;
&lt;br /&gt;
===The Wi-Fi Scam, Home Security Scam and Bluetooth Scam===&lt;br /&gt;
'The Real Hustle' a UK television show is premised as an educational program demonstrating how people are getting ripped-off by confidence men around the world. The hustlers demonstrate how easy it is to gain access to a Wireless network through various scams. &lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=jqic_aY3TqQ&amp;amp;feature=related Wi-Fi Scam], the hustlers hijack a wireless network then rename their own wireless network and route people to a dummy site that looks completely legitimate. &lt;br /&gt;
&lt;br /&gt;
In the Home Security Scam, the hustlers walk through a residential neighborhood and enter home wireless networks by either hacking WEP keys or finding an unlocked network. The hustlers then monitor others online activity.&lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=gvDp-DBh4Gc&amp;amp;feature=related Bluetooth Scam], the hustlers scan a shopping mall for bluetooth signals from mobile phones. Once a signal is found and a connection is made, the hustlers call their premium rate line and rack up a bill for the cell phone owner.&lt;br /&gt;
&lt;br /&gt;
There exists dozens of tutorials on the Internet on how to use Wi-Fi for illicit purposes, demonstrating just how vunerable a wireless network is.&lt;br /&gt;
&lt;br /&gt;
==Other 802 Standards and Amendments==&lt;br /&gt;
[http://en.wikipedia.org/wiki/IEEE_802 See: IEEE 802 Wiki]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
# Comer, D. E. (2006). Wi-Fi. ''Internetworking with TCP/IP'' (Fifth ed., pp. 419-441). Upper Saddle River, NJ: Pearson Prentice Hall.&lt;br /&gt;
# &amp;quot;[http://www.wilcorpinc.com/wifi_history.htm Wi-Fi History]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# &amp;quot;[http://networkbits.net/wireless-printing/80211-g-pros-cons-of-a-wireless-network-in-a-business-environment/ Pros and Cons...]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks Denial of Service Attacks]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Security_for_Small_Home_Networks Security for Small Home Networks]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Peer_To_Peer_Network_Security Peer To Peer Network Security]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Man_in_the_Middle_Attack Man in the Middle Attacks]&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Hamilr3|Hamilr3]] 00:51, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Wi-Fi</id>
		<title>Wi-Fi</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Wi-Fi"/>
				<updated>2009-04-12T23:54:54Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;/* DNS Spoofing and Kaminsky Attack */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Wifilogo.jpg|thumb|Wi-Fi logo]]&lt;br /&gt;
''Wi-Fi is a consortium that verifies 802.11b wireless network products interoperate, and a marketing term vendors use to sell their products.''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Wi-Fi is a subsection of the IEEE 802, a subcategory in the link layer of the TCP/IP [[The Five-Layer TCP/IP Model: Description/Attacks/Defense|Internet Protocol Suite]]. The Wi-Fi alliance is a trade group that owns the 'Wi-Fi' trademark, a symbol that certifies interoperability between wireless devices. Not every Internet product is Wi-Fi certified however, and there exists many devices that are able to interoperate wirelessly without the Wi-Fi logo. Some products have chosen to omit having Wi-Fi certification to avoid paying certification costs.&lt;br /&gt;
&lt;br /&gt;
The use of Wi-Fi has boomed in recent years and is supported by a multitude of different devices. Laptops. game consoles, smartphones, printers and other peripherals usually have Wi-Fi certification. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
[[Image:Metro Wireless Node.jpg|thumb|A municipal wireless antenna. Such devices are integral in creating a mesh network of access points. ]]&lt;br /&gt;
Wi-Fi was invented by Vic Hayes (dubbed 'the father of Wi-Fi') at the NCR Corporation/AT &amp;amp; T (later Lucent &amp;amp; Agere Systems), in 1991. Hayes had been designing IEEE standards for 802.11b, 802.11a and 802.11g and subsequent technology, initially meant for cashier systems. NCR initially released the technology under the name of 'WaveLAN' which operated in a range of 1Mbps-2 Mbps. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; The Wi-Fi alliance was created soon after the technology. &lt;br /&gt;
&lt;br /&gt;
The alliance is a consortium of separate, independent companies that promotes and develops IEEE 802.11 standards. The alliance also tests products to establish interoperability and certifies products that pass. The 'Wi-Fi' logo is allowed to be used by manufacturers who subscribe to the alliance and whose products pass testing. There exists sever unofficial &amp;quot;Wi-Fi&amp;quot; products that may work, but lack true certification.&lt;br /&gt;
&lt;br /&gt;
The term &amp;quot;Wi-Fi&amp;quot; was coined by Interbrand Corporation in August 1999 when hired by the Alliance to change the name from 'IEEE 802.11b Direct Sequence.' Interbrand also created the official 'Wi-Fi' logo. It is often assumed that Wi-Fi stands for &amp;quot;Wireless Fidelity&amp;quot;, however officially Wi-Fi is an abstract term and the Wi-Fi alliance is trying to downplay any association to &amp;quot;Hi-Fi&amp;quot; (High Fidelity).&lt;br /&gt;
&lt;br /&gt;
Many cities globally, have announced plans for a city-wide Wi-Fi network. Many such project have since been cancelled due to unforseen difficulties however, a few (such as Sunnyvale, California) were successful. The city-wide networks were created by meshing several wireless antenna together and effectively creating a very large hotspot.&lt;br /&gt;
&lt;br /&gt;
==Uses==&lt;br /&gt;
There are typically two ses for Wi-Fi: it can be used as an access technology whereby a single base station (access point) accomodates multiple clients, or it can be used in a point-to-point configuration, connecting exactly 2 access points. The latter is typically reserved for standard 802.16 (Wi-Max) and used by network providers or corporations to connect two sites. &lt;br /&gt;
&lt;br /&gt;
A Wi-Fi enabled device can connect to the internet if the access point it reaches is part of a network containing the internet. A wi-Fi enabled device can essentially use the internet for any networking purpose. &lt;br /&gt;
&lt;br /&gt;
There exists many wireless 'hotspots' which integrate one or more access points and the hotspots can span a range of a few meters to several kilometers( Sunnyvale, California for example, offers free city-wide Wi-Fi). Many businesses offer wireless hotspots as either free or pay services in order to attract customers. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi devices can operate in different modes such as peer-to-peer mode, which allows a direct connection between two people. In ad-hoc mode Wi-Fi devices are able to make client-to-client connections without a router. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi can enable wireless voice application (VoIP). The widespread growth of Wi-Fi now allows access to the internet outside 'traditional' setups (such as the bathroom). Wi-Fi installations can ultimately provide: a sequre computer networking gateway, firewall, DHCP server, intrusion detection system and many other services.&lt;br /&gt;
&lt;br /&gt;
==Advantages and Challenges==&lt;br /&gt;
Wi-Fi uses an unlicensed radio spectrum (unlike packet radio systems) and does not require regulatory approval for individual developers, which makes Wi-Fi products widely available. Different brands are able to make products that are interoperable at a basic service level because of the technological foundations in Wi-Fi. Competition amounsts vendors has also considerably lowered prices of Wi-Fi products, and they continue to drop as technology improves. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi  allows local area networks (LANs) to be set up without wires, which simultaneously lowers costs (of creating and exapnding) and allows much freedom in where a network can be accessed. The Wi-Fi certification aheres to a global set of standards as well so Wi-Fi products are compatible in any region. &lt;br /&gt;
&lt;br /&gt;
===Range===&lt;br /&gt;
[[Image:Point-to-point-wifi-antenna.jpg|thumb|A point-to-point parabolic Wi-Fi antenna. Such devices can dramatically increase the range of a Wi-Fi network (in a single direction). The devices may be costly to buy and run however.]]&lt;br /&gt;
&lt;br /&gt;
Typically a Wi-Fi router in a home setup with a 802.11b stock antenna has a range of about 32m indoors (due to barriers like walls) and about 95m with no obstructions, outdoors. The frequency block a router uses also affects the range: 2.4GHz has a greater range than 5 GHz. Wi-Fi has greater range compared to bluetooth and can provide huge outdoor range if a network incorporates a directional antenna.&lt;br /&gt;
&lt;br /&gt;
Wi-Fi began with IEEE standards for short range wireless broadband technology, and appointed the standard numbers: 802.11b(Wi-Fi), 802.11a and 802.11g (can interoperate with 802.11b). Typically Wi-Fi operates between 2.5 to 4Mbps, but can go as high as 11 Mbps.&lt;br /&gt;
&lt;br /&gt;
===Mobility===&lt;br /&gt;
Wi-Fi technology allows LANs to be deployed without cabling, potentially reducing the costs of network deployment and expansion. Spaces where cables cannont be run, such as outdoor areas or historical buildings can host wireless LANs. Wi-Fi technology increases the ease of setting up a network as well. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi networks support roaming, in which a mobile client station (like a laptop or smartphone) can move from one access point to another as the user moves. It is because Wi-Fi certified devices are able to interoperate that this is possible without complications as well.&lt;br /&gt;
&lt;br /&gt;
==Security==&lt;br /&gt;
The greatest security issue with Wi-Fi (and all other wireless networks) is the easy of connectivity compared to traditional wired networks like Ethernet. Wireless communication (bluetooth especially) is designed to be simple and easily connected to. To make an attack on a wired network, the attacker must physically connect to the internal network or break through an external firewall. External access however is usually disallowed by business networks in order to protect sensitive data. It is because firewall encryption could be broken that most business networks disallow external access. Getting wireless reception is considered an attack to most business networks.&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The nature most wireless networks is to allow external access in order to maintain an degree of usability. If attackers gain access to a wireless network they can harm the user in a variety of ways from monitoring others' activity to fabricating a DNS spoofing attack. &lt;br /&gt;
&lt;br /&gt;
===Preventative Measures===&lt;br /&gt;
[[Image:Wep.gif|thumb|The WEP encryption standard. The vunerabilities are shown by malicious software and a single key for all users on the network.]]&lt;br /&gt;
WEP (Wired Equivalent Privacy) keys uses a deprecated algorithm to secure Wireless networks. First introduced in 1997, WEP keys were intended to make wireless networks have comparable security to that of wired networks. A WEP key could be interpreted as a 26 digit password allowing access to a home network. There are several security flaws in the WEP keys currently being used and there exists readily available software (such as AirSnort or AirCrack) that can obtain a WEP key in minutes. WEP keys are now considered completely broken. The security flaws of WEP keys was first counteracted in 2002 with 'Wi-Fi Protected Access' (WPA) but the attack vector are now known. Now (as of 2004), full IEEE 802.11i (WPA2) encryption standards have been release and are still considered secure as of 2009. &lt;br /&gt;
&lt;br /&gt;
Another security measure in effect involves suppressing the Access Points' SSID broadcast to only allow a predefined set of MAC addresses the ability to join the network. This security measure has since proven ineffective, since if an allowed MAC address is known (or found out) by an attacker then they could potentially change their own MAC address to spoof as an allowed machine.  &lt;br /&gt;
&lt;br /&gt;
===DNS Spoofing and Kaminsky Attack===&lt;br /&gt;
In June 2005 Dan Kaminsky used a DNS hack in order to get free Wi-Fi at an area starbucks. He later realized the huge security issues this presented and brought attention to the Wi-Fi and DNS security flaws. Starbucks offers a Wi-Fi service but it costs a premium, the Kaminsky hack fools the domain name system and thorough Wi-Fi, exposed a glaring Internet security flaw. &lt;br /&gt;
&lt;br /&gt;
The following is an excerpt from WIRED magazine:&lt;br /&gt;
&lt;br /&gt;
'''''How DNS works'''&lt;br /&gt;
&lt;br /&gt;
1. Type anybank.com into your Web brower and the query packet is sent to your internet service provider (ISP)&lt;br /&gt;
&lt;br /&gt;
2. If anybank.com's location isn't cached, your ISP's name server repeatedly searches the domain name system for it. Each search is assigned a 16-bit transaction ID for security and tracking. Responses to the searches must carry the correct transaction ID to be accepted by the name server. The packet would travel through the root name server, the .com name server then anybank.com name server.&lt;br /&gt;
&lt;br /&gt;
3. Eventually, anybank.com sends an answer to your ISP; Our home page is at 60.190.216.103. This authenticated address is cached.&lt;br /&gt;
&lt;br /&gt;
4. Your browser connects you.&lt;br /&gt;
&lt;br /&gt;
'''How the Kaminsky DNS hack works'''&lt;br /&gt;
&lt;br /&gt;
1. The attacker tries to hijack anybank.com by sending thousands of requests for fake Web pages. Malicious query packets are sent to your ISP.&lt;br /&gt;
&lt;br /&gt;
2. The ISP gives each query a transaction ID (unknown to the attacker) and attempts to locates the pages.&lt;br /&gt;
&lt;br /&gt;
3. At the same time, the attacker sends hundreds of responses for each malicious request. Every answer includes a randomly generated ID number.&lt;br /&gt;
&lt;br /&gt;
4. Eventually one of the answers carries an ID that matches, tricking the ISP into accepting and caching the information. The now-legitimized answer contains false details about anybank.com, such as the location of its servers. Legitimate answers from anybank.com(&amp;quot;No such page exists&amp;quot;) will now be rejected.&lt;br /&gt;
&lt;br /&gt;
5. Users looking for anybank.com get sent to the fake location already in the ISP's cache.&lt;br /&gt;
&lt;br /&gt;
6. Anybank.com customers are now using a look-alike site built by the hacker.&lt;br /&gt;
&lt;br /&gt;
'''Patch fixing Kaminsky attack'''&lt;br /&gt;
&lt;br /&gt;
Most computers have 63, 536 ports, but DNS commonly uses only port 53 for all queries and responses. The patch works by randomly changing the port number for each DNS request. Now any response to a request must contain an accurate transaction ID number and return to the same port. The change increases the odds of beating the system from one in 65, 536 to one in 4 billion.&lt;br /&gt;
''&lt;br /&gt;
&lt;br /&gt;
===Piggybacking===&lt;br /&gt;
Piggybacking refers to accessing a wireless internet connection by bringing a wireless device in range of another connection and using the service without the owners knowledge or permission. Piggybacking is completely outlawed in some jurisdictions, but allowed in others. It is not considered piggybacking if a bussiness offers a Wi-Fi hotspot for free or as a pay service. &lt;br /&gt;
&lt;br /&gt;
Piggybacking ofter goes unnoticed since most people only use a fraction of their upstream bandwidth. Piggybacking may also be carried out unintentionally, as most access points are configured without encryption (WPA2) and operating systems can automatically connect to wireless networks. The danger in piggybacking exists in users logging into an insecure network where illicit activity is conducted (danger for network owner) or sensitive information is broadcast (danger for user).&lt;br /&gt;
&lt;br /&gt;
===The Wi-Fi Scam, Home Security Scam and Bluetooth Scam===&lt;br /&gt;
'The Real Hustle' a UK television show is premised as an educational program demonstrating how people are getting ripped-off by confidence men around the world. The hustlers demonstrate how easy it is to gain access to a Wireless network through various scams. &lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=jqic_aY3TqQ&amp;amp;feature=related Wi-Fi Scam], the hustlers hijack a wireless network then rename their own wireless network and route people to a dummy site that looks completely legitimate. &lt;br /&gt;
&lt;br /&gt;
In the Home Security Scam, the hustlers walk through a residential neighborhood and enter home wireless networks by either hacking WEP keys or finding an unlocked network. The hustlers then monitor others online activity.&lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=gvDp-DBh4Gc&amp;amp;feature=related Bluetooth Scam], the hustlers scan a shopping mall for bluetooth signals from mobile phones. Once a signal is found and a connection is made, the hustlers call their premium rate line and rack up a bill for the cell phone owner.&lt;br /&gt;
&lt;br /&gt;
There exists dozens of tutorials on the Internet on how to use Wi-Fi for illicit purposes, demonstrating just how vunerable a wireless network is.&lt;br /&gt;
&lt;br /&gt;
==Other 802 Standards and Amendments==&lt;br /&gt;
[http://en.wikipedia.org/wiki/IEEE_802 See: IEEE 802 Wiki]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
# Comer, D. E. (2006). Wi-Fi. ''Internetworking with TCP/IP'' (Fifth ed., pp. 419-441). Upper Saddle River, NJ: Pearson Prentice Hall.&lt;br /&gt;
# &amp;quot;[http://www.wilcorpinc.com/wifi_history.htm Wi-Fi History]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# &amp;quot;[http://networkbits.net/wireless-printing/80211-g-pros-cons-of-a-wireless-network-in-a-business-environment/ Pros and Cons...]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks Denial of Service Attacks]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Security_for_Small_Home_Networks Security for Small Home Networks]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Peer_To_Peer_Network_Security Peer To Peer Network Security]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Man_in_the_Middle_Attack Man in the Middle Attacks]&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Hamilr3|Hamilr3]] 00:51, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Wi-Fi</id>
		<title>Wi-Fi</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Wi-Fi"/>
				<updated>2009-04-12T23:54:34Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;/* DNS Spoofing and Kaminsky Attack */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Wifilogo.jpg|thumb|Wi-Fi logo]]&lt;br /&gt;
''Wi-Fi is a consortium that verifies 802.11b wireless network products interoperate, and a marketing term vendors use to sell their products.''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Wi-Fi is a subsection of the IEEE 802, a subcategory in the link layer of the TCP/IP [[The Five-Layer TCP/IP Model: Description/Attacks/Defense|Internet Protocol Suite]]. The Wi-Fi alliance is a trade group that owns the 'Wi-Fi' trademark, a symbol that certifies interoperability between wireless devices. Not every Internet product is Wi-Fi certified however, and there exists many devices that are able to interoperate wirelessly without the Wi-Fi logo. Some products have chosen to omit having Wi-Fi certification to avoid paying certification costs.&lt;br /&gt;
&lt;br /&gt;
The use of Wi-Fi has boomed in recent years and is supported by a multitude of different devices. Laptops. game consoles, smartphones, printers and other peripherals usually have Wi-Fi certification. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
[[Image:Metro Wireless Node.jpg|thumb|A municipal wireless antenna. Such devices are integral in creating a mesh network of access points. ]]&lt;br /&gt;
Wi-Fi was invented by Vic Hayes (dubbed 'the father of Wi-Fi') at the NCR Corporation/AT &amp;amp; T (later Lucent &amp;amp; Agere Systems), in 1991. Hayes had been designing IEEE standards for 802.11b, 802.11a and 802.11g and subsequent technology, initially meant for cashier systems. NCR initially released the technology under the name of 'WaveLAN' which operated in a range of 1Mbps-2 Mbps. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; The Wi-Fi alliance was created soon after the technology. &lt;br /&gt;
&lt;br /&gt;
The alliance is a consortium of separate, independent companies that promotes and develops IEEE 802.11 standards. The alliance also tests products to establish interoperability and certifies products that pass. The 'Wi-Fi' logo is allowed to be used by manufacturers who subscribe to the alliance and whose products pass testing. There exists sever unofficial &amp;quot;Wi-Fi&amp;quot; products that may work, but lack true certification.&lt;br /&gt;
&lt;br /&gt;
The term &amp;quot;Wi-Fi&amp;quot; was coined by Interbrand Corporation in August 1999 when hired by the Alliance to change the name from 'IEEE 802.11b Direct Sequence.' Interbrand also created the official 'Wi-Fi' logo. It is often assumed that Wi-Fi stands for &amp;quot;Wireless Fidelity&amp;quot;, however officially Wi-Fi is an abstract term and the Wi-Fi alliance is trying to downplay any association to &amp;quot;Hi-Fi&amp;quot; (High Fidelity).&lt;br /&gt;
&lt;br /&gt;
Many cities globally, have announced plans for a city-wide Wi-Fi network. Many such project have since been cancelled due to unforseen difficulties however, a few (such as Sunnyvale, California) were successful. The city-wide networks were created by meshing several wireless antenna together and effectively creating a very large hotspot.&lt;br /&gt;
&lt;br /&gt;
==Uses==&lt;br /&gt;
There are typically two ses for Wi-Fi: it can be used as an access technology whereby a single base station (access point) accomodates multiple clients, or it can be used in a point-to-point configuration, connecting exactly 2 access points. The latter is typically reserved for standard 802.16 (Wi-Max) and used by network providers or corporations to connect two sites. &lt;br /&gt;
&lt;br /&gt;
A Wi-Fi enabled device can connect to the internet if the access point it reaches is part of a network containing the internet. A wi-Fi enabled device can essentially use the internet for any networking purpose. &lt;br /&gt;
&lt;br /&gt;
There exists many wireless 'hotspots' which integrate one or more access points and the hotspots can span a range of a few meters to several kilometers( Sunnyvale, California for example, offers free city-wide Wi-Fi). Many businesses offer wireless hotspots as either free or pay services in order to attract customers. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi devices can operate in different modes such as peer-to-peer mode, which allows a direct connection between two people. In ad-hoc mode Wi-Fi devices are able to make client-to-client connections without a router. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi can enable wireless voice application (VoIP). The widespread growth of Wi-Fi now allows access to the internet outside 'traditional' setups (such as the bathroom). Wi-Fi installations can ultimately provide: a sequre computer networking gateway, firewall, DHCP server, intrusion detection system and many other services.&lt;br /&gt;
&lt;br /&gt;
==Advantages and Challenges==&lt;br /&gt;
Wi-Fi uses an unlicensed radio spectrum (unlike packet radio systems) and does not require regulatory approval for individual developers, which makes Wi-Fi products widely available. Different brands are able to make products that are interoperable at a basic service level because of the technological foundations in Wi-Fi. Competition amounsts vendors has also considerably lowered prices of Wi-Fi products, and they continue to drop as technology improves. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi  allows local area networks (LANs) to be set up without wires, which simultaneously lowers costs (of creating and exapnding) and allows much freedom in where a network can be accessed. The Wi-Fi certification aheres to a global set of standards as well so Wi-Fi products are compatible in any region. &lt;br /&gt;
&lt;br /&gt;
===Range===&lt;br /&gt;
[[Image:Point-to-point-wifi-antenna.jpg|thumb|A point-to-point parabolic Wi-Fi antenna. Such devices can dramatically increase the range of a Wi-Fi network (in a single direction). The devices may be costly to buy and run however.]]&lt;br /&gt;
&lt;br /&gt;
Typically a Wi-Fi router in a home setup with a 802.11b stock antenna has a range of about 32m indoors (due to barriers like walls) and about 95m with no obstructions, outdoors. The frequency block a router uses also affects the range: 2.4GHz has a greater range than 5 GHz. Wi-Fi has greater range compared to bluetooth and can provide huge outdoor range if a network incorporates a directional antenna.&lt;br /&gt;
&lt;br /&gt;
Wi-Fi began with IEEE standards for short range wireless broadband technology, and appointed the standard numbers: 802.11b(Wi-Fi), 802.11a and 802.11g (can interoperate with 802.11b). Typically Wi-Fi operates between 2.5 to 4Mbps, but can go as high as 11 Mbps.&lt;br /&gt;
&lt;br /&gt;
===Mobility===&lt;br /&gt;
Wi-Fi technology allows LANs to be deployed without cabling, potentially reducing the costs of network deployment and expansion. Spaces where cables cannont be run, such as outdoor areas or historical buildings can host wireless LANs. Wi-Fi technology increases the ease of setting up a network as well. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi networks support roaming, in which a mobile client station (like a laptop or smartphone) can move from one access point to another as the user moves. It is because Wi-Fi certified devices are able to interoperate that this is possible without complications as well.&lt;br /&gt;
&lt;br /&gt;
==Security==&lt;br /&gt;
The greatest security issue with Wi-Fi (and all other wireless networks) is the easy of connectivity compared to traditional wired networks like Ethernet. Wireless communication (bluetooth especially) is designed to be simple and easily connected to. To make an attack on a wired network, the attacker must physically connect to the internal network or break through an external firewall. External access however is usually disallowed by business networks in order to protect sensitive data. It is because firewall encryption could be broken that most business networks disallow external access. Getting wireless reception is considered an attack to most business networks.&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The nature most wireless networks is to allow external access in order to maintain an degree of usability. If attackers gain access to a wireless network they can harm the user in a variety of ways from monitoring others' activity to fabricating a DNS spoofing attack. &lt;br /&gt;
&lt;br /&gt;
===Preventative Measures===&lt;br /&gt;
[[Image:Wep.gif|thumb|The WEP encryption standard. The vunerabilities are shown by malicious software and a single key for all users on the network.]]&lt;br /&gt;
WEP (Wired Equivalent Privacy) keys uses a deprecated algorithm to secure Wireless networks. First introduced in 1997, WEP keys were intended to make wireless networks have comparable security to that of wired networks. A WEP key could be interpreted as a 26 digit password allowing access to a home network. There are several security flaws in the WEP keys currently being used and there exists readily available software (such as AirSnort or AirCrack) that can obtain a WEP key in minutes. WEP keys are now considered completely broken. The security flaws of WEP keys was first counteracted in 2002 with 'Wi-Fi Protected Access' (WPA) but the attack vector are now known. Now (as of 2004), full IEEE 802.11i (WPA2) encryption standards have been release and are still considered secure as of 2009. &lt;br /&gt;
&lt;br /&gt;
Another security measure in effect involves suppressing the Access Points' SSID broadcast to only allow a predefined set of MAC addresses the ability to join the network. This security measure has since proven ineffective, since if an allowed MAC address is known (or found out) by an attacker then they could potentially change their own MAC address to spoof as an allowed machine.  &lt;br /&gt;
&lt;br /&gt;
===DNS Spoofing and Kaminsky Attack===&lt;br /&gt;
In June 2005 Dan Kaminsky used a DNS hack in order to get free Wi-Fi at an area starbucks. He later realized the huge security issues this presented and brought attention to the Wi-Fi and DNS security flaws. Starbucks offers a Wi-Fi service but it costs a premium, the Kaminsky hack fools the domain name system and thorough Wi-Fi, exposed a glaring Internet security flaw. &lt;br /&gt;
&lt;br /&gt;
The following is an excerpt from WIRED magazine:&lt;br /&gt;
&lt;br /&gt;
'''How DNS works'''&lt;br /&gt;
&lt;br /&gt;
1. Type anybank.com into your Web brower and the query packet is sent to your internet service provider (ISP)&lt;br /&gt;
&lt;br /&gt;
2. If anybank.com's location isn't cached, your ISP's name server repeatedly searches the domain name system for it. Each search is assigned a 16-bit transaction ID for security and tracking. Responses to the searches must carry the correct transaction ID to be accepted by the name server. The packet would travel through the root name server, the .com name server then anybank.com name server.&lt;br /&gt;
&lt;br /&gt;
3. Eventually, anybank.com sends an answer to your ISP; Our home page is at 60.190.216.103. This authenticated address is cached.&lt;br /&gt;
&lt;br /&gt;
4. Your browser connects you.&lt;br /&gt;
&lt;br /&gt;
'''How the Kaminsky DNS hack works'''&lt;br /&gt;
&lt;br /&gt;
1. The attacker tries to hijack anybank.com by sending thousands of requests for fake Web pages. Malicious query packets are sent to your ISP.&lt;br /&gt;
&lt;br /&gt;
2. The ISP gives each query a transaction ID (unknown to the attacker) and attempts to locates the pages.&lt;br /&gt;
&lt;br /&gt;
3. At the same time, the attacker sends hundreds of responses for each malicious request. Every answer includes a randomly generated ID number.&lt;br /&gt;
&lt;br /&gt;
4. Eventually one of the answers carries an ID that matches, tricking the ISP into accepting and caching the information. The now-legitimized answer contains false details about anybank.com, such as the location of its servers. Legitimate answers from anybank.com(&amp;quot;No such page exists&amp;quot;) will now be rejected.&lt;br /&gt;
&lt;br /&gt;
5. Users looking for anybank.com get sent to the fake location already in the ISP's cache.&lt;br /&gt;
&lt;br /&gt;
6. Anybank.com customers are now using a look-alike site built by the hacker.&lt;br /&gt;
&lt;br /&gt;
'''Patch fixing Kaminsky attack'''&lt;br /&gt;
&lt;br /&gt;
Most computers have 63, 536 ports, but DNS commonly uses only port 53 for all queries and responses. The patch works by randomly changing the port number for each DNS request. Now any response to a request must contain an accurate transaction ID number and return to the same port. The change increases the odds of beating the system from one in 65, 536 to one in 4 billion.&lt;br /&gt;
&lt;br /&gt;
===Piggybacking===&lt;br /&gt;
Piggybacking refers to accessing a wireless internet connection by bringing a wireless device in range of another connection and using the service without the owners knowledge or permission. Piggybacking is completely outlawed in some jurisdictions, but allowed in others. It is not considered piggybacking if a bussiness offers a Wi-Fi hotspot for free or as a pay service. &lt;br /&gt;
&lt;br /&gt;
Piggybacking ofter goes unnoticed since most people only use a fraction of their upstream bandwidth. Piggybacking may also be carried out unintentionally, as most access points are configured without encryption (WPA2) and operating systems can automatically connect to wireless networks. The danger in piggybacking exists in users logging into an insecure network where illicit activity is conducted (danger for network owner) or sensitive information is broadcast (danger for user).&lt;br /&gt;
&lt;br /&gt;
===The Wi-Fi Scam, Home Security Scam and Bluetooth Scam===&lt;br /&gt;
'The Real Hustle' a UK television show is premised as an educational program demonstrating how people are getting ripped-off by confidence men around the world. The hustlers demonstrate how easy it is to gain access to a Wireless network through various scams. &lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=jqic_aY3TqQ&amp;amp;feature=related Wi-Fi Scam], the hustlers hijack a wireless network then rename their own wireless network and route people to a dummy site that looks completely legitimate. &lt;br /&gt;
&lt;br /&gt;
In the Home Security Scam, the hustlers walk through a residential neighborhood and enter home wireless networks by either hacking WEP keys or finding an unlocked network. The hustlers then monitor others online activity.&lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=gvDp-DBh4Gc&amp;amp;feature=related Bluetooth Scam], the hustlers scan a shopping mall for bluetooth signals from mobile phones. Once a signal is found and a connection is made, the hustlers call their premium rate line and rack up a bill for the cell phone owner.&lt;br /&gt;
&lt;br /&gt;
There exists dozens of tutorials on the Internet on how to use Wi-Fi for illicit purposes, demonstrating just how vunerable a wireless network is.&lt;br /&gt;
&lt;br /&gt;
==Other 802 Standards and Amendments==&lt;br /&gt;
[http://en.wikipedia.org/wiki/IEEE_802 See: IEEE 802 Wiki]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
# Comer, D. E. (2006). Wi-Fi. ''Internetworking with TCP/IP'' (Fifth ed., pp. 419-441). Upper Saddle River, NJ: Pearson Prentice Hall.&lt;br /&gt;
# &amp;quot;[http://www.wilcorpinc.com/wifi_history.htm Wi-Fi History]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# &amp;quot;[http://networkbits.net/wireless-printing/80211-g-pros-cons-of-a-wireless-network-in-a-business-environment/ Pros and Cons...]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks Denial of Service Attacks]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Security_for_Small_Home_Networks Security for Small Home Networks]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Peer_To_Peer_Network_Security Peer To Peer Network Security]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Man_in_the_Middle_Attack Man in the Middle Attacks]&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Hamilr3|Hamilr3]] 00:51, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Wi-Fi</id>
		<title>Wi-Fi</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Wi-Fi"/>
				<updated>2009-04-12T23:54:13Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;/* DNS Spoofing and Kaminsky Attack */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Wifilogo.jpg|thumb|Wi-Fi logo]]&lt;br /&gt;
''Wi-Fi is a consortium that verifies 802.11b wireless network products interoperate, and a marketing term vendors use to sell their products.''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Wi-Fi is a subsection of the IEEE 802, a subcategory in the link layer of the TCP/IP [[The Five-Layer TCP/IP Model: Description/Attacks/Defense|Internet Protocol Suite]]. The Wi-Fi alliance is a trade group that owns the 'Wi-Fi' trademark, a symbol that certifies interoperability between wireless devices. Not every Internet product is Wi-Fi certified however, and there exists many devices that are able to interoperate wirelessly without the Wi-Fi logo. Some products have chosen to omit having Wi-Fi certification to avoid paying certification costs.&lt;br /&gt;
&lt;br /&gt;
The use of Wi-Fi has boomed in recent years and is supported by a multitude of different devices. Laptops. game consoles, smartphones, printers and other peripherals usually have Wi-Fi certification. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
[[Image:Metro Wireless Node.jpg|thumb|A municipal wireless antenna. Such devices are integral in creating a mesh network of access points. ]]&lt;br /&gt;
Wi-Fi was invented by Vic Hayes (dubbed 'the father of Wi-Fi') at the NCR Corporation/AT &amp;amp; T (later Lucent &amp;amp; Agere Systems), in 1991. Hayes had been designing IEEE standards for 802.11b, 802.11a and 802.11g and subsequent technology, initially meant for cashier systems. NCR initially released the technology under the name of 'WaveLAN' which operated in a range of 1Mbps-2 Mbps. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; The Wi-Fi alliance was created soon after the technology. &lt;br /&gt;
&lt;br /&gt;
The alliance is a consortium of separate, independent companies that promotes and develops IEEE 802.11 standards. The alliance also tests products to establish interoperability and certifies products that pass. The 'Wi-Fi' logo is allowed to be used by manufacturers who subscribe to the alliance and whose products pass testing. There exists sever unofficial &amp;quot;Wi-Fi&amp;quot; products that may work, but lack true certification.&lt;br /&gt;
&lt;br /&gt;
The term &amp;quot;Wi-Fi&amp;quot; was coined by Interbrand Corporation in August 1999 when hired by the Alliance to change the name from 'IEEE 802.11b Direct Sequence.' Interbrand also created the official 'Wi-Fi' logo. It is often assumed that Wi-Fi stands for &amp;quot;Wireless Fidelity&amp;quot;, however officially Wi-Fi is an abstract term and the Wi-Fi alliance is trying to downplay any association to &amp;quot;Hi-Fi&amp;quot; (High Fidelity).&lt;br /&gt;
&lt;br /&gt;
Many cities globally, have announced plans for a city-wide Wi-Fi network. Many such project have since been cancelled due to unforseen difficulties however, a few (such as Sunnyvale, California) were successful. The city-wide networks were created by meshing several wireless antenna together and effectively creating a very large hotspot.&lt;br /&gt;
&lt;br /&gt;
==Uses==&lt;br /&gt;
There are typically two ses for Wi-Fi: it can be used as an access technology whereby a single base station (access point) accomodates multiple clients, or it can be used in a point-to-point configuration, connecting exactly 2 access points. The latter is typically reserved for standard 802.16 (Wi-Max) and used by network providers or corporations to connect two sites. &lt;br /&gt;
&lt;br /&gt;
A Wi-Fi enabled device can connect to the internet if the access point it reaches is part of a network containing the internet. A wi-Fi enabled device can essentially use the internet for any networking purpose. &lt;br /&gt;
&lt;br /&gt;
There exists many wireless 'hotspots' which integrate one or more access points and the hotspots can span a range of a few meters to several kilometers( Sunnyvale, California for example, offers free city-wide Wi-Fi). Many businesses offer wireless hotspots as either free or pay services in order to attract customers. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi devices can operate in different modes such as peer-to-peer mode, which allows a direct connection between two people. In ad-hoc mode Wi-Fi devices are able to make client-to-client connections without a router. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi can enable wireless voice application (VoIP). The widespread growth of Wi-Fi now allows access to the internet outside 'traditional' setups (such as the bathroom). Wi-Fi installations can ultimately provide: a sequre computer networking gateway, firewall, DHCP server, intrusion detection system and many other services.&lt;br /&gt;
&lt;br /&gt;
==Advantages and Challenges==&lt;br /&gt;
Wi-Fi uses an unlicensed radio spectrum (unlike packet radio systems) and does not require regulatory approval for individual developers, which makes Wi-Fi products widely available. Different brands are able to make products that are interoperable at a basic service level because of the technological foundations in Wi-Fi. Competition amounsts vendors has also considerably lowered prices of Wi-Fi products, and they continue to drop as technology improves. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi  allows local area networks (LANs) to be set up without wires, which simultaneously lowers costs (of creating and exapnding) and allows much freedom in where a network can be accessed. The Wi-Fi certification aheres to a global set of standards as well so Wi-Fi products are compatible in any region. &lt;br /&gt;
&lt;br /&gt;
===Range===&lt;br /&gt;
[[Image:Point-to-point-wifi-antenna.jpg|thumb|A point-to-point parabolic Wi-Fi antenna. Such devices can dramatically increase the range of a Wi-Fi network (in a single direction). The devices may be costly to buy and run however.]]&lt;br /&gt;
&lt;br /&gt;
Typically a Wi-Fi router in a home setup with a 802.11b stock antenna has a range of about 32m indoors (due to barriers like walls) and about 95m with no obstructions, outdoors. The frequency block a router uses also affects the range: 2.4GHz has a greater range than 5 GHz. Wi-Fi has greater range compared to bluetooth and can provide huge outdoor range if a network incorporates a directional antenna.&lt;br /&gt;
&lt;br /&gt;
Wi-Fi began with IEEE standards for short range wireless broadband technology, and appointed the standard numbers: 802.11b(Wi-Fi), 802.11a and 802.11g (can interoperate with 802.11b). Typically Wi-Fi operates between 2.5 to 4Mbps, but can go as high as 11 Mbps.&lt;br /&gt;
&lt;br /&gt;
===Mobility===&lt;br /&gt;
Wi-Fi technology allows LANs to be deployed without cabling, potentially reducing the costs of network deployment and expansion. Spaces where cables cannont be run, such as outdoor areas or historical buildings can host wireless LANs. Wi-Fi technology increases the ease of setting up a network as well. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi networks support roaming, in which a mobile client station (like a laptop or smartphone) can move from one access point to another as the user moves. It is because Wi-Fi certified devices are able to interoperate that this is possible without complications as well.&lt;br /&gt;
&lt;br /&gt;
==Security==&lt;br /&gt;
The greatest security issue with Wi-Fi (and all other wireless networks) is the easy of connectivity compared to traditional wired networks like Ethernet. Wireless communication (bluetooth especially) is designed to be simple and easily connected to. To make an attack on a wired network, the attacker must physically connect to the internal network or break through an external firewall. External access however is usually disallowed by business networks in order to protect sensitive data. It is because firewall encryption could be broken that most business networks disallow external access. Getting wireless reception is considered an attack to most business networks.&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The nature most wireless networks is to allow external access in order to maintain an degree of usability. If attackers gain access to a wireless network they can harm the user in a variety of ways from monitoring others' activity to fabricating a DNS spoofing attack. &lt;br /&gt;
&lt;br /&gt;
===Preventative Measures===&lt;br /&gt;
[[Image:Wep.gif|thumb|The WEP encryption standard. The vunerabilities are shown by malicious software and a single key for all users on the network.]]&lt;br /&gt;
WEP (Wired Equivalent Privacy) keys uses a deprecated algorithm to secure Wireless networks. First introduced in 1997, WEP keys were intended to make wireless networks have comparable security to that of wired networks. A WEP key could be interpreted as a 26 digit password allowing access to a home network. There are several security flaws in the WEP keys currently being used and there exists readily available software (such as AirSnort or AirCrack) that can obtain a WEP key in minutes. WEP keys are now considered completely broken. The security flaws of WEP keys was first counteracted in 2002 with 'Wi-Fi Protected Access' (WPA) but the attack vector are now known. Now (as of 2004), full IEEE 802.11i (WPA2) encryption standards have been release and are still considered secure as of 2009. &lt;br /&gt;
&lt;br /&gt;
Another security measure in effect involves suppressing the Access Points' SSID broadcast to only allow a predefined set of MAC addresses the ability to join the network. This security measure has since proven ineffective, since if an allowed MAC address is known (or found out) by an attacker then they could potentially change their own MAC address to spoof as an allowed machine.  &lt;br /&gt;
&lt;br /&gt;
===DNS Spoofing and Kaminsky Attack===&lt;br /&gt;
In June 2005 Dan Kaminsky used a DNS hack in order to get free Wi-Fi at an area starbucks. He later realized the huge security issues this presented and brought attention to the Wi-Fi and DNS security flaws. Starbucks offers a Wi-Fi service but it costs a premium, the Kaminsky hack fools the domain name system and thorough Wi-Fi, exposed a glaring Internet security flaw. &lt;br /&gt;
&lt;br /&gt;
The following is an excerpt from WIRED magazine:&lt;br /&gt;
&lt;br /&gt;
'''&lt;br /&gt;
How DNS works'''&lt;br /&gt;
&lt;br /&gt;
1. Type anybank.com into your Web brower and the query packet is sent to your internet service provider (ISP)&lt;br /&gt;
&lt;br /&gt;
2. If anybank.com's location isn't cached, your ISP's name server repeatedly searches the domain name system for it. Each search is assigned a 16-bit transaction ID for security and tracking. Responses to the searches must carry the correct transaction ID to be accepted by the name server. The packet would travel through the root name server, the .com name server then anybank.com name server.&lt;br /&gt;
&lt;br /&gt;
3. Eventually, anybank.com sends an answer to your ISP; Our home page is at 60.190.216.103. This authenticated address is cached.&lt;br /&gt;
&lt;br /&gt;
4. Your browser connects you.&lt;br /&gt;
&lt;br /&gt;
'''How the Kaminsky DNS hack works'''&lt;br /&gt;
&lt;br /&gt;
1. The attacker tries to hijack anybank.com by sending thousands of requests for fake Web pages. Malicious query packets are sent to your ISP.&lt;br /&gt;
&lt;br /&gt;
2. The ISP gives each query a transaction ID (unknown to the attacker) and attempts to locates the pages.&lt;br /&gt;
&lt;br /&gt;
3. At the same time, the attacker sends hundreds of responses for each malicious request. Every answer includes a randomly generated ID number.&lt;br /&gt;
&lt;br /&gt;
4. Eventually one of the answers carries an ID that matches, tricking the ISP into accepting and caching the information. The now-legitimized answer contains false details about anybank.com, such as the location of its servers. Legitimate answers from anybank.com(&amp;quot;No such page exists&amp;quot;) will now be rejected.&lt;br /&gt;
&lt;br /&gt;
5. Users looking for anybank.com get sent to the fake location already in the ISP's cache.&lt;br /&gt;
&lt;br /&gt;
6. Anybank.com customers are now using a look-alike site built by the hacker.&lt;br /&gt;
&lt;br /&gt;
'''&lt;br /&gt;
Patch fixing Kaminsky attack'''&lt;br /&gt;
Most computers have 63, 536 ports, but DNS commonly uses only port 53 for all queries and responses. The patch works by randomly changing the port number for each DNS request. Now any response to a request must contain an accurate transaction ID number and return to the same port. The change increases the odds of beating the system from one in 65, 536 to one in 4 billion.&lt;br /&gt;
&lt;br /&gt;
===Piggybacking===&lt;br /&gt;
Piggybacking refers to accessing a wireless internet connection by bringing a wireless device in range of another connection and using the service without the owners knowledge or permission. Piggybacking is completely outlawed in some jurisdictions, but allowed in others. It is not considered piggybacking if a bussiness offers a Wi-Fi hotspot for free or as a pay service. &lt;br /&gt;
&lt;br /&gt;
Piggybacking ofter goes unnoticed since most people only use a fraction of their upstream bandwidth. Piggybacking may also be carried out unintentionally, as most access points are configured without encryption (WPA2) and operating systems can automatically connect to wireless networks. The danger in piggybacking exists in users logging into an insecure network where illicit activity is conducted (danger for network owner) or sensitive information is broadcast (danger for user).&lt;br /&gt;
&lt;br /&gt;
===The Wi-Fi Scam, Home Security Scam and Bluetooth Scam===&lt;br /&gt;
'The Real Hustle' a UK television show is premised as an educational program demonstrating how people are getting ripped-off by confidence men around the world. The hustlers demonstrate how easy it is to gain access to a Wireless network through various scams. &lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=jqic_aY3TqQ&amp;amp;feature=related Wi-Fi Scam], the hustlers hijack a wireless network then rename their own wireless network and route people to a dummy site that looks completely legitimate. &lt;br /&gt;
&lt;br /&gt;
In the Home Security Scam, the hustlers walk through a residential neighborhood and enter home wireless networks by either hacking WEP keys or finding an unlocked network. The hustlers then monitor others online activity.&lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=gvDp-DBh4Gc&amp;amp;feature=related Bluetooth Scam], the hustlers scan a shopping mall for bluetooth signals from mobile phones. Once a signal is found and a connection is made, the hustlers call their premium rate line and rack up a bill for the cell phone owner.&lt;br /&gt;
&lt;br /&gt;
There exists dozens of tutorials on the Internet on how to use Wi-Fi for illicit purposes, demonstrating just how vunerable a wireless network is.&lt;br /&gt;
&lt;br /&gt;
==Other 802 Standards and Amendments==&lt;br /&gt;
[http://en.wikipedia.org/wiki/IEEE_802 See: IEEE 802 Wiki]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
# Comer, D. E. (2006). Wi-Fi. ''Internetworking with TCP/IP'' (Fifth ed., pp. 419-441). Upper Saddle River, NJ: Pearson Prentice Hall.&lt;br /&gt;
# &amp;quot;[http://www.wilcorpinc.com/wifi_history.htm Wi-Fi History]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# &amp;quot;[http://networkbits.net/wireless-printing/80211-g-pros-cons-of-a-wireless-network-in-a-business-environment/ Pros and Cons...]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks Denial of Service Attacks]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Security_for_Small_Home_Networks Security for Small Home Networks]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Peer_To_Peer_Network_Security Peer To Peer Network Security]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Man_in_the_Middle_Attack Man in the Middle Attacks]&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Hamilr3|Hamilr3]] 00:51, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Wi-Fi</id>
		<title>Wi-Fi</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Wi-Fi"/>
				<updated>2009-04-12T23:53:19Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;/* DNS Spoofing and Kaminsky Attack */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Wifilogo.jpg|thumb|Wi-Fi logo]]&lt;br /&gt;
''Wi-Fi is a consortium that verifies 802.11b wireless network products interoperate, and a marketing term vendors use to sell their products.''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Wi-Fi is a subsection of the IEEE 802, a subcategory in the link layer of the TCP/IP [[The Five-Layer TCP/IP Model: Description/Attacks/Defense|Internet Protocol Suite]]. The Wi-Fi alliance is a trade group that owns the 'Wi-Fi' trademark, a symbol that certifies interoperability between wireless devices. Not every Internet product is Wi-Fi certified however, and there exists many devices that are able to interoperate wirelessly without the Wi-Fi logo. Some products have chosen to omit having Wi-Fi certification to avoid paying certification costs.&lt;br /&gt;
&lt;br /&gt;
The use of Wi-Fi has boomed in recent years and is supported by a multitude of different devices. Laptops. game consoles, smartphones, printers and other peripherals usually have Wi-Fi certification. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
[[Image:Metro Wireless Node.jpg|thumb|A municipal wireless antenna. Such devices are integral in creating a mesh network of access points. ]]&lt;br /&gt;
Wi-Fi was invented by Vic Hayes (dubbed 'the father of Wi-Fi') at the NCR Corporation/AT &amp;amp; T (later Lucent &amp;amp; Agere Systems), in 1991. Hayes had been designing IEEE standards for 802.11b, 802.11a and 802.11g and subsequent technology, initially meant for cashier systems. NCR initially released the technology under the name of 'WaveLAN' which operated in a range of 1Mbps-2 Mbps. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; The Wi-Fi alliance was created soon after the technology. &lt;br /&gt;
&lt;br /&gt;
The alliance is a consortium of separate, independent companies that promotes and develops IEEE 802.11 standards. The alliance also tests products to establish interoperability and certifies products that pass. The 'Wi-Fi' logo is allowed to be used by manufacturers who subscribe to the alliance and whose products pass testing. There exists sever unofficial &amp;quot;Wi-Fi&amp;quot; products that may work, but lack true certification.&lt;br /&gt;
&lt;br /&gt;
The term &amp;quot;Wi-Fi&amp;quot; was coined by Interbrand Corporation in August 1999 when hired by the Alliance to change the name from 'IEEE 802.11b Direct Sequence.' Interbrand also created the official 'Wi-Fi' logo. It is often assumed that Wi-Fi stands for &amp;quot;Wireless Fidelity&amp;quot;, however officially Wi-Fi is an abstract term and the Wi-Fi alliance is trying to downplay any association to &amp;quot;Hi-Fi&amp;quot; (High Fidelity).&lt;br /&gt;
&lt;br /&gt;
Many cities globally, have announced plans for a city-wide Wi-Fi network. Many such project have since been cancelled due to unforseen difficulties however, a few (such as Sunnyvale, California) were successful. The city-wide networks were created by meshing several wireless antenna together and effectively creating a very large hotspot.&lt;br /&gt;
&lt;br /&gt;
==Uses==&lt;br /&gt;
There are typically two ses for Wi-Fi: it can be used as an access technology whereby a single base station (access point) accomodates multiple clients, or it can be used in a point-to-point configuration, connecting exactly 2 access points. The latter is typically reserved for standard 802.16 (Wi-Max) and used by network providers or corporations to connect two sites. &lt;br /&gt;
&lt;br /&gt;
A Wi-Fi enabled device can connect to the internet if the access point it reaches is part of a network containing the internet. A wi-Fi enabled device can essentially use the internet for any networking purpose. &lt;br /&gt;
&lt;br /&gt;
There exists many wireless 'hotspots' which integrate one or more access points and the hotspots can span a range of a few meters to several kilometers( Sunnyvale, California for example, offers free city-wide Wi-Fi). Many businesses offer wireless hotspots as either free or pay services in order to attract customers. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi devices can operate in different modes such as peer-to-peer mode, which allows a direct connection between two people. In ad-hoc mode Wi-Fi devices are able to make client-to-client connections without a router. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi can enable wireless voice application (VoIP). The widespread growth of Wi-Fi now allows access to the internet outside 'traditional' setups (such as the bathroom). Wi-Fi installations can ultimately provide: a sequre computer networking gateway, firewall, DHCP server, intrusion detection system and many other services.&lt;br /&gt;
&lt;br /&gt;
==Advantages and Challenges==&lt;br /&gt;
Wi-Fi uses an unlicensed radio spectrum (unlike packet radio systems) and does not require regulatory approval for individual developers, which makes Wi-Fi products widely available. Different brands are able to make products that are interoperable at a basic service level because of the technological foundations in Wi-Fi. Competition amounsts vendors has also considerably lowered prices of Wi-Fi products, and they continue to drop as technology improves. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi  allows local area networks (LANs) to be set up without wires, which simultaneously lowers costs (of creating and exapnding) and allows much freedom in where a network can be accessed. The Wi-Fi certification aheres to a global set of standards as well so Wi-Fi products are compatible in any region. &lt;br /&gt;
&lt;br /&gt;
===Range===&lt;br /&gt;
[[Image:Point-to-point-wifi-antenna.jpg|thumb|A point-to-point parabolic Wi-Fi antenna. Such devices can dramatically increase the range of a Wi-Fi network (in a single direction). The devices may be costly to buy and run however.]]&lt;br /&gt;
&lt;br /&gt;
Typically a Wi-Fi router in a home setup with a 802.11b stock antenna has a range of about 32m indoors (due to barriers like walls) and about 95m with no obstructions, outdoors. The frequency block a router uses also affects the range: 2.4GHz has a greater range than 5 GHz. Wi-Fi has greater range compared to bluetooth and can provide huge outdoor range if a network incorporates a directional antenna.&lt;br /&gt;
&lt;br /&gt;
Wi-Fi began with IEEE standards for short range wireless broadband technology, and appointed the standard numbers: 802.11b(Wi-Fi), 802.11a and 802.11g (can interoperate with 802.11b). Typically Wi-Fi operates between 2.5 to 4Mbps, but can go as high as 11 Mbps.&lt;br /&gt;
&lt;br /&gt;
===Mobility===&lt;br /&gt;
Wi-Fi technology allows LANs to be deployed without cabling, potentially reducing the costs of network deployment and expansion. Spaces where cables cannont be run, such as outdoor areas or historical buildings can host wireless LANs. Wi-Fi technology increases the ease of setting up a network as well. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi networks support roaming, in which a mobile client station (like a laptop or smartphone) can move from one access point to another as the user moves. It is because Wi-Fi certified devices are able to interoperate that this is possible without complications as well.&lt;br /&gt;
&lt;br /&gt;
==Security==&lt;br /&gt;
The greatest security issue with Wi-Fi (and all other wireless networks) is the easy of connectivity compared to traditional wired networks like Ethernet. Wireless communication (bluetooth especially) is designed to be simple and easily connected to. To make an attack on a wired network, the attacker must physically connect to the internal network or break through an external firewall. External access however is usually disallowed by business networks in order to protect sensitive data. It is because firewall encryption could be broken that most business networks disallow external access. Getting wireless reception is considered an attack to most business networks.&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The nature most wireless networks is to allow external access in order to maintain an degree of usability. If attackers gain access to a wireless network they can harm the user in a variety of ways from monitoring others' activity to fabricating a DNS spoofing attack. &lt;br /&gt;
&lt;br /&gt;
===Preventative Measures===&lt;br /&gt;
[[Image:Wep.gif|thumb|The WEP encryption standard. The vunerabilities are shown by malicious software and a single key for all users on the network.]]&lt;br /&gt;
WEP (Wired Equivalent Privacy) keys uses a deprecated algorithm to secure Wireless networks. First introduced in 1997, WEP keys were intended to make wireless networks have comparable security to that of wired networks. A WEP key could be interpreted as a 26 digit password allowing access to a home network. There are several security flaws in the WEP keys currently being used and there exists readily available software (such as AirSnort or AirCrack) that can obtain a WEP key in minutes. WEP keys are now considered completely broken. The security flaws of WEP keys was first counteracted in 2002 with 'Wi-Fi Protected Access' (WPA) but the attack vector are now known. Now (as of 2004), full IEEE 802.11i (WPA2) encryption standards have been release and are still considered secure as of 2009. &lt;br /&gt;
&lt;br /&gt;
Another security measure in effect involves suppressing the Access Points' SSID broadcast to only allow a predefined set of MAC addresses the ability to join the network. This security measure has since proven ineffective, since if an allowed MAC address is known (or found out) by an attacker then they could potentially change their own MAC address to spoof as an allowed machine.  &lt;br /&gt;
&lt;br /&gt;
===DNS Spoofing and Kaminsky Attack===&lt;br /&gt;
In June 2005 Dan Kaminsky used a DNS hack in order to get free Wi-Fi at an area starbucks. He later realized the huge security issues this presented and brought attention to the Wi-Fi and DNS security flaws. Starbucks offers a Wi-Fi service but it costs a premium, the Kaminsky hack fools the domain name system and thorough Wi-Fi, exposed a glaring Internet security flaw. &lt;br /&gt;
&lt;br /&gt;
The following is an excerpt from WIRED magazine:&lt;br /&gt;
'''&lt;br /&gt;
How DNS works'''&lt;br /&gt;
1. Type anybank.com into your Web brower and the query packet is sent to your internet service provider (ISP)&lt;br /&gt;
2. If anybank.com's location isn't cached, your ISP's name server repeatedly searches the domain name system for it. Each search is assigned a 16-bit transaction ID for security and tracking. Responses to the searches must carry the correct transaction ID to be accepted by the name server. The packet would travel through the root name server, the .com name server then anybank.com name server.&lt;br /&gt;
3. Eventually, anybank.com sends an answer to your ISP; Our home page is at 60.190.216.103. This authenticated address is cached.&lt;br /&gt;
4. Your browser connectes you.&lt;br /&gt;
&lt;br /&gt;
'''How the Kaminsky DNS hack works'''&lt;br /&gt;
1. The attacker tries to hijack anybank.com by sending thousands of requests for fake Web pages. Malicious query packets are sent to your ISP.&lt;br /&gt;
2. The ISP gives each query a transaction ID (unknown to the attacker) and attempts to locates the pages.&lt;br /&gt;
3. At the same time, the attacker sends hundreds of responses for each malicious request. Every answer includes a randomly generated ID number.&lt;br /&gt;
4. Eventually one of the answers carries an ID that matches, tricking the ISP into accepting and caching the information. The now-legitimized answer contains false details about anybank.com, such as the location of its servers. Legitimate answers from anybank.com(&amp;quot;No such page exists&amp;quot;) will now be rejected.&lt;br /&gt;
5. Users looking for anybank.com get sent to the fake location already in the ISP's cache.&lt;br /&gt;
6. Anybank.com customers are now using a look-alike site built by the hacker.&lt;br /&gt;
'''&lt;br /&gt;
Patch fixing Kaminsky attack'''&lt;br /&gt;
Most computers have 63, 536 ports, but DNS commonly uses only port 53 for all queries and responses. The patch works by randomly changing the port number for each DNS request. Now any response to a request must contain an accurate transaction ID number and return to the same port. The change increases the odds of beating the system from one in 65, 536 to one in 4 billion.&lt;br /&gt;
&lt;br /&gt;
===Piggybacking===&lt;br /&gt;
Piggybacking refers to accessing a wireless internet connection by bringing a wireless device in range of another connection and using the service without the owners knowledge or permission. Piggybacking is completely outlawed in some jurisdictions, but allowed in others. It is not considered piggybacking if a bussiness offers a Wi-Fi hotspot for free or as a pay service. &lt;br /&gt;
&lt;br /&gt;
Piggybacking ofter goes unnoticed since most people only use a fraction of their upstream bandwidth. Piggybacking may also be carried out unintentionally, as most access points are configured without encryption (WPA2) and operating systems can automatically connect to wireless networks. The danger in piggybacking exists in users logging into an insecure network where illicit activity is conducted (danger for network owner) or sensitive information is broadcast (danger for user).&lt;br /&gt;
&lt;br /&gt;
===The Wi-Fi Scam, Home Security Scam and Bluetooth Scam===&lt;br /&gt;
'The Real Hustle' a UK television show is premised as an educational program demonstrating how people are getting ripped-off by confidence men around the world. The hustlers demonstrate how easy it is to gain access to a Wireless network through various scams. &lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=jqic_aY3TqQ&amp;amp;feature=related Wi-Fi Scam], the hustlers hijack a wireless network then rename their own wireless network and route people to a dummy site that looks completely legitimate. &lt;br /&gt;
&lt;br /&gt;
In the Home Security Scam, the hustlers walk through a residential neighborhood and enter home wireless networks by either hacking WEP keys or finding an unlocked network. The hustlers then monitor others online activity.&lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=gvDp-DBh4Gc&amp;amp;feature=related Bluetooth Scam], the hustlers scan a shopping mall for bluetooth signals from mobile phones. Once a signal is found and a connection is made, the hustlers call their premium rate line and rack up a bill for the cell phone owner.&lt;br /&gt;
&lt;br /&gt;
There exists dozens of tutorials on the Internet on how to use Wi-Fi for illicit purposes, demonstrating just how vunerable a wireless network is.&lt;br /&gt;
&lt;br /&gt;
==Other 802 Standards and Amendments==&lt;br /&gt;
[http://en.wikipedia.org/wiki/IEEE_802 See: IEEE 802 Wiki]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
# Comer, D. E. (2006). Wi-Fi. ''Internetworking with TCP/IP'' (Fifth ed., pp. 419-441). Upper Saddle River, NJ: Pearson Prentice Hall.&lt;br /&gt;
# &amp;quot;[http://www.wilcorpinc.com/wifi_history.htm Wi-Fi History]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# &amp;quot;[http://networkbits.net/wireless-printing/80211-g-pros-cons-of-a-wireless-network-in-a-business-environment/ Pros and Cons...]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks Denial of Service Attacks]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Security_for_Small_Home_Networks Security for Small Home Networks]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Peer_To_Peer_Network_Security Peer To Peer Network Security]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Man_in_the_Middle_Attack Man in the Middle Attacks]&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Hamilr3|Hamilr3]] 00:51, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Wi-Fi</id>
		<title>Wi-Fi</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Wi-Fi"/>
				<updated>2009-04-12T22:23:07Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;/* See Also */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Wifilogo.jpg|thumb|Wi-Fi logo]]&lt;br /&gt;
''Wi-Fi is a consortium that verifies 802.11b wireless network products interoperate, and a marketing term vendors use to sell their products.''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Wi-Fi is a subsection of the IEEE 802, a subcategory in the link layer of the TCP/IP [[The Five-Layer TCP/IP Model: Description/Attacks/Defense|Internet Protocol Suite]]. The Wi-Fi alliance is a trade group that owns the 'Wi-Fi' trademark, a symbol that certifies interoperability between wireless devices. Not every Internet product is Wi-Fi certified however, and there exists many devices that are able to interoperate wirelessly without the Wi-Fi logo. Some products have chosen to omit having Wi-Fi certification to avoid paying certification costs.&lt;br /&gt;
&lt;br /&gt;
The use of Wi-Fi has boomed in recent years and is supported by a multitude of different devices. Laptops. game consoles, smartphones, printers and other peripherals usually have Wi-Fi certification. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
[[Image:Metro Wireless Node.jpg|thumb|A municipal wireless antenna. Such devices are integral in creating a mesh network of access points. ]]&lt;br /&gt;
Wi-Fi was invented by Vic Hayes (dubbed 'the father of Wi-Fi') at the NCR Corporation/AT &amp;amp; T (later Lucent &amp;amp; Agere Systems), in 1991. Hayes had been designing IEEE standards for 802.11b, 802.11a and 802.11g and subsequent technology, initially meant for cashier systems. NCR initially released the technology under the name of 'WaveLAN' which operated in a range of 1Mbps-2 Mbps. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; The Wi-Fi alliance was created soon after the technology. &lt;br /&gt;
&lt;br /&gt;
The alliance is a consortium of separate, independent companies that promotes and develops IEEE 802.11 standards. The alliance also tests products to establish interoperability and certifies products that pass. The 'Wi-Fi' logo is allowed to be used by manufacturers who subscribe to the alliance and whose products pass testing. There exists sever unofficial &amp;quot;Wi-Fi&amp;quot; products that may work, but lack true certification.&lt;br /&gt;
&lt;br /&gt;
The term &amp;quot;Wi-Fi&amp;quot; was coined by Interbrand Corporation in August 1999 when hired by the Alliance to change the name from 'IEEE 802.11b Direct Sequence.' Interbrand also created the official 'Wi-Fi' logo. It is often assumed that Wi-Fi stands for &amp;quot;Wireless Fidelity&amp;quot;, however officially Wi-Fi is an abstract term and the Wi-Fi alliance is trying to downplay any association to &amp;quot;Hi-Fi&amp;quot; (High Fidelity).&lt;br /&gt;
&lt;br /&gt;
Many cities globally, have announced plans for a city-wide Wi-Fi network. Many such project have since been cancelled due to unforseen difficulties however, a few (such as Sunnyvale, California) were successful. The city-wide networks were created by meshing several wireless antenna together and effectively creating a very large hotspot.&lt;br /&gt;
&lt;br /&gt;
==Uses==&lt;br /&gt;
There are typically two ses for Wi-Fi: it can be used as an access technology whereby a single base station (access point) accomodates multiple clients, or it can be used in a point-to-point configuration, connecting exactly 2 access points. The latter is typically reserved for standard 802.16 (Wi-Max) and used by network providers or corporations to connect two sites. &lt;br /&gt;
&lt;br /&gt;
A Wi-Fi enabled device can connect to the internet if the access point it reaches is part of a network containing the internet. A wi-Fi enabled device can essentially use the internet for any networking purpose. &lt;br /&gt;
&lt;br /&gt;
There exists many wireless 'hotspots' which integrate one or more access points and the hotspots can span a range of a few meters to several kilometers( Sunnyvale, California for example, offers free city-wide Wi-Fi). Many businesses offer wireless hotspots as either free or pay services in order to attract customers. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi devices can operate in different modes such as peer-to-peer mode, which allows a direct connection between two people. In ad-hoc mode Wi-Fi devices are able to make client-to-client connections without a router. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi can enable wireless voice application (VoIP). The widespread growth of Wi-Fi now allows access to the internet outside 'traditional' setups (such as the bathroom). Wi-Fi installations can ultimately provide: a sequre computer networking gateway, firewall, DHCP server, intrusion detection system and many other services.&lt;br /&gt;
&lt;br /&gt;
==Advantages and Challenges==&lt;br /&gt;
Wi-Fi uses an unlicensed radio spectrum (unlike packet radio systems) and does not require regulatory approval for individual developers, which makes Wi-Fi products widely available. Different brands are able to make products that are interoperable at a basic service level because of the technological foundations in Wi-Fi. Competition amounsts vendors has also considerably lowered prices of Wi-Fi products, and they continue to drop as technology improves. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi  allows local area networks (LANs) to be set up without wires, which simultaneously lowers costs (of creating and exapnding) and allows much freedom in where a network can be accessed. The Wi-Fi certification aheres to a global set of standards as well so Wi-Fi products are compatible in any region. &lt;br /&gt;
&lt;br /&gt;
===Range===&lt;br /&gt;
[[Image:Point-to-point-wifi-antenna.jpg|thumb|A point-to-point parabolic Wi-Fi antenna. Such devices can dramatically increase the range of a Wi-Fi network (in a single direction). The devices may be costly to buy and run however.]]&lt;br /&gt;
&lt;br /&gt;
Typically a Wi-Fi router in a home setup with a 802.11b stock antenna has a range of about 32m indoors (due to barriers like walls) and about 95m with no obstructions, outdoors. The frequency block a router uses also affects the range: 2.4GHz has a greater range than 5 GHz. Wi-Fi has greater range compared to bluetooth and can provide huge outdoor range if a network incorporates a directional antenna.&lt;br /&gt;
&lt;br /&gt;
Wi-Fi began with IEEE standards for short range wireless broadband technology, and appointed the standard numbers: 802.11b(Wi-Fi), 802.11a and 802.11g (can interoperate with 802.11b). Typically Wi-Fi operates between 2.5 to 4Mbps, but can go as high as 11 Mbps.&lt;br /&gt;
&lt;br /&gt;
===Mobility===&lt;br /&gt;
Wi-Fi technology allows LANs to be deployed without cabling, potentially reducing the costs of network deployment and expansion. Spaces where cables cannont be run, such as outdoor areas or historical buildings can host wireless LANs. Wi-Fi technology increases the ease of setting up a network as well. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi networks support roaming, in which a mobile client station (like a laptop or smartphone) can move from one access point to another as the user moves. It is because Wi-Fi certified devices are able to interoperate that this is possible without complications as well.&lt;br /&gt;
&lt;br /&gt;
==Security==&lt;br /&gt;
The greatest security issue with Wi-Fi (and all other wireless networks) is the easy of connectivity compared to traditional wired networks like Ethernet. Wireless communication (bluetooth especially) is designed to be simple and easily connected to. To make an attack on a wired network, the attacker must physically connect to the internal network or break through an external firewall. External access however is usually disallowed by business networks in order to protect sensitive data. It is because firewall encryption could be broken that most business networks disallow external access. Getting wireless reception is considered an attack to most business networks.&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The nature most wireless networks is to allow external access in order to maintain an degree of usability. If attackers gain access to a wireless network they can harm the user in a variety of ways from monitoring others' activity to fabricating a DNS spoofing attack. &lt;br /&gt;
&lt;br /&gt;
===Preventative Measures===&lt;br /&gt;
[[Image:Wep.gif|thumb|The WEP encryption standard. The vunerabilities are shown by malicious software and a single key for all users on the network.]]&lt;br /&gt;
WEP (Wired Equivalent Privacy) keys uses a deprecated algorithm to secure Wireless networks. First introduced in 1997, WEP keys were intended to make wireless networks have comparable security to that of wired networks. A WEP key could be interpreted as a 26 digit password allowing access to a home network. There are several security flaws in the WEP keys currently being used and there exists readily available software (such as AirSnort or AirCrack) that can obtain a WEP key in minutes. WEP keys are now considered completely broken. The security flaws of WEP keys was first counteracted in 2002 with 'Wi-Fi Protected Access' (WPA) but the attack vector are now known. Now (as of 2004), full IEEE 802.11i (WPA2) encryption standards have been release and are still considered secure as of 2009. &lt;br /&gt;
&lt;br /&gt;
Another security measure in effect involves suppressing the Access Points' SSID broadcast to only allow a predefined set of MAC addresses the ability to join the network. This security measure has since proven ineffective, since if an allowed MAC address is known (or found out) by an attacker then they could potentially change their own MAC address to spoof as an allowed machine.  &lt;br /&gt;
&lt;br /&gt;
===DNS Spoofing and Kaminsky Attack===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Piggybacking===&lt;br /&gt;
Piggybacking refers to accessing a wireless internet connection by bringing a wireless device in range of another connection and using the service without the owners knowledge or permission. Piggybacking is completely outlawed in some jurisdictions, but allowed in others. It is not considered piggybacking if a bussiness offers a Wi-Fi hotspot for free or as a pay service. &lt;br /&gt;
&lt;br /&gt;
Piggybacking ofter goes unnoticed since most people only use a fraction of their upstream bandwidth. Piggybacking may also be carried out unintentionally, as most access points are configured without encryption (WPA2) and operating systems can automatically connect to wireless networks. The danger in piggybacking exists in users logging into an insecure network where illicit activity is conducted (danger for network owner) or sensitive information is broadcast (danger for user).&lt;br /&gt;
&lt;br /&gt;
===The Wi-Fi Scam, Home Security Scam and Bluetooth Scam===&lt;br /&gt;
'The Real Hustle' a UK television show is premised as an educational program demonstrating how people are getting ripped-off by confidence men around the world. The hustlers demonstrate how easy it is to gain access to a Wireless network through various scams. &lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=jqic_aY3TqQ&amp;amp;feature=related Wi-Fi Scam], the hustlers hijack a wireless network then rename their own wireless network and route people to a dummy site that looks completely legitimate. &lt;br /&gt;
&lt;br /&gt;
In the Home Security Scam, the hustlers walk through a residential neighborhood and enter home wireless networks by either hacking WEP keys or finding an unlocked network. The hustlers then monitor others online activity.&lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=gvDp-DBh4Gc&amp;amp;feature=related Bluetooth Scam], the hustlers scan a shopping mall for bluetooth signals from mobile phones. Once a signal is found and a connection is made, the hustlers call their premium rate line and rack up a bill for the cell phone owner.&lt;br /&gt;
&lt;br /&gt;
There exists dozens of tutorials on the Internet on how to use Wi-Fi for illicit purposes, demonstrating just how vunerable a wireless network is.&lt;br /&gt;
&lt;br /&gt;
==Other 802 Standards and Amendments==&lt;br /&gt;
[http://en.wikipedia.org/wiki/IEEE_802 See: IEEE 802 Wiki]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
# Comer, D. E. (2006). Wi-Fi. ''Internetworking with TCP/IP'' (Fifth ed., pp. 419-441). Upper Saddle River, NJ: Pearson Prentice Hall.&lt;br /&gt;
# &amp;quot;[http://www.wilcorpinc.com/wifi_history.htm Wi-Fi History]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# &amp;quot;[http://networkbits.net/wireless-printing/80211-g-pros-cons-of-a-wireless-network-in-a-business-environment/ Pros and Cons...]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Denial_Of_Service_Attacks Denial of Service Attacks]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Security_for_Small_Home_Networks Security for Small Home Networks]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Peer_To_Peer_Network_Security Peer To Peer Network Security]&lt;br /&gt;
* [http://www.cas.mcmaster.ca/wiki/index.php/Man_in_the_Middle_Attack Man in the Middle Attacks]&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Hamilr3|Hamilr3]] 00:51, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Wi-Fi</id>
		<title>Wi-Fi</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Wi-Fi"/>
				<updated>2009-04-12T04:23:16Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Wifilogo.jpg|thumb|Wi-Fi logo]]&lt;br /&gt;
''Wi-Fi is a consortium that verifies 802.11b wireless network products interoperate, and a marketing term vendors use to sell their products.''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Wi-Fi is a subsection of the IEEE 802, a subcategory in the link layer of the TCP/IP [[The Five-Layer TCP/IP Model: Description/Attacks/Defense|Internet Protocol Suite]]. The Wi-Fi alliance is a trade group that owns the 'Wi-Fi' trademark, a symbol that certifies interoperability between wireless devices. Not every Internet product is Wi-Fi certified however, and there exists many devices that are able to interoperate wirelessly without the Wi-Fi logo. Some products have chosen to omit having Wi-Fi certification to avoid paying certification costs.&lt;br /&gt;
&lt;br /&gt;
The use of Wi-Fi has boomed in recent years and is supported by a multitude of different devices. Laptops. game consoles, smartphones, printers and other peripherals usually have Wi-Fi certification. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
[[Image:Metro Wireless Node.jpg|thumb|A municipal wireless antenna. Such devices are integral in creating a mesh network of access points. ]]&lt;br /&gt;
Wi-Fi was invented by Vic Hayes (dubbed 'the father of Wi-Fi') at the NCR Corporation/AT &amp;amp; T (later Lucent &amp;amp; Agere Systems), in 1991. Hayes had been designing IEEE standards for 802.11b, 802.11a and 802.11g and subsequent technology, initially meant for cashier systems. NCR initially released the technology under the name of 'WaveLAN' which operated in a range of 1Mbps-2 Mbps. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; The Wi-Fi alliance was created soon after the technology. &lt;br /&gt;
&lt;br /&gt;
The alliance is a consortium of separate, independent companies that promotes and develops IEEE 802.11 standards. The alliance also tests products to establish interoperability and certifies products that pass. The 'Wi-Fi' logo is allowed to be used by manufacturers who subscribe to the alliance and whose products pass testing. There exists sever unofficial &amp;quot;Wi-Fi&amp;quot; products that may work, but lack true certification.&lt;br /&gt;
&lt;br /&gt;
The term &amp;quot;Wi-Fi&amp;quot; was coined by Interbrand Corporation in August 1999 when hired by the Alliance to change the name from 'IEEE 802.11b Direct Sequence.' Interbrand also created the official 'Wi-Fi' logo. It is often assumed that Wi-Fi stands for &amp;quot;Wireless Fidelity&amp;quot;, however officially Wi-Fi is an abstract term and the Wi-Fi alliance is trying to downplay any association to &amp;quot;Hi-Fi&amp;quot; (High Fidelity).&lt;br /&gt;
&lt;br /&gt;
Many cities globally, have announced plans for a city-wide Wi-Fi network. Many such project have since been cancelled due to unforseen difficulties however, a few (such as Sunnyvale, California) were successful. The city-wide networks were created by meshing several wireless antenna together and effectively creating a very large hotspot.&lt;br /&gt;
&lt;br /&gt;
==Uses==&lt;br /&gt;
There are typically two ses for Wi-Fi: it can be used as an access technology whereby a single base station (access point) accomodates multiple clients, or it can be used in a point-to-point configuration, connecting exactly 2 access points. The latter is typically reserved for standard 802.16 (Wi-Max) and used by network providers or corporations to connect two sites. &lt;br /&gt;
&lt;br /&gt;
A Wi-Fi enabled device can connect to the internet if the access point it reaches is part of a network containing the internet. A wi-Fi enabled device can essentially use the internet for any networking purpose. &lt;br /&gt;
&lt;br /&gt;
There exists many wireless 'hotspots' which integrate one or more access points and the hotspots can span a range of a few meters to several kilometers( Sunnyvale, California for example, offers free city-wide Wi-Fi). Many businesses offer wireless hotspots as either free or pay services in order to attract customers. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi devices can operate in different modes such as peer-to-peer mode, which allows a direct connection between two people. In ad-hoc mode Wi-Fi devices are able to make client-to-client connections without a router. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi can enable wireless voice application (VoIP). The widespread growth of Wi-Fi now allows access to the internet outside 'traditional' setups (such as the bathroom). Wi-Fi installations can ultimately provide: a sequre computer networking gateway, firewall, DHCP server, intrusion detection system and many other services.&lt;br /&gt;
&lt;br /&gt;
==Advantages and Challenges==&lt;br /&gt;
Wi-Fi uses an unlicensed radio spectrum (unlike packet radio systems) and does not require regulatory approval for individual developers, which makes Wi-Fi products widely available. Different brands are able to make products that are interoperable at a basic service level because of the technological foundations in Wi-Fi. Competition amounsts vendors has also considerably lowered prices of Wi-Fi products, and they continue to drop as technology improves. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi  allows local area networks (LANs) to be set up without wires, which simultaneously lowers costs (of creating and exapnding) and allows much freedom in where a network can be accessed. The Wi-Fi certification aheres to a global set of standards as well so Wi-Fi products are compatible in any region. &lt;br /&gt;
&lt;br /&gt;
===Range===&lt;br /&gt;
[[Image:Point-to-point-wifi-antenna.jpg|thumb|A point-to-point parabolic Wi-Fi antenna. Such devices can dramatically increase the range of a Wi-Fi network (in a single direction). The devices may be costly to buy and run however.]]&lt;br /&gt;
&lt;br /&gt;
Typically a Wi-Fi router in a home setup with a 802.11b stock antenna has a range of about 32m indoors (due to barriers like walls) and about 95m with no obstructions, outdoors. The frequency block a router uses also affects the range: 2.4GHz has a greater range than 5 GHz. Wi-Fi has greater range compared to bluetooth and can provide huge outdoor range if a network incorporates a directional antenna.&lt;br /&gt;
&lt;br /&gt;
Wi-Fi began with IEEE standards for short range wireless broadband technology, and appointed the standard numbers: 802.11b(Wi-Fi), 802.11a and 802.11g (can interoperate with 802.11b). Typically Wi-Fi operates between 2.5 to 4Mbps, but can go as high as 11 Mbps.&lt;br /&gt;
&lt;br /&gt;
===Mobility===&lt;br /&gt;
Wi-Fi technology allows LANs to be deployed without cabling, potentially reducing the costs of network deployment and expansion. Spaces where cables cannont be run, such as outdoor areas or historical buildings can host wireless LANs. Wi-Fi technology increases the ease of setting up a network as well. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi networks support roaming, in which a mobile client station (like a laptop or smartphone) can move from one access point to another as the user moves. It is because Wi-Fi certified devices are able to interoperate that this is possible without complications as well.&lt;br /&gt;
&lt;br /&gt;
==Security==&lt;br /&gt;
The greatest security issue with Wi-Fi (and all other wireless networks) is the easy of connectivity compared to traditional wired networks like Ethernet. Wireless communication (bluetooth especially) is designed to be simple and easily connected to. To make an attack on a wired network, the attacker must physically connect to the internal network or break through an external firewall. External access however is usually disallowed by business networks in order to protect sensitive data. It is because firewall encryption could be broken that most business networks disallow external access. Getting wireless reception is considered an attack to most business networks.&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The nature most wireless networks is to allow external access in order to maintain an degree of usability. If attackers gain access to a wireless network they can harm the user in a variety of ways from monitoring others' activity to fabricating a DNS spoofing attack. &lt;br /&gt;
&lt;br /&gt;
===Preventative Measures===&lt;br /&gt;
[[Image:Wep.gif|thumb|The WEP encryption standard. The vunerabilities are shown by malicious software and a single key for all users on the network.]]&lt;br /&gt;
WEP (Wired Equivalent Privacy) keys uses a deprecated algorithm to secure Wireless networks. First introduced in 1997, WEP keys were intended to make wireless networks have comparable security to that of wired networks. A WEP key could be interpreted as a 26 digit password allowing access to a home network. There are several security flaws in the WEP keys currently being used and there exists readily available software (such as AirSnort or AirCrack) that can obtain a WEP key in minutes. WEP keys are now considered completely broken. The security flaws of WEP keys was first counteracted in 2002 with 'Wi-Fi Protected Access' (WPA) but the attack vector are now known. Now (as of 2004), full IEEE 802.11i (WPA2) encryption standards have been release and are still considered secure as of 2009. &lt;br /&gt;
&lt;br /&gt;
Another security measure in effect involves suppressing the Access Points' SSID broadcast to only allow a predefined set of MAC addresses the ability to join the network. This security measure has since proven ineffective, since if an allowed MAC address is known (or found out) by an attacker then they could potentially change their own MAC address to spoof as an allowed machine.  &lt;br /&gt;
&lt;br /&gt;
===DNS Spoofing and Kaminsky Attack===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Piggybacking===&lt;br /&gt;
Piggybacking refers to accessing a wireless internet connection by bringing a wireless device in range of another connection and using the service without the owners knowledge or permission. Piggybacking is completely outlawed in some jurisdictions, but allowed in others. It is not considered piggybacking if a bussiness offers a Wi-Fi hotspot for free or as a pay service. &lt;br /&gt;
&lt;br /&gt;
Piggybacking ofter goes unnoticed since most people only use a fraction of their upstream bandwidth. Piggybacking may also be carried out unintentionally, as most access points are configured without encryption (WPA2) and operating systems can automatically connect to wireless networks. The danger in piggybacking exists in users logging into an insecure network where illicit activity is conducted (danger for network owner) or sensitive information is broadcast (danger for user).&lt;br /&gt;
&lt;br /&gt;
===The Wi-Fi Scam, Home Security Scam and Bluetooth Scam===&lt;br /&gt;
'The Real Hustle' a UK television show is premised as an educational program demonstrating how people are getting ripped-off by confidence men around the world. The hustlers demonstrate how easy it is to gain access to a Wireless network through various scams. &lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=jqic_aY3TqQ&amp;amp;feature=related Wi-Fi Scam], the hustlers hijack a wireless network then rename their own wireless network and route people to a dummy site that looks completely legitimate. &lt;br /&gt;
&lt;br /&gt;
In the Home Security Scam, the hustlers walk through a residential neighborhood and enter home wireless networks by either hacking WEP keys or finding an unlocked network. The hustlers then monitor others online activity.&lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=gvDp-DBh4Gc&amp;amp;feature=related Bluetooth Scam], the hustlers scan a shopping mall for bluetooth signals from mobile phones. Once a signal is found and a connection is made, the hustlers call their premium rate line and rack up a bill for the cell phone owner.&lt;br /&gt;
&lt;br /&gt;
There exists dozens of tutorials on the Internet on how to use Wi-Fi for illicit purposes, demonstrating just how vunerable a wireless network is.&lt;br /&gt;
&lt;br /&gt;
==Other 802 Standards and Amendments==&lt;br /&gt;
[http://en.wikipedia.org/wiki/IEEE_802 See: IEEE 802 Wiki]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
# Comer, D. E. (2006). Wi-Fi. ''Internetworking with TCP/IP'' (Fifth ed., pp. 419-441). Upper Saddle River, NJ: Pearson Prentice Hall.&lt;br /&gt;
# &amp;quot;[http://www.wilcorpinc.com/wifi_history.htm Wi-Fi History]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# &amp;quot;[http://networkbits.net/wireless-printing/80211-g-pros-cons-of-a-wireless-network-in-a-business-environment/ Pros and Cons...]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Hamilr3|Hamilr3]] 00:51, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Wi-Fi</id>
		<title>Wi-Fi</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Wi-Fi"/>
				<updated>2009-04-12T04:22:21Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;/* Mobility */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Wifilogo.jpg|thumb|Wi-Fi logo]]&lt;br /&gt;
''Wi-Fi is a consortium that verifies 802.11b wireless network products interoperate, and a marketing term vendors use to sell their products.''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Wi-Fi is a subsection of the IEEE 802, a subcategory in the link layer of the TCP/IP [[The Five-Layer TCP/IP Model: Description/Attacks/Defense|Internet Protocol Suite]]. The Wi-Fi alliance is a trade group that owns the 'Wi-Fi' trademark, a symbol that certifies interoperability between wireless devices. Not every Internet product is Wi-Fi certified however, and there exists many devices that are able to interoperate wirelessly without the Wi-Fi logo. Some products have chosen to omit having Wi-Fi certification to avoid paying certification costs.&lt;br /&gt;
&lt;br /&gt;
The use of Wi-Fi has boomed in recent years and is supported by a multitude of different devices. Laptops. game consoles, smartphones, printers and other peripherals usually have Wi-Fi certification. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
[[Image:Metro Wireless Node.jpg|thumb|A municipal wireless antenna. Such devices are integral in creating a mesh network of access points. ]]&lt;br /&gt;
Wi-Fi was invented by Vic Hayes (dubbed 'the father of Wi-Fi') at the NCR Corporation/AT &amp;amp; T (later Lucent &amp;amp; Agere Systems), in 1991. Hayes had been designing IEEE standards for 802.11b, 802.11a and 802.11g and subsequent technology, initially meant for cashier systems. NCR initially released the technology under the name of 'WaveLAN' which operated in a range of 1Mbps-2 Mbps. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; The Wi-Fi alliance was created soon after the technology. &lt;br /&gt;
&lt;br /&gt;
The alliance is a consortium of separate, independent companies that promotes and develops IEEE 802.11 standards. The alliance also tests products to establish interoperability and certifies products that pass. The 'Wi-Fi' logo is allowed to be used by manufacturers who subscribe to the alliance and whose products pass testing. There exists sever unofficial &amp;quot;Wi-Fi&amp;quot; products that may work, but lack true certification.&lt;br /&gt;
&lt;br /&gt;
The term &amp;quot;Wi-Fi&amp;quot; was coined by Interbrand Corporation in August 1999 when hired by the Alliance to change the name from 'IEEE 802.11b Direct Sequence.' Interbrand also created the official 'Wi-Fi' logo. It is often assumed that Wi-Fi stands for &amp;quot;Wireless Fidelity&amp;quot;, however officially Wi-Fi is an abstract term and the Wi-Fi alliance is trying to downplay any association to &amp;quot;Hi-Fi&amp;quot; (High Fidelity).&lt;br /&gt;
&lt;br /&gt;
Many cities globally, have announced plans for a city-wide Wi-Fi network. Many such project have since been cancelled due to unforseen difficulties however, a few (such as Sunnyvale, California) were successful. The city-wide networks were created by meshing several wireless antenna together and effectively creating a very large hotspot.&lt;br /&gt;
&lt;br /&gt;
==Uses==&lt;br /&gt;
There are typically two ses for Wi-Fi: it can be used as an access technology whereby a single base station (access point) accomodates multiple clients, or it can be used in a point-to-point configuration, connecting exactly 2 access points. The latter is typically reserved for standard 802.16 (Wi-Max) and used by network providers or corporations to connect two sites. &lt;br /&gt;
&lt;br /&gt;
A Wi-Fi enabled device can connect to the internet if the access point it reaches is part of a network containing the internet. A wi-Fi enabled device can essentially use the internet for any networking purpose. &lt;br /&gt;
&lt;br /&gt;
There exists many wireless 'hotspots' which integrate one or more access points and the hotspots can span a range of a few meters to several kilometers( Sunnyvale, California for example, offers free city-wide Wi-Fi). Many businesses offer wireless hotspots as either free or pay services in order to attract customers. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi devices can operate in different modes such as peer-to-peer mode, which allows a direct connection between two people. In ad-hoc mode Wi-Fi devices are able to make client-to-client connections without a router. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi can enable wireless voice application (VoIP). The widespread growth of Wi-Fi now allows access to the internet outside 'traditional' setups (such as the bathroom). Wi-Fi installations can ultimately provide: a sequre computer networking gateway, firewall, DHCP server, intrusion detection system and many other services.&lt;br /&gt;
&lt;br /&gt;
==Advantages and Challenges==&lt;br /&gt;
Wi-Fi uses an unlicensed radio spectrum (unlike packet radio systems) and does not require regulatory approval for individual developers, which makes Wi-Fi products widely available. Different brands are able to make products that are interoperable at a basic service level because of the technological foundations in Wi-Fi. Competition amounsts vendors has also considerably lowered prices of Wi-Fi products, and they continue to drop as technology improves. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi  allows local area networks (LANs) to be set up without wires, which simultaneously lowers costs (of creating and exapnding) and allows much freedom in where a network can be accessed. The Wi-Fi certification aheres to a global set of standards as well so Wi-Fi products are compatible in any region. &lt;br /&gt;
&lt;br /&gt;
===Range===&lt;br /&gt;
[[Image:Point-to-point-wifi-antenna.jpg|thumb|A point-to-point parabolic Wi-Fi antenna. Such devices can dramatically increase the range of a Wi-Fi network (in a single direction). The devices may be costly to buy and run however.]]&lt;br /&gt;
&lt;br /&gt;
Typically a Wi-Fi router in a home setup with a 802.11b stock antenna has a range of about 32m indoors (due to barriers like walls) and about 95m with no obstructions, outdoors. The frequency block a router uses also affects the range: 2.4GHz has a greater range than 5 GHz. Wi-Fi has greater range compared to bluetooth and can provide huge outdoor range if a network incorporates a directional antenna.&lt;br /&gt;
&lt;br /&gt;
Wi-Fi began with IEEE standards for short range wireless broadband technology, and appointed the standard numbers: 802.11b(Wi-Fi), 802.11a and 802.11g (can interoperate with 802.11b). Typically Wi-Fi operates between 2.5 to 4Mbps, but can go as high as 11 Mbps.&lt;br /&gt;
&lt;br /&gt;
===Mobility===&lt;br /&gt;
Wi-Fi technology allows LANs to be deployed without cabling, potentially reducing the costs of network deployment and expansion. Spaces where cables cannont be run, such as outdoor areas or historical buildings can host wireless LANs. Wi-Fi technology increases the ease of setting up a network as well. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi networks support roaming, in which a mobile client station (like a laptop or smartphone) can move from one access point to another as the user moves. It is because Wi-Fi certified devices are able to interoperate that this is possible without complications as well.&lt;br /&gt;
&lt;br /&gt;
===Channel Pollution===&lt;br /&gt;
&lt;br /&gt;
==Security==&lt;br /&gt;
The greatest security issue with Wi-Fi (and all other wireless networks) is the easy of connectivity compared to traditional wired networks like Ethernet. Wireless communication (bluetooth especially) is designed to be simple and easily connected to. To make an attack on a wired network, the attacker must physically connect to the internal network or break through an external firewall. External access however is usually disallowed by business networks in order to protect sensitive data. It is because firewall encryption could be broken that most business networks disallow external access. Getting wireless reception is considered an attack to most business networks.&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The nature most wireless networks is to allow external access in order to maintain an degree of usability. If attackers gain access to a wireless network they can harm the user in a variety of ways from monitoring others' activity to fabricating a DNS spoofing attack. &lt;br /&gt;
&lt;br /&gt;
===Preventative Measures===&lt;br /&gt;
[[Image:Wep.gif|thumb|The WEP encryption standard. The vunerabilities are shown by malicious software and a single key for all users on the network.]]&lt;br /&gt;
WEP (Wired Equivalent Privacy) keys uses a deprecated algorithm to secure Wireless networks. First introduced in 1997, WEP keys were intended to make wireless networks have comparable security to that of wired networks. A WEP key could be interpreted as a 26 digit password allowing access to a home network. There are several security flaws in the WEP keys currently being used and there exists readily available software (such as AirSnort or AirCrack) that can obtain a WEP key in minutes. WEP keys are now considered completely broken. The security flaws of WEP keys was first counteracted in 2002 with 'Wi-Fi Protected Access' (WPA) but the attack vector are now known. Now (as of 2004), full IEEE 802.11i (WPA2) encryption standards have been release and are still considered secure as of 2009. &lt;br /&gt;
&lt;br /&gt;
Another security measure in effect involves suppressing the Access Points' SSID broadcast to only allow a predefined set of MAC addresses the ability to join the network. This security measure has since proven ineffective, since if an allowed MAC address is known (or found out) by an attacker then they could potentially change their own MAC address to spoof as an allowed machine.  &lt;br /&gt;
&lt;br /&gt;
===DNS Spoofing and Kaminsky Attack===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Piggybacking===&lt;br /&gt;
Piggybacking refers to accessing a wireless internet connection by bringing a wireless device in range of another connection and using the service without the owners knowledge or permission. Piggybacking is completely outlawed in some jurisdictions, but allowed in others. It is not considered piggybacking if a bussiness offers a Wi-Fi hotspot for free or as a pay service. &lt;br /&gt;
&lt;br /&gt;
Piggybacking ofter goes unnoticed since most people only use a fraction of their upstream bandwidth. Piggybacking may also be carried out unintentionally, as most access points are configured without encryption (WPA2) and operating systems can automatically connect to wireless networks. The danger in piggybacking exists in users logging into an insecure network where illicit activity is conducted (danger for network owner) or sensitive information is broadcast (danger for user).&lt;br /&gt;
&lt;br /&gt;
===The Wi-Fi Scam, Home Security Scam and Bluetooth Scam===&lt;br /&gt;
'The Real Hustle' a UK television show is premised as an educational program demonstrating how people are getting ripped-off by confidence men around the world. The hustlers demonstrate how easy it is to gain access to a Wireless network through various scams. &lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=jqic_aY3TqQ&amp;amp;feature=related Wi-Fi Scam], the hustlers hijack a wireless network then rename their own wireless network and route people to a dummy site that looks completely legitimate. &lt;br /&gt;
&lt;br /&gt;
In the Home Security Scam, the hustlers walk through a residential neighborhood and enter home wireless networks by either hacking WEP keys or finding an unlocked network. The hustlers then monitor others online activity.&lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=gvDp-DBh4Gc&amp;amp;feature=related Bluetooth Scam], the hustlers scan a shopping mall for bluetooth signals from mobile phones. Once a signal is found and a connection is made, the hustlers call their premium rate line and rack up a bill for the cell phone owner.&lt;br /&gt;
&lt;br /&gt;
There exists dozens of tutorials on the Internet on how to use Wi-Fi for illicit purposes, demonstrating just how vunerable a wireless network is.&lt;br /&gt;
&lt;br /&gt;
==Other 802 Standards and Amendments==&lt;br /&gt;
[http://en.wikipedia.org/wiki/IEEE_802 See: IEEE 802 Wiki]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
# Comer, D. E. (2006). Wi-Fi. ''Internetworking with TCP/IP'' (Fifth ed., pp. 419-441). Upper Saddle River, NJ: Pearson Prentice Hall.&lt;br /&gt;
# &amp;quot;[http://www.wilcorpinc.com/wifi_history.htm Wi-Fi History]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# &amp;quot;[http://networkbits.net/wireless-printing/80211-g-pros-cons-of-a-wireless-network-in-a-business-environment/ Pros and Cons...]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Hamilr3|Hamilr3]] 00:51, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Wi-Fi</id>
		<title>Wi-Fi</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Wi-Fi"/>
				<updated>2009-04-12T04:17:59Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;/* Range */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Wifilogo.jpg|thumb|Wi-Fi logo]]&lt;br /&gt;
''Wi-Fi is a consortium that verifies 802.11b wireless network products interoperate, and a marketing term vendors use to sell their products.''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Wi-Fi is a subsection of the IEEE 802, a subcategory in the link layer of the TCP/IP [[The Five-Layer TCP/IP Model: Description/Attacks/Defense|Internet Protocol Suite]]. The Wi-Fi alliance is a trade group that owns the 'Wi-Fi' trademark, a symbol that certifies interoperability between wireless devices. Not every Internet product is Wi-Fi certified however, and there exists many devices that are able to interoperate wirelessly without the Wi-Fi logo. Some products have chosen to omit having Wi-Fi certification to avoid paying certification costs.&lt;br /&gt;
&lt;br /&gt;
The use of Wi-Fi has boomed in recent years and is supported by a multitude of different devices. Laptops. game consoles, smartphones, printers and other peripherals usually have Wi-Fi certification. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
[[Image:Metro Wireless Node.jpg|thumb|A municipal wireless antenna. Such devices are integral in creating a mesh network of access points. ]]&lt;br /&gt;
Wi-Fi was invented by Vic Hayes (dubbed 'the father of Wi-Fi') at the NCR Corporation/AT &amp;amp; T (later Lucent &amp;amp; Agere Systems), in 1991. Hayes had been designing IEEE standards for 802.11b, 802.11a and 802.11g and subsequent technology, initially meant for cashier systems. NCR initially released the technology under the name of 'WaveLAN' which operated in a range of 1Mbps-2 Mbps. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; The Wi-Fi alliance was created soon after the technology. &lt;br /&gt;
&lt;br /&gt;
The alliance is a consortium of separate, independent companies that promotes and develops IEEE 802.11 standards. The alliance also tests products to establish interoperability and certifies products that pass. The 'Wi-Fi' logo is allowed to be used by manufacturers who subscribe to the alliance and whose products pass testing. There exists sever unofficial &amp;quot;Wi-Fi&amp;quot; products that may work, but lack true certification.&lt;br /&gt;
&lt;br /&gt;
The term &amp;quot;Wi-Fi&amp;quot; was coined by Interbrand Corporation in August 1999 when hired by the Alliance to change the name from 'IEEE 802.11b Direct Sequence.' Interbrand also created the official 'Wi-Fi' logo. It is often assumed that Wi-Fi stands for &amp;quot;Wireless Fidelity&amp;quot;, however officially Wi-Fi is an abstract term and the Wi-Fi alliance is trying to downplay any association to &amp;quot;Hi-Fi&amp;quot; (High Fidelity).&lt;br /&gt;
&lt;br /&gt;
Many cities globally, have announced plans for a city-wide Wi-Fi network. Many such project have since been cancelled due to unforseen difficulties however, a few (such as Sunnyvale, California) were successful. The city-wide networks were created by meshing several wireless antenna together and effectively creating a very large hotspot.&lt;br /&gt;
&lt;br /&gt;
==Uses==&lt;br /&gt;
There are typically two ses for Wi-Fi: it can be used as an access technology whereby a single base station (access point) accomodates multiple clients, or it can be used in a point-to-point configuration, connecting exactly 2 access points. The latter is typically reserved for standard 802.16 (Wi-Max) and used by network providers or corporations to connect two sites. &lt;br /&gt;
&lt;br /&gt;
A Wi-Fi enabled device can connect to the internet if the access point it reaches is part of a network containing the internet. A wi-Fi enabled device can essentially use the internet for any networking purpose. &lt;br /&gt;
&lt;br /&gt;
There exists many wireless 'hotspots' which integrate one or more access points and the hotspots can span a range of a few meters to several kilometers( Sunnyvale, California for example, offers free city-wide Wi-Fi). Many businesses offer wireless hotspots as either free or pay services in order to attract customers. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi devices can operate in different modes such as peer-to-peer mode, which allows a direct connection between two people. In ad-hoc mode Wi-Fi devices are able to make client-to-client connections without a router. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi can enable wireless voice application (VoIP). The widespread growth of Wi-Fi now allows access to the internet outside 'traditional' setups (such as the bathroom). Wi-Fi installations can ultimately provide: a sequre computer networking gateway, firewall, DHCP server, intrusion detection system and many other services.&lt;br /&gt;
&lt;br /&gt;
==Advantages and Challenges==&lt;br /&gt;
Wi-Fi uses an unlicensed radio spectrum (unlike packet radio systems) and does not require regulatory approval for individual developers, which makes Wi-Fi products widely available. Different brands are able to make products that are interoperable at a basic service level because of the technological foundations in Wi-Fi. Competition amounsts vendors has also considerably lowered prices of Wi-Fi products, and they continue to drop as technology improves. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi  allows local area networks (LANs) to be set up without wires, which simultaneously lowers costs (of creating and exapnding) and allows much freedom in where a network can be accessed. The Wi-Fi certification aheres to a global set of standards as well so Wi-Fi products are compatible in any region. &lt;br /&gt;
&lt;br /&gt;
===Range===&lt;br /&gt;
[[Image:Point-to-point-wifi-antenna.jpg|thumb|A point-to-point parabolic Wi-Fi antenna. Such devices can dramatically increase the range of a Wi-Fi network (in a single direction). The devices may be costly to buy and run however.]]&lt;br /&gt;
&lt;br /&gt;
Typically a Wi-Fi router in a home setup with a 802.11b stock antenna has a range of about 32m indoors (due to barriers like walls) and about 95m with no obstructions, outdoors. The frequency block a router uses also affects the range: 2.4GHz has a greater range than 5 GHz. Wi-Fi has greater range compared to bluetooth and can provide huge outdoor range if a network incorporates a directional antenna.&lt;br /&gt;
&lt;br /&gt;
Wi-Fi began with IEEE standards for short range wireless broadband technology, and appointed the standard numbers: 802.11b(Wi-Fi), 802.11a and 802.11g (can interoperate with 802.11b). Typically Wi-Fi operates between 2.5 to 4Mbps, but can go as high as 11 Mbps.&lt;br /&gt;
&lt;br /&gt;
===Mobility===&lt;br /&gt;
&lt;br /&gt;
===Channel Pollution===&lt;br /&gt;
&lt;br /&gt;
==Security==&lt;br /&gt;
The greatest security issue with Wi-Fi (and all other wireless networks) is the easy of connectivity compared to traditional wired networks like Ethernet. Wireless communication (bluetooth especially) is designed to be simple and easily connected to. To make an attack on a wired network, the attacker must physically connect to the internal network or break through an external firewall. External access however is usually disallowed by business networks in order to protect sensitive data. It is because firewall encryption could be broken that most business networks disallow external access. Getting wireless reception is considered an attack to most business networks.&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The nature most wireless networks is to allow external access in order to maintain an degree of usability. If attackers gain access to a wireless network they can harm the user in a variety of ways from monitoring others' activity to fabricating a DNS spoofing attack. &lt;br /&gt;
&lt;br /&gt;
===Preventative Measures===&lt;br /&gt;
[[Image:Wep.gif|thumb|The WEP encryption standard. The vunerabilities are shown by malicious software and a single key for all users on the network.]]&lt;br /&gt;
WEP (Wired Equivalent Privacy) keys uses a deprecated algorithm to secure Wireless networks. First introduced in 1997, WEP keys were intended to make wireless networks have comparable security to that of wired networks. A WEP key could be interpreted as a 26 digit password allowing access to a home network. There are several security flaws in the WEP keys currently being used and there exists readily available software (such as AirSnort or AirCrack) that can obtain a WEP key in minutes. WEP keys are now considered completely broken. The security flaws of WEP keys was first counteracted in 2002 with 'Wi-Fi Protected Access' (WPA) but the attack vector are now known. Now (as of 2004), full IEEE 802.11i (WPA2) encryption standards have been release and are still considered secure as of 2009. &lt;br /&gt;
&lt;br /&gt;
Another security measure in effect involves suppressing the Access Points' SSID broadcast to only allow a predefined set of MAC addresses the ability to join the network. This security measure has since proven ineffective, since if an allowed MAC address is known (or found out) by an attacker then they could potentially change their own MAC address to spoof as an allowed machine.  &lt;br /&gt;
&lt;br /&gt;
===DNS Spoofing and Kaminsky Attack===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Piggybacking===&lt;br /&gt;
Piggybacking refers to accessing a wireless internet connection by bringing a wireless device in range of another connection and using the service without the owners knowledge or permission. Piggybacking is completely outlawed in some jurisdictions, but allowed in others. It is not considered piggybacking if a bussiness offers a Wi-Fi hotspot for free or as a pay service. &lt;br /&gt;
&lt;br /&gt;
Piggybacking ofter goes unnoticed since most people only use a fraction of their upstream bandwidth. Piggybacking may also be carried out unintentionally, as most access points are configured without encryption (WPA2) and operating systems can automatically connect to wireless networks. The danger in piggybacking exists in users logging into an insecure network where illicit activity is conducted (danger for network owner) or sensitive information is broadcast (danger for user).&lt;br /&gt;
&lt;br /&gt;
===The Wi-Fi Scam, Home Security Scam and Bluetooth Scam===&lt;br /&gt;
'The Real Hustle' a UK television show is premised as an educational program demonstrating how people are getting ripped-off by confidence men around the world. The hustlers demonstrate how easy it is to gain access to a Wireless network through various scams. &lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=jqic_aY3TqQ&amp;amp;feature=related Wi-Fi Scam], the hustlers hijack a wireless network then rename their own wireless network and route people to a dummy site that looks completely legitimate. &lt;br /&gt;
&lt;br /&gt;
In the Home Security Scam, the hustlers walk through a residential neighborhood and enter home wireless networks by either hacking WEP keys or finding an unlocked network. The hustlers then monitor others online activity.&lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=gvDp-DBh4Gc&amp;amp;feature=related Bluetooth Scam], the hustlers scan a shopping mall for bluetooth signals from mobile phones. Once a signal is found and a connection is made, the hustlers call their premium rate line and rack up a bill for the cell phone owner.&lt;br /&gt;
&lt;br /&gt;
There exists dozens of tutorials on the Internet on how to use Wi-Fi for illicit purposes, demonstrating just how vunerable a wireless network is.&lt;br /&gt;
&lt;br /&gt;
==Other 802 Standards and Amendments==&lt;br /&gt;
[http://en.wikipedia.org/wiki/IEEE_802 See: IEEE 802 Wiki]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
# Comer, D. E. (2006). Wi-Fi. ''Internetworking with TCP/IP'' (Fifth ed., pp. 419-441). Upper Saddle River, NJ: Pearson Prentice Hall.&lt;br /&gt;
# &amp;quot;[http://www.wilcorpinc.com/wifi_history.htm Wi-Fi History]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# &amp;quot;[http://networkbits.net/wireless-printing/80211-g-pros-cons-of-a-wireless-network-in-a-business-environment/ Pros and Cons...]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Hamilr3|Hamilr3]] 00:51, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Wi-Fi</id>
		<title>Wi-Fi</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Wi-Fi"/>
				<updated>2009-04-12T03:20:28Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;/* Range */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Wifilogo.jpg|thumb|Wi-Fi logo]]&lt;br /&gt;
''Wi-Fi is a consortium that verifies 802.11b wireless network products interoperate, and a marketing term vendors use to sell their products.''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Wi-Fi is a subsection of the IEEE 802, a subcategory in the link layer of the TCP/IP [[The Five-Layer TCP/IP Model: Description/Attacks/Defense|Internet Protocol Suite]]. The Wi-Fi alliance is a trade group that owns the 'Wi-Fi' trademark, a symbol that certifies interoperability between wireless devices. Not every Internet product is Wi-Fi certified however, and there exists many devices that are able to interoperate wirelessly without the Wi-Fi logo. Some products have chosen to omit having Wi-Fi certification to avoid paying certification costs.&lt;br /&gt;
&lt;br /&gt;
The use of Wi-Fi has boomed in recent years and is supported by a multitude of different devices. Laptops. game consoles, smartphones, printers and other peripherals usually have Wi-Fi certification. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
[[Image:Metro Wireless Node.jpg|thumb|A municipal wireless antenna. Such devices are integral in creating a mesh network of access points. ]]&lt;br /&gt;
Wi-Fi was invented by Vic Hayes (dubbed 'the father of Wi-Fi') at the NCR Corporation/AT &amp;amp; T (later Lucent &amp;amp; Agere Systems), in 1991. Hayes had been designing IEEE standards for 802.11b, 802.11a and 802.11g and subsequent technology, initially meant for cashier systems. NCR initially released the technology under the name of 'WaveLAN' which operated in a range of 1Mbps-2 Mbps. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; The Wi-Fi alliance was created soon after the technology. &lt;br /&gt;
&lt;br /&gt;
The alliance is a consortium of separate, independent companies that promotes and develops IEEE 802.11 standards. The alliance also tests products to establish interoperability and certifies products that pass. The 'Wi-Fi' logo is allowed to be used by manufacturers who subscribe to the alliance and whose products pass testing. There exists sever unofficial &amp;quot;Wi-Fi&amp;quot; products that may work, but lack true certification.&lt;br /&gt;
&lt;br /&gt;
The term &amp;quot;Wi-Fi&amp;quot; was coined by Interbrand Corporation in August 1999 when hired by the Alliance to change the name from 'IEEE 802.11b Direct Sequence.' Interbrand also created the official 'Wi-Fi' logo. It is often assumed that Wi-Fi stands for &amp;quot;Wireless Fidelity&amp;quot;, however officially Wi-Fi is an abstract term and the Wi-Fi alliance is trying to downplay any association to &amp;quot;Hi-Fi&amp;quot; (High Fidelity).&lt;br /&gt;
&lt;br /&gt;
Many cities globally, have announced plans for a city-wide Wi-Fi network. Many such project have since been cancelled due to unforseen difficulties however, a few (such as Sunnyvale, California) were successful. The city-wide networks were created by meshing several wireless antenna together and effectively creating a very large hotspot.&lt;br /&gt;
&lt;br /&gt;
==Uses==&lt;br /&gt;
There are typically two ses for Wi-Fi: it can be used as an access technology whereby a single base station (access point) accomodates multiple clients, or it can be used in a point-to-point configuration, connecting exactly 2 access points. The latter is typically reserved for standard 802.16 (Wi-Max) and used by network providers or corporations to connect two sites. &lt;br /&gt;
&lt;br /&gt;
A Wi-Fi enabled device can connect to the internet if the access point it reaches is part of a network containing the internet. A wi-Fi enabled device can essentially use the internet for any networking purpose. &lt;br /&gt;
&lt;br /&gt;
There exists many wireless 'hotspots' which integrate one or more access points and the hotspots can span a range of a few meters to several kilometers( Sunnyvale, California for example, offers free city-wide Wi-Fi). Many businesses offer wireless hotspots as either free or pay services in order to attract customers. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi devices can operate in different modes such as peer-to-peer mode, which allows a direct connection between two people. In ad-hoc mode Wi-Fi devices are able to make client-to-client connections without a router. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi can enable wireless voice application (VoIP). The widespread growth of Wi-Fi now allows access to the internet outside 'traditional' setups (such as the bathroom). Wi-Fi installations can ultimately provide: a sequre computer networking gateway, firewall, DHCP server, intrusion detection system and many other services.&lt;br /&gt;
&lt;br /&gt;
==Advantages and Challenges==&lt;br /&gt;
Wi-Fi uses an unlicensed radio spectrum (unlike packet radio systems) and does not require regulatory approval for individual developers, which makes Wi-Fi products widely available. Different brands are able to make products that are interoperable at a basic service level because of the technological foundations in Wi-Fi. Competition amounsts vendors has also considerably lowered prices of Wi-Fi products, and they continue to drop as technology improves. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi  allows local area networks (LANs) to be set up without wires, which simultaneously lowers costs (of creating and exapnding) and allows much freedom in where a network can be accessed. The Wi-Fi certification aheres to a global set of standards as well so Wi-Fi products are compatible in any region. &lt;br /&gt;
&lt;br /&gt;
===Range===&lt;br /&gt;
[[Image:Point-to-point-wifi-antenna.jpg|thumb|A point-to-point parabolic Wi-Fi antenna. Such devices can dramatically increase the range of a Wi-Fi network (in a single direction). The devices may be costly to buy and run however.]]&lt;br /&gt;
&lt;br /&gt;
Typically a Wi-Fi router in a home setup with a 802.11b stock antenna has a range of about 32m indoors (due to barriers like walls) and about 95m with no obstructions, outdoors. The frequency block a router uses also affects the range: 2.4GHz has a greater range than 5 GHz. Wi-Fi has greater range compared to bluetooth and can provide huge outdoor range if a network incorporates a directional antenna.&lt;br /&gt;
&lt;br /&gt;
===Mobility===&lt;br /&gt;
&lt;br /&gt;
===Channel Pollution===&lt;br /&gt;
&lt;br /&gt;
==Security==&lt;br /&gt;
The greatest security issue with Wi-Fi (and all other wireless networks) is the easy of connectivity compared to traditional wired networks like Ethernet. Wireless communication (bluetooth especially) is designed to be simple and easily connected to. To make an attack on a wired network, the attacker must physically connect to the internal network or break through an external firewall. External access however is usually disallowed by business networks in order to protect sensitive data. It is because firewall encryption could be broken that most business networks disallow external access. Getting wireless reception is considered an attack to most business networks.&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The nature most wireless networks is to allow external access in order to maintain an degree of usability. If attackers gain access to a wireless network they can harm the user in a variety of ways from monitoring others' activity to fabricating a DNS spoofing attack. &lt;br /&gt;
&lt;br /&gt;
===Preventative Measures===&lt;br /&gt;
[[Image:Wep.gif|thumb|The WEP encryption standard. The vunerabilities are shown by malicious software and a single key for all users on the network.]]&lt;br /&gt;
WEP (Wired Equivalent Privacy) keys uses a deprecated algorithm to secure Wireless networks. First introduced in 1997, WEP keys were intended to make wireless networks have comparable security to that of wired networks. A WEP key could be interpreted as a 26 digit password allowing access to a home network. There are several security flaws in the WEP keys currently being used and there exists readily available software (such as AirSnort or AirCrack) that can obtain a WEP key in minutes. WEP keys are now considered completely broken. The security flaws of WEP keys was first counteracted in 2002 with 'Wi-Fi Protected Access' (WPA) but the attack vector are now known. Now (as of 2004), full IEEE 802.11i (WPA2) encryption standards have been release and are still considered secure as of 2009. &lt;br /&gt;
&lt;br /&gt;
Another security measure in effect involves suppressing the Access Points' SSID broadcast to only allow a predefined set of MAC addresses the ability to join the network. This security measure has since proven ineffective, since if an allowed MAC address is known (or found out) by an attacker then they could potentially change their own MAC address to spoof as an allowed machine.  &lt;br /&gt;
&lt;br /&gt;
===DNS Spoofing and Kaminsky Attack===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Piggybacking===&lt;br /&gt;
Piggybacking refers to accessing a wireless internet connection by bringing a wireless device in range of another connection and using the service without the owners knowledge or permission. Piggybacking is completely outlawed in some jurisdictions, but allowed in others. It is not considered piggybacking if a bussiness offers a Wi-Fi hotspot for free or as a pay service. &lt;br /&gt;
&lt;br /&gt;
Piggybacking ofter goes unnoticed since most people only use a fraction of their upstream bandwidth. Piggybacking may also be carried out unintentionally, as most access points are configured without encryption (WPA2) and operating systems can automatically connect to wireless networks. The danger in piggybacking exists in users logging into an insecure network where illicit activity is conducted (danger for network owner) or sensitive information is broadcast (danger for user).&lt;br /&gt;
&lt;br /&gt;
===The Wi-Fi Scam, Home Security Scam and Bluetooth Scam===&lt;br /&gt;
'The Real Hustle' a UK television show is premised as an educational program demonstrating how people are getting ripped-off by confidence men around the world. The hustlers demonstrate how easy it is to gain access to a Wireless network through various scams. &lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=jqic_aY3TqQ&amp;amp;feature=related Wi-Fi Scam], the hustlers hijack a wireless network then rename their own wireless network and route people to a dummy site that looks completely legitimate. &lt;br /&gt;
&lt;br /&gt;
In the Home Security Scam, the hustlers walk through a residential neighborhood and enter home wireless networks by either hacking WEP keys or finding an unlocked network. The hustlers then monitor others online activity.&lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=gvDp-DBh4Gc&amp;amp;feature=related Bluetooth Scam], the hustlers scan a shopping mall for bluetooth signals from mobile phones. Once a signal is found and a connection is made, the hustlers call their premium rate line and rack up a bill for the cell phone owner.&lt;br /&gt;
&lt;br /&gt;
There exists dozens of tutorials on the Internet on how to use Wi-Fi for illicit purposes, demonstrating just how vunerable a wireless network is.&lt;br /&gt;
&lt;br /&gt;
==Other 802 Standards and Amendments==&lt;br /&gt;
[http://en.wikipedia.org/wiki/IEEE_802 See: IEEE 802 Wiki]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
# Comer, D. E. (2006). Wi-Fi. ''Internetworking with TCP/IP'' (Fifth ed., pp. 419-441). Upper Saddle River, NJ: Pearson Prentice Hall.&lt;br /&gt;
# &amp;quot;[http://www.wilcorpinc.com/wifi_history.htm Wi-Fi History]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# &amp;quot;[http://networkbits.net/wireless-printing/80211-g-pros-cons-of-a-wireless-network-in-a-business-environment/ Pros and Cons...]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Hamilr3|Hamilr3]] 00:51, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Wi-Fi</id>
		<title>Wi-Fi</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Wi-Fi"/>
				<updated>2009-04-12T03:15:18Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;/* Range */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Wifilogo.jpg|thumb|Wi-Fi logo]]&lt;br /&gt;
''Wi-Fi is a consortium that verifies 802.11b wireless network products interoperate, and a marketing term vendors use to sell their products.''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Wi-Fi is a subsection of the IEEE 802, a subcategory in the link layer of the TCP/IP [[The Five-Layer TCP/IP Model: Description/Attacks/Defense|Internet Protocol Suite]]. The Wi-Fi alliance is a trade group that owns the 'Wi-Fi' trademark, a symbol that certifies interoperability between wireless devices. Not every Internet product is Wi-Fi certified however, and there exists many devices that are able to interoperate wirelessly without the Wi-Fi logo. Some products have chosen to omit having Wi-Fi certification to avoid paying certification costs.&lt;br /&gt;
&lt;br /&gt;
The use of Wi-Fi has boomed in recent years and is supported by a multitude of different devices. Laptops. game consoles, smartphones, printers and other peripherals usually have Wi-Fi certification. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
[[Image:Metro Wireless Node.jpg|thumb|A municipal wireless antenna. Such devices are integral in creating a mesh network of access points. ]]&lt;br /&gt;
Wi-Fi was invented by Vic Hayes (dubbed 'the father of Wi-Fi') at the NCR Corporation/AT &amp;amp; T (later Lucent &amp;amp; Agere Systems), in 1991. Hayes had been designing IEEE standards for 802.11b, 802.11a and 802.11g and subsequent technology, initially meant for cashier systems. NCR initially released the technology under the name of 'WaveLAN' which operated in a range of 1Mbps-2 Mbps. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; The Wi-Fi alliance was created soon after the technology. &lt;br /&gt;
&lt;br /&gt;
The alliance is a consortium of separate, independent companies that promotes and develops IEEE 802.11 standards. The alliance also tests products to establish interoperability and certifies products that pass. The 'Wi-Fi' logo is allowed to be used by manufacturers who subscribe to the alliance and whose products pass testing. There exists sever unofficial &amp;quot;Wi-Fi&amp;quot; products that may work, but lack true certification.&lt;br /&gt;
&lt;br /&gt;
The term &amp;quot;Wi-Fi&amp;quot; was coined by Interbrand Corporation in August 1999 when hired by the Alliance to change the name from 'IEEE 802.11b Direct Sequence.' Interbrand also created the official 'Wi-Fi' logo. It is often assumed that Wi-Fi stands for &amp;quot;Wireless Fidelity&amp;quot;, however officially Wi-Fi is an abstract term and the Wi-Fi alliance is trying to downplay any association to &amp;quot;Hi-Fi&amp;quot; (High Fidelity).&lt;br /&gt;
&lt;br /&gt;
Many cities globally, have announced plans for a city-wide Wi-Fi network. Many such project have since been cancelled due to unforseen difficulties however, a few (such as Sunnyvale, California) were successful. The city-wide networks were created by meshing several wireless antenna together and effectively creating a very large hotspot.&lt;br /&gt;
&lt;br /&gt;
==Uses==&lt;br /&gt;
There are typically two ses for Wi-Fi: it can be used as an access technology whereby a single base station (access point) accomodates multiple clients, or it can be used in a point-to-point configuration, connecting exactly 2 access points. The latter is typically reserved for standard 802.16 (Wi-Max) and used by network providers or corporations to connect two sites. &lt;br /&gt;
&lt;br /&gt;
A Wi-Fi enabled device can connect to the internet if the access point it reaches is part of a network containing the internet. A wi-Fi enabled device can essentially use the internet for any networking purpose. &lt;br /&gt;
&lt;br /&gt;
There exists many wireless 'hotspots' which integrate one or more access points and the hotspots can span a range of a few meters to several kilometers( Sunnyvale, California for example, offers free city-wide Wi-Fi). Many businesses offer wireless hotspots as either free or pay services in order to attract customers. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi devices can operate in different modes such as peer-to-peer mode, which allows a direct connection between two people. In ad-hoc mode Wi-Fi devices are able to make client-to-client connections without a router. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi can enable wireless voice application (VoIP). The widespread growth of Wi-Fi now allows access to the internet outside 'traditional' setups (such as the bathroom). Wi-Fi installations can ultimately provide: a sequre computer networking gateway, firewall, DHCP server, intrusion detection system and many other services.&lt;br /&gt;
&lt;br /&gt;
==Advantages and Challenges==&lt;br /&gt;
Wi-Fi uses an unlicensed radio spectrum (unlike packet radio systems) and does not require regulatory approval for individual developers, which makes Wi-Fi products widely available. Different brands are able to make products that are interoperable at a basic service level because of the technological foundations in Wi-Fi. Competition amounsts vendors has also considerably lowered prices of Wi-Fi products, and they continue to drop as technology improves. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi  allows local area networks (LANs) to be set up without wires, which simultaneously lowers costs (of creating and exapnding) and allows much freedom in where a network can be accessed. The Wi-Fi certification aheres to a global set of standards as well so Wi-Fi products are compatible in any region. &lt;br /&gt;
&lt;br /&gt;
===Range===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Point-to-point-wifi-antenna.jpg|thumb|A point-to-point parabolic Wi-Fi antenna. Such devices can dramatically increase the range of a Wi-Fi network (in a single direction). The devices may be costly to buy and run however.]]&lt;br /&gt;
&lt;br /&gt;
dfgdf&lt;br /&gt;
&lt;br /&gt;
===Mobility===&lt;br /&gt;
&lt;br /&gt;
===Channel Pollution===&lt;br /&gt;
&lt;br /&gt;
==Security==&lt;br /&gt;
The greatest security issue with Wi-Fi (and all other wireless networks) is the easy of connectivity compared to traditional wired networks like Ethernet. Wireless communication (bluetooth especially) is designed to be simple and easily connected to. To make an attack on a wired network, the attacker must physically connect to the internal network or break through an external firewall. External access however is usually disallowed by business networks in order to protect sensitive data. It is because firewall encryption could be broken that most business networks disallow external access. Getting wireless reception is considered an attack to most business networks.&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The nature most wireless networks is to allow external access in order to maintain an degree of usability. If attackers gain access to a wireless network they can harm the user in a variety of ways from monitoring others' activity to fabricating a DNS spoofing attack. &lt;br /&gt;
&lt;br /&gt;
===Preventative Measures===&lt;br /&gt;
[[Image:Wep.gif|thumb|The WEP encryption standard. The vunerabilities are shown by malicious software and a single key for all users on the network.]]&lt;br /&gt;
WEP (Wired Equivalent Privacy) keys uses a deprecated algorithm to secure Wireless networks. First introduced in 1997, WEP keys were intended to make wireless networks have comparable security to that of wired networks. A WEP key could be interpreted as a 26 digit password allowing access to a home network. There are several security flaws in the WEP keys currently being used and there exists readily available software (such as AirSnort or AirCrack) that can obtain a WEP key in minutes. WEP keys are now considered completely broken. The security flaws of WEP keys was first counteracted in 2002 with 'Wi-Fi Protected Access' (WPA) but the attack vector are now known. Now (as of 2004), full IEEE 802.11i (WPA2) encryption standards have been release and are still considered secure as of 2009. &lt;br /&gt;
&lt;br /&gt;
Another security measure in effect involves suppressing the Access Points' SSID broadcast to only allow a predefined set of MAC addresses the ability to join the network. This security measure has since proven ineffective, since if an allowed MAC address is known (or found out) by an attacker then they could potentially change their own MAC address to spoof as an allowed machine.  &lt;br /&gt;
&lt;br /&gt;
===DNS Spoofing and Kaminsky Attack===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Piggybacking===&lt;br /&gt;
Piggybacking refers to accessing a wireless internet connection by bringing a wireless device in range of another connection and using the service without the owners knowledge or permission. Piggybacking is completely outlawed in some jurisdictions, but allowed in others. It is not considered piggybacking if a bussiness offers a Wi-Fi hotspot for free or as a pay service. &lt;br /&gt;
&lt;br /&gt;
Piggybacking ofter goes unnoticed since most people only use a fraction of their upstream bandwidth. Piggybacking may also be carried out unintentionally, as most access points are configured without encryption (WPA2) and operating systems can automatically connect to wireless networks. The danger in piggybacking exists in users logging into an insecure network where illicit activity is conducted (danger for network owner) or sensitive information is broadcast (danger for user).&lt;br /&gt;
&lt;br /&gt;
===The Wi-Fi Scam, Home Security Scam and Bluetooth Scam===&lt;br /&gt;
'The Real Hustle' a UK television show is premised as an educational program demonstrating how people are getting ripped-off by confidence men around the world. The hustlers demonstrate how easy it is to gain access to a Wireless network through various scams. &lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=jqic_aY3TqQ&amp;amp;feature=related Wi-Fi Scam], the hustlers hijack a wireless network then rename their own wireless network and route people to a dummy site that looks completely legitimate. &lt;br /&gt;
&lt;br /&gt;
In the Home Security Scam, the hustlers walk through a residential neighborhood and enter home wireless networks by either hacking WEP keys or finding an unlocked network. The hustlers then monitor others online activity.&lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=gvDp-DBh4Gc&amp;amp;feature=related Bluetooth Scam], the hustlers scan a shopping mall for bluetooth signals from mobile phones. Once a signal is found and a connection is made, the hustlers call their premium rate line and rack up a bill for the cell phone owner.&lt;br /&gt;
&lt;br /&gt;
There exists dozens of tutorials on the Internet on how to use Wi-Fi for illicit purposes, demonstrating just how vunerable a wireless network is.&lt;br /&gt;
&lt;br /&gt;
==Other 802 Standards and Amendments==&lt;br /&gt;
[http://en.wikipedia.org/wiki/IEEE_802 See: IEEE 802 Wiki]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
# Comer, D. E. (2006). Wi-Fi. ''Internetworking with TCP/IP'' (Fifth ed., pp. 419-441). Upper Saddle River, NJ: Pearson Prentice Hall.&lt;br /&gt;
# &amp;quot;[http://www.wilcorpinc.com/wifi_history.htm Wi-Fi History]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# &amp;quot;[http://networkbits.net/wireless-printing/80211-g-pros-cons-of-a-wireless-network-in-a-business-environment/ Pros and Cons...]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Hamilr3|Hamilr3]] 00:51, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Wi-Fi</id>
		<title>Wi-Fi</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Wi-Fi"/>
				<updated>2009-04-12T03:11:41Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;/* Range */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Wifilogo.jpg|thumb|Wi-Fi logo]]&lt;br /&gt;
''Wi-Fi is a consortium that verifies 802.11b wireless network products interoperate, and a marketing term vendors use to sell their products.''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Wi-Fi is a subsection of the IEEE 802, a subcategory in the link layer of the TCP/IP [[The Five-Layer TCP/IP Model: Description/Attacks/Defense|Internet Protocol Suite]]. The Wi-Fi alliance is a trade group that owns the 'Wi-Fi' trademark, a symbol that certifies interoperability between wireless devices. Not every Internet product is Wi-Fi certified however, and there exists many devices that are able to interoperate wirelessly without the Wi-Fi logo. Some products have chosen to omit having Wi-Fi certification to avoid paying certification costs.&lt;br /&gt;
&lt;br /&gt;
The use of Wi-Fi has boomed in recent years and is supported by a multitude of different devices. Laptops. game consoles, smartphones, printers and other peripherals usually have Wi-Fi certification. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
[[Image:Metro Wireless Node.jpg|thumb|A municipal wireless antenna. Such devices are integral in creating a mesh network of access points. ]]&lt;br /&gt;
Wi-Fi was invented by Vic Hayes (dubbed 'the father of Wi-Fi') at the NCR Corporation/AT &amp;amp; T (later Lucent &amp;amp; Agere Systems), in 1991. Hayes had been designing IEEE standards for 802.11b, 802.11a and 802.11g and subsequent technology, initially meant for cashier systems. NCR initially released the technology under the name of 'WaveLAN' which operated in a range of 1Mbps-2 Mbps. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; The Wi-Fi alliance was created soon after the technology. &lt;br /&gt;
&lt;br /&gt;
The alliance is a consortium of separate, independent companies that promotes and develops IEEE 802.11 standards. The alliance also tests products to establish interoperability and certifies products that pass. The 'Wi-Fi' logo is allowed to be used by manufacturers who subscribe to the alliance and whose products pass testing. There exists sever unofficial &amp;quot;Wi-Fi&amp;quot; products that may work, but lack true certification.&lt;br /&gt;
&lt;br /&gt;
The term &amp;quot;Wi-Fi&amp;quot; was coined by Interbrand Corporation in August 1999 when hired by the Alliance to change the name from 'IEEE 802.11b Direct Sequence.' Interbrand also created the official 'Wi-Fi' logo. It is often assumed that Wi-Fi stands for &amp;quot;Wireless Fidelity&amp;quot;, however officially Wi-Fi is an abstract term and the Wi-Fi alliance is trying to downplay any association to &amp;quot;Hi-Fi&amp;quot; (High Fidelity).&lt;br /&gt;
&lt;br /&gt;
Many cities globally, have announced plans for a city-wide Wi-Fi network. Many such project have since been cancelled due to unforseen difficulties however, a few (such as Sunnyvale, California) were successful. The city-wide networks were created by meshing several wireless antenna together and effectively creating a very large hotspot.&lt;br /&gt;
&lt;br /&gt;
==Uses==&lt;br /&gt;
There are typically two ses for Wi-Fi: it can be used as an access technology whereby a single base station (access point) accomodates multiple clients, or it can be used in a point-to-point configuration, connecting exactly 2 access points. The latter is typically reserved for standard 802.16 (Wi-Max) and used by network providers or corporations to connect two sites. &lt;br /&gt;
&lt;br /&gt;
A Wi-Fi enabled device can connect to the internet if the access point it reaches is part of a network containing the internet. A wi-Fi enabled device can essentially use the internet for any networking purpose. &lt;br /&gt;
&lt;br /&gt;
There exists many wireless 'hotspots' which integrate one or more access points and the hotspots can span a range of a few meters to several kilometers( Sunnyvale, California for example, offers free city-wide Wi-Fi). Many businesses offer wireless hotspots as either free or pay services in order to attract customers. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi devices can operate in different modes such as peer-to-peer mode, which allows a direct connection between two people. In ad-hoc mode Wi-Fi devices are able to make client-to-client connections without a router. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi can enable wireless voice application (VoIP). The widespread growth of Wi-Fi now allows access to the internet outside 'traditional' setups (such as the bathroom). Wi-Fi installations can ultimately provide: a sequre computer networking gateway, firewall, DHCP server, intrusion detection system and many other services.&lt;br /&gt;
&lt;br /&gt;
==Advantages and Challenges==&lt;br /&gt;
Wi-Fi uses an unlicensed radio spectrum (unlike packet radio systems) and does not require regulatory approval for individual developers, which makes Wi-Fi products widely available. Different brands are able to make products that are interoperable at a basic service level because of the technological foundations in Wi-Fi. Competition amounsts vendors has also considerably lowered prices of Wi-Fi products, and they continue to drop as technology improves. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi  allows local area networks (LANs) to be set up without wires, which simultaneously lowers costs (of creating and exapnding) and allows much freedom in where a network can be accessed. The Wi-Fi certification aheres to a global set of standards as well so Wi-Fi products are compatible in any region. &lt;br /&gt;
&lt;br /&gt;
===Range===&lt;br /&gt;
Point-to-point-wifi-antenna.jpg&lt;br /&gt;
&lt;br /&gt;
Bountiful_WiFi_router_with_high_gain_antennas_high-res.jpg&lt;br /&gt;
&lt;br /&gt;
[[Image:Bountiful_WiFi_router_with_high_gain_antennas_high-res.jpg]thumb ablabl]&lt;br /&gt;
&lt;br /&gt;
asdfasdfasdf&lt;br /&gt;
asdf&lt;br /&gt;
asdf&lt;br /&gt;
asdf&lt;br /&gt;
&lt;br /&gt;
===Mobility===&lt;br /&gt;
&lt;br /&gt;
===Channel Pollution===&lt;br /&gt;
&lt;br /&gt;
==Security==&lt;br /&gt;
The greatest security issue with Wi-Fi (and all other wireless networks) is the easy of connectivity compared to traditional wired networks like Ethernet. Wireless communication (bluetooth especially) is designed to be simple and easily connected to. To make an attack on a wired network, the attacker must physically connect to the internal network or break through an external firewall. External access however is usually disallowed by business networks in order to protect sensitive data. It is because firewall encryption could be broken that most business networks disallow external access. Getting wireless reception is considered an attack to most business networks.&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The nature most wireless networks is to allow external access in order to maintain an degree of usability. If attackers gain access to a wireless network they can harm the user in a variety of ways from monitoring others' activity to fabricating a DNS spoofing attack. &lt;br /&gt;
&lt;br /&gt;
===Preventative Measures===&lt;br /&gt;
[[Image:Wep.gif|thumb|The WEP encryption standard. The vunerabilities are shown by malicious software and a single key for all users on the network.]]&lt;br /&gt;
WEP (Wired Equivalent Privacy) keys uses a deprecated algorithm to secure Wireless networks. First introduced in 1997, WEP keys were intended to make wireless networks have comparable security to that of wired networks. A WEP key could be interpreted as a 26 digit password allowing access to a home network. There are several security flaws in the WEP keys currently being used and there exists readily available software (such as AirSnort or AirCrack) that can obtain a WEP key in minutes. WEP keys are now considered completely broken. The security flaws of WEP keys was first counteracted in 2002 with 'Wi-Fi Protected Access' (WPA) but the attack vector are now known. Now (as of 2004), full IEEE 802.11i (WPA2) encryption standards have been release and are still considered secure as of 2009. &lt;br /&gt;
&lt;br /&gt;
Another security measure in effect involves suppressing the Access Points' SSID broadcast to only allow a predefined set of MAC addresses the ability to join the network. This security measure has since proven ineffective, since if an allowed MAC address is known (or found out) by an attacker then they could potentially change their own MAC address to spoof as an allowed machine.  &lt;br /&gt;
&lt;br /&gt;
===DNS Spoofing and Kaminsky Attack===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Piggybacking===&lt;br /&gt;
Piggybacking refers to accessing a wireless internet connection by bringing a wireless device in range of another connection and using the service without the owners knowledge or permission. Piggybacking is completely outlawed in some jurisdictions, but allowed in others. It is not considered piggybacking if a bussiness offers a Wi-Fi hotspot for free or as a pay service. &lt;br /&gt;
&lt;br /&gt;
Piggybacking ofter goes unnoticed since most people only use a fraction of their upstream bandwidth. Piggybacking may also be carried out unintentionally, as most access points are configured without encryption (WPA2) and operating systems can automatically connect to wireless networks. The danger in piggybacking exists in users logging into an insecure network where illicit activity is conducted (danger for network owner) or sensitive information is broadcast (danger for user).&lt;br /&gt;
&lt;br /&gt;
===The Wi-Fi Scam, Home Security Scam and Bluetooth Scam===&lt;br /&gt;
'The Real Hustle' a UK television show is premised as an educational program demonstrating how people are getting ripped-off by confidence men around the world. The hustlers demonstrate how easy it is to gain access to a Wireless network through various scams. &lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=jqic_aY3TqQ&amp;amp;feature=related Wi-Fi Scam], the hustlers hijack a wireless network then rename their own wireless network and route people to a dummy site that looks completely legitimate. &lt;br /&gt;
&lt;br /&gt;
In the Home Security Scam, the hustlers walk through a residential neighborhood and enter home wireless networks by either hacking WEP keys or finding an unlocked network. The hustlers then monitor others online activity.&lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=gvDp-DBh4Gc&amp;amp;feature=related Bluetooth Scam], the hustlers scan a shopping mall for bluetooth signals from mobile phones. Once a signal is found and a connection is made, the hustlers call their premium rate line and rack up a bill for the cell phone owner.&lt;br /&gt;
&lt;br /&gt;
There exists dozens of tutorials on the Internet on how to use Wi-Fi for illicit purposes, demonstrating just how vunerable a wireless network is.&lt;br /&gt;
&lt;br /&gt;
==Other 802 Standards and Amendments==&lt;br /&gt;
[http://en.wikipedia.org/wiki/IEEE_802 See: IEEE 802 Wiki]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
# Comer, D. E. (2006). Wi-Fi. ''Internetworking with TCP/IP'' (Fifth ed., pp. 419-441). Upper Saddle River, NJ: Pearson Prentice Hall.&lt;br /&gt;
# &amp;quot;[http://www.wilcorpinc.com/wifi_history.htm Wi-Fi History]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# &amp;quot;[http://networkbits.net/wireless-printing/80211-g-pros-cons-of-a-wireless-network-in-a-business-environment/ Pros and Cons...]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Hamilr3|Hamilr3]] 00:51, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Bountiful_WiFi_router_with_high_gain_antennas_high-res.jpg</id>
		<title>File:Bountiful WiFi router with high gain antennas high-res.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Bountiful_WiFi_router_with_high_gain_antennas_high-res.jpg"/>
				<updated>2009-04-12T03:10:32Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Point-to-point-wifi-antenna.jpg</id>
		<title>File:Point-to-point-wifi-antenna.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Point-to-point-wifi-antenna.jpg"/>
				<updated>2009-04-12T03:08:44Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Wi-Fi</id>
		<title>Wi-Fi</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Wi-Fi"/>
				<updated>2009-04-12T02:17:09Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;/* Advantages and Challenges */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Wifilogo.jpg|thumb|Wi-Fi logo]]&lt;br /&gt;
''Wi-Fi is a consortium that verifies 802.11b wireless network products interoperate, and a marketing term vendors use to sell their products.''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Wi-Fi is a subsection of the IEEE 802, a subcategory in the link layer of the TCP/IP [[The Five-Layer TCP/IP Model: Description/Attacks/Defense|Internet Protocol Suite]]. The Wi-Fi alliance is a trade group that owns the 'Wi-Fi' trademark, a symbol that certifies interoperability between wireless devices. Not every Internet product is Wi-Fi certified however, and there exists many devices that are able to interoperate wirelessly without the Wi-Fi logo. Some products have chosen to omit having Wi-Fi certification to avoid paying certification costs.&lt;br /&gt;
&lt;br /&gt;
The use of Wi-Fi has boomed in recent years and is supported by a multitude of different devices. Laptops. game consoles, smartphones, printers and other peripherals usually have Wi-Fi certification. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
[[Image:Metro Wireless Node.jpg|thumb|A municipal wireless antenna. Such devices are integral in creating a mesh network of access points. ]]&lt;br /&gt;
Wi-Fi was invented by Vic Hayes (dubbed 'the father of Wi-Fi') at the NCR Corporation/AT &amp;amp; T (later Lucent &amp;amp; Agere Systems), in 1991. Hayes had been designing IEEE standards for 802.11b, 802.11a and 802.11g and subsequent technology, initially meant for cashier systems. NCR initially released the technology under the name of 'WaveLAN' which operated in a range of 1Mbps-2 Mbps. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; The Wi-Fi alliance was created soon after the technology. &lt;br /&gt;
&lt;br /&gt;
The alliance is a consortium of separate, independent companies that promotes and develops IEEE 802.11 standards. The alliance also tests products to establish interoperability and certifies products that pass. The 'Wi-Fi' logo is allowed to be used by manufacturers who subscribe to the alliance and whose products pass testing. There exists sever unofficial &amp;quot;Wi-Fi&amp;quot; products that may work, but lack true certification.&lt;br /&gt;
&lt;br /&gt;
The term &amp;quot;Wi-Fi&amp;quot; was coined by Interbrand Corporation in August 1999 when hired by the Alliance to change the name from 'IEEE 802.11b Direct Sequence.' Interbrand also created the official 'Wi-Fi' logo. It is often assumed that Wi-Fi stands for &amp;quot;Wireless Fidelity&amp;quot;, however officially Wi-Fi is an abstract term and the Wi-Fi alliance is trying to downplay any association to &amp;quot;Hi-Fi&amp;quot; (High Fidelity).&lt;br /&gt;
&lt;br /&gt;
Many cities globally, have announced plans for a city-wide Wi-Fi network. Many such project have since been cancelled due to unforseen difficulties however, a few (such as Sunnyvale, California) were successful. The city-wide networks were created by meshing several wireless antenna together and effectively creating a very large hotspot.&lt;br /&gt;
&lt;br /&gt;
==Uses==&lt;br /&gt;
There are typically two ses for Wi-Fi: it can be used as an access technology whereby a single base station (access point) accomodates multiple clients, or it can be used in a point-to-point configuration, connecting exactly 2 access points. The latter is typically reserved for standard 802.16 (Wi-Max) and used by network providers or corporations to connect two sites. &lt;br /&gt;
&lt;br /&gt;
A Wi-Fi enabled device can connect to the internet if the access point it reaches is part of a network containing the internet. A wi-Fi enabled device can essentially use the internet for any networking purpose. &lt;br /&gt;
&lt;br /&gt;
There exists many wireless 'hotspots' which integrate one or more access points and the hotspots can span a range of a few meters to several kilometers( Sunnyvale, California for example, offers free city-wide Wi-Fi). Many businesses offer wireless hotspots as either free or pay services in order to attract customers. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi devices can operate in different modes such as peer-to-peer mode, which allows a direct connection between two people. In ad-hoc mode Wi-Fi devices are able to make client-to-client connections without a router. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi can enable wireless voice application (VoIP). The widespread growth of Wi-Fi now allows access to the internet outside 'traditional' setups (such as the bathroom). Wi-Fi installations can ultimately provide: a sequre computer networking gateway, firewall, DHCP server, intrusion detection system and many other services.&lt;br /&gt;
&lt;br /&gt;
==Advantages and Challenges==&lt;br /&gt;
Wi-Fi uses an unlicensed radio spectrum (unlike packet radio systems) and does not require regulatory approval for individual developers, which makes Wi-Fi products widely available. Different brands are able to make products that are interoperable at a basic service level because of the technological foundations in Wi-Fi. Competition amounsts vendors has also considerably lowered prices of Wi-Fi products, and they continue to drop as technology improves. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi  allows local area networks (LANs) to be set up without wires, which simultaneously lowers costs (of creating and exapnding) and allows much freedom in where a network can be accessed. The Wi-Fi certification aheres to a global set of standards as well so Wi-Fi products are compatible in any region. &lt;br /&gt;
&lt;br /&gt;
===Range===&lt;br /&gt;
&lt;br /&gt;
===Mobility===&lt;br /&gt;
&lt;br /&gt;
===Channel Pollution===&lt;br /&gt;
&lt;br /&gt;
==Security==&lt;br /&gt;
The greatest security issue with Wi-Fi (and all other wireless networks) is the easy of connectivity compared to traditional wired networks like Ethernet. Wireless communication (bluetooth especially) is designed to be simple and easily connected to. To make an attack on a wired network, the attacker must physically connect to the internal network or break through an external firewall. External access however is usually disallowed by business networks in order to protect sensitive data. It is because firewall encryption could be broken that most business networks disallow external access. Getting wireless reception is considered an attack to most business networks.&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The nature most wireless networks is to allow external access in order to maintain an degree of usability. If attackers gain access to a wireless network they can harm the user in a variety of ways from monitoring others' activity to fabricating a DNS spoofing attack. &lt;br /&gt;
&lt;br /&gt;
===Preventative Measures===&lt;br /&gt;
[[Image:Wep.gif|thumb|The WEP encryption standard. The vunerabilities are shown by malicious software and a single key for all users on the network.]]&lt;br /&gt;
WEP (Wired Equivalent Privacy) keys uses a deprecated algorithm to secure Wireless networks. First introduced in 1997, WEP keys were intended to make wireless networks have comparable security to that of wired networks. A WEP key could be interpreted as a 26 digit password allowing access to a home network. There are several security flaws in the WEP keys currently being used and there exists readily available software (such as AirSnort or AirCrack) that can obtain a WEP key in minutes. WEP keys are now considered completely broken. The security flaws of WEP keys was first counteracted in 2002 with 'Wi-Fi Protected Access' (WPA) but the attack vector are now known. Now (as of 2004), full IEEE 802.11i (WPA2) encryption standards have been release and are still considered secure as of 2009. &lt;br /&gt;
&lt;br /&gt;
Another security measure in effect involves suppressing the Access Points' SSID broadcast to only allow a predefined set of MAC addresses the ability to join the network. This security measure has since proven ineffective, since if an allowed MAC address is known (or found out) by an attacker then they could potentially change their own MAC address to spoof as an allowed machine.  &lt;br /&gt;
&lt;br /&gt;
===DNS Spoofing and Kaminsky Attack===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Piggybacking===&lt;br /&gt;
Piggybacking refers to accessing a wireless internet connection by bringing a wireless device in range of another connection and using the service without the owners knowledge or permission. Piggybacking is completely outlawed in some jurisdictions, but allowed in others. It is not considered piggybacking if a bussiness offers a Wi-Fi hotspot for free or as a pay service. &lt;br /&gt;
&lt;br /&gt;
Piggybacking ofter goes unnoticed since most people only use a fraction of their upstream bandwidth. Piggybacking may also be carried out unintentionally, as most access points are configured without encryption (WPA2) and operating systems can automatically connect to wireless networks. The danger in piggybacking exists in users logging into an insecure network where illicit activity is conducted (danger for network owner) or sensitive information is broadcast (danger for user).&lt;br /&gt;
&lt;br /&gt;
===The Wi-Fi Scam, Home Security Scam and Bluetooth Scam===&lt;br /&gt;
'The Real Hustle' a UK television show is premised as an educational program demonstrating how people are getting ripped-off by confidence men around the world. The hustlers demonstrate how easy it is to gain access to a Wireless network through various scams. &lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=jqic_aY3TqQ&amp;amp;feature=related Wi-Fi Scam], the hustlers hijack a wireless network then rename their own wireless network and route people to a dummy site that looks completely legitimate. &lt;br /&gt;
&lt;br /&gt;
In the Home Security Scam, the hustlers walk through a residential neighborhood and enter home wireless networks by either hacking WEP keys or finding an unlocked network. The hustlers then monitor others online activity.&lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=gvDp-DBh4Gc&amp;amp;feature=related Bluetooth Scam], the hustlers scan a shopping mall for bluetooth signals from mobile phones. Once a signal is found and a connection is made, the hustlers call their premium rate line and rack up a bill for the cell phone owner.&lt;br /&gt;
&lt;br /&gt;
There exists dozens of tutorials on the Internet on how to use Wi-Fi for illicit purposes, demonstrating just how vunerable a wireless network is.&lt;br /&gt;
&lt;br /&gt;
==Other 802 Standards and Amendments==&lt;br /&gt;
[http://en.wikipedia.org/wiki/IEEE_802 See: IEEE 802 Wiki]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
# Comer, D. E. (2006). Wi-Fi. ''Internetworking with TCP/IP'' (Fifth ed., pp. 419-441). Upper Saddle River, NJ: Pearson Prentice Hall.&lt;br /&gt;
# &amp;quot;[http://www.wilcorpinc.com/wifi_history.htm Wi-Fi History]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# &amp;quot;[http://networkbits.net/wireless-printing/80211-g-pros-cons-of-a-wireless-network-in-a-business-environment/ Pros and Cons...]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Hamilr3|Hamilr3]] 00:51, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Wi-Fi</id>
		<title>Wi-Fi</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Wi-Fi"/>
				<updated>2009-04-12T00:40:16Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;/* Uses */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Wifilogo.jpg|thumb|Wi-Fi logo]]&lt;br /&gt;
''Wi-Fi is a consortium that verifies 802.11b wireless network products interoperate, and a marketing term vendors use to sell their products.''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Wi-Fi is a subsection of the IEEE 802, a subcategory in the link layer of the TCP/IP [[The Five-Layer TCP/IP Model: Description/Attacks/Defense|Internet Protocol Suite]]. The Wi-Fi alliance is a trade group that owns the 'Wi-Fi' trademark, a symbol that certifies interoperability between wireless devices. Not every Internet product is Wi-Fi certified however, and there exists many devices that are able to interoperate wirelessly without the Wi-Fi logo. Some products have chosen to omit having Wi-Fi certification to avoid paying certification costs.&lt;br /&gt;
&lt;br /&gt;
The use of Wi-Fi has boomed in recent years and is supported by a multitude of different devices. Laptops. game consoles, smartphones, printers and other peripherals usually have Wi-Fi certification. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
[[Image:Metro Wireless Node.jpg|thumb|A municipal wireless antenna. Such devices are integral in creating a mesh network of access points. ]]&lt;br /&gt;
Wi-Fi was invented by Vic Hayes (dubbed 'the father of Wi-Fi') at the NCR Corporation/AT &amp;amp; T (later Lucent &amp;amp; Agere Systems), in 1991. Hayes had been designing IEEE standards for 802.11b, 802.11a and 802.11g and subsequent technology, initially meant for cashier systems. NCR initially released the technology under the name of 'WaveLAN' which operated in a range of 1Mbps-2 Mbps. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; The Wi-Fi alliance was created soon after the technology. &lt;br /&gt;
&lt;br /&gt;
The alliance is a consortium of separate, independent companies that promotes and develops IEEE 802.11 standards. The alliance also tests products to establish interoperability and certifies products that pass. The 'Wi-Fi' logo is allowed to be used by manufacturers who subscribe to the alliance and whose products pass testing. There exists sever unofficial &amp;quot;Wi-Fi&amp;quot; products that may work, but lack true certification.&lt;br /&gt;
&lt;br /&gt;
The term &amp;quot;Wi-Fi&amp;quot; was coined by Interbrand Corporation in August 1999 when hired by the Alliance to change the name from 'IEEE 802.11b Direct Sequence.' Interbrand also created the official 'Wi-Fi' logo. It is often assumed that Wi-Fi stands for &amp;quot;Wireless Fidelity&amp;quot;, however officially Wi-Fi is an abstract term and the Wi-Fi alliance is trying to downplay any association to &amp;quot;Hi-Fi&amp;quot; (High Fidelity).&lt;br /&gt;
&lt;br /&gt;
Many cities globally, have announced plans for a city-wide Wi-Fi network. Many such project have since been cancelled due to unforseen difficulties however, a few (such as Sunnyvale, California) were successful. The city-wide networks were created by meshing several wireless antenna together and effectively creating a very large hotspot.&lt;br /&gt;
&lt;br /&gt;
==Uses==&lt;br /&gt;
There are typically two ses for Wi-Fi: it can be used as an access technology whereby a single base station (access point) accomodates multiple clients, or it can be used in a point-to-point configuration, connecting exactly 2 access points. The latter is typically reserved for standard 802.16 (Wi-Max) and used by network providers or corporations to connect two sites. &lt;br /&gt;
&lt;br /&gt;
A Wi-Fi enabled device can connect to the internet if the access point it reaches is part of a network containing the internet. A wi-Fi enabled device can essentially use the internet for any networking purpose. &lt;br /&gt;
&lt;br /&gt;
There exists many wireless 'hotspots' which integrate one or more access points and the hotspots can span a range of a few meters to several kilometers( Sunnyvale, California for example, offers free city-wide Wi-Fi). Many businesses offer wireless hotspots as either free or pay services in order to attract customers. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi devices can operate in different modes such as peer-to-peer mode, which allows a direct connection between two people. In ad-hoc mode Wi-Fi devices are able to make client-to-client connections without a router. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi can enable wireless voice application (VoIP). The widespread growth of Wi-Fi now allows access to the internet outside 'traditional' setups (such as the bathroom). Wi-Fi installations can ultimately provide: a sequre computer networking gateway, firewall, DHCP server, intrusion detection system and many other services.&lt;br /&gt;
&lt;br /&gt;
==Advantages and Challenges==&lt;br /&gt;
&lt;br /&gt;
==Security==&lt;br /&gt;
The greatest security issue with Wi-Fi (and all other wireless networks) is the easy of connectivity compared to traditional wired networks like Ethernet. Wireless communication (bluetooth especially) is designed to be simple and easily connected to. To make an attack on a wired network, the attacker must physically connect to the internal network or break through an external firewall. External access however is usually disallowed by business networks in order to protect sensitive data. It is because firewall encryption could be broken that most business networks disallow external access. Getting wireless reception is considered an attack to most business networks.&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The nature most wireless networks is to allow external access in order to maintain an degree of usability. If attackers gain access to a wireless network they can harm the user in a variety of ways from monitoring others' activity to fabricating a DNS spoofing attack. &lt;br /&gt;
&lt;br /&gt;
===Preventative Measures===&lt;br /&gt;
[[Image:Wep.gif|thumb|The WEP encryption standard. The vunerabilities are shown by malicious software and a single key for all users on the network.]]&lt;br /&gt;
WEP (Wired Equivalent Privacy) keys uses a deprecated algorithm to secure Wireless networks. First introduced in 1997, WEP keys were intended to make wireless networks have comparable security to that of wired networks. A WEP key could be interpreted as a 26 digit password allowing access to a home network. There are several security flaws in the WEP keys currently being used and there exists readily available software (such as AirSnort or AirCrack) that can obtain a WEP key in minutes. WEP keys are now considered completely broken. The security flaws of WEP keys was first counteracted in 2002 with 'Wi-Fi Protected Access' (WPA) but the attack vector are now known. Now (as of 2004), full IEEE 802.11i (WPA2) encryption standards have been release and are still considered secure as of 2009. &lt;br /&gt;
&lt;br /&gt;
Another security measure in effect involves suppressing the Access Points' SSID broadcast to only allow a predefined set of MAC addresses the ability to join the network. This security measure has since proven ineffective, since if an allowed MAC address is known (or found out) by an attacker then they could potentially change their own MAC address to spoof as an allowed machine.  &lt;br /&gt;
&lt;br /&gt;
===DNS Spoofing and Kaminsky Attack===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Piggybacking===&lt;br /&gt;
Piggybacking refers to accessing a wireless internet connection by bringing a wireless device in range of another connection and using the service without the owners knowledge or permission. Piggybacking is completely outlawed in some jurisdictions, but allowed in others. It is not considered piggybacking if a bussiness offers a Wi-Fi hotspot for free or as a pay service. &lt;br /&gt;
&lt;br /&gt;
Piggybacking ofter goes unnoticed since most people only use a fraction of their upstream bandwidth. Piggybacking may also be carried out unintentionally, as most access points are configured without encryption (WPA2) and operating systems can automatically connect to wireless networks. The danger in piggybacking exists in users logging into an insecure network where illicit activity is conducted (danger for network owner) or sensitive information is broadcast (danger for user).&lt;br /&gt;
&lt;br /&gt;
===The Wi-Fi Scam, Home Security Scam and Bluetooth Scam===&lt;br /&gt;
'The Real Hustle' a UK television show is premised as an educational program demonstrating how people are getting ripped-off by confidence men around the world. The hustlers demonstrate how easy it is to gain access to a Wireless network through various scams. &lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=jqic_aY3TqQ&amp;amp;feature=related Wi-Fi Scam], the hustlers hijack a wireless network then rename their own wireless network and route people to a dummy site that looks completely legitimate. &lt;br /&gt;
&lt;br /&gt;
In the Home Security Scam, the hustlers walk through a residential neighborhood and enter home wireless networks by either hacking WEP keys or finding an unlocked network. The hustlers then monitor others online activity.&lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=gvDp-DBh4Gc&amp;amp;feature=related Bluetooth Scam], the hustlers scan a shopping mall for bluetooth signals from mobile phones. Once a signal is found and a connection is made, the hustlers call their premium rate line and rack up a bill for the cell phone owner.&lt;br /&gt;
&lt;br /&gt;
There exists dozens of tutorials on the Internet on how to use Wi-Fi for illicit purposes, demonstrating just how vunerable a wireless network is.&lt;br /&gt;
&lt;br /&gt;
==Other 802 Standards and Amendments==&lt;br /&gt;
[http://en.wikipedia.org/wiki/IEEE_802 See: IEEE 802 Wiki]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
# Comer, D. E. (2006). Wi-Fi. ''Internetworking with TCP/IP'' (Fifth ed., pp. 419-441). Upper Saddle River, NJ: Pearson Prentice Hall.&lt;br /&gt;
# &amp;quot;[http://www.wilcorpinc.com/wifi_history.htm Wi-Fi History]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# &amp;quot;[http://networkbits.net/wireless-printing/80211-g-pros-cons-of-a-wireless-network-in-a-business-environment/ Pros and Cons...]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Hamilr3|Hamilr3]] 00:51, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Wi-Fi</id>
		<title>Wi-Fi</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Wi-Fi"/>
				<updated>2009-04-11T05:42:42Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;/* Uses */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Wifilogo.jpg|thumb|Wi-Fi logo]]&lt;br /&gt;
''Wi-Fi is a consortium that verifies 802.11b wireless network products interoperate, and a marketing term vendors use to sell their products.''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Wi-Fi is a subsection of the IEEE 802, a subcategory in the link layer of the TCP/IP [[The Five-Layer TCP/IP Model: Description/Attacks/Defense|Internet Protocol Suite]]. The Wi-Fi alliance is a trade group that owns the 'Wi-Fi' trademark, a symbol that certifies interoperability between wireless devices. Not every Internet product is Wi-Fi certified however, and there exists many devices that are able to interoperate wirelessly without the Wi-Fi logo. Some products have chosen to omit having Wi-Fi certification to avoid paying certification costs.&lt;br /&gt;
&lt;br /&gt;
The use of Wi-Fi has boomed in recent years and is supported by a multitude of different devices. Laptops. game consoles, smartphones, printers and other peripherals usually have Wi-Fi certification. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
[[Image:Metro Wireless Node.jpg|thumb|A municipal wireless antenna. Such devices are integral in creating a mesh network of access points. ]]&lt;br /&gt;
Wi-Fi was invented by Vic Hayes (dubbed 'the father of Wi-Fi') at the NCR Corporation/AT &amp;amp; T (later Lucent &amp;amp; Agere Systems), in 1991. Hayes had been designing IEEE standards for 802.11b, 802.11a and 802.11g and subsequent technology, initially meant for cashier systems. NCR initially released the technology under the name of 'WaveLAN' which operated in a range of 1Mbps-2 Mbps. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; The Wi-Fi alliance was created soon after the technology. &lt;br /&gt;
&lt;br /&gt;
The alliance is a consortium of separate, independent companies that promotes and develops IEEE 802.11 standards. The alliance also tests products to establish interoperability and certifies products that pass. The 'Wi-Fi' logo is allowed to be used by manufacturers who subscribe to the alliance and whose products pass testing. There exists sever unofficial &amp;quot;Wi-Fi&amp;quot; products that may work, but lack true certification.&lt;br /&gt;
&lt;br /&gt;
The term &amp;quot;Wi-Fi&amp;quot; was coined by Interbrand Corporation in August 1999 when hired by the Alliance to change the name from 'IEEE 802.11b Direct Sequence.' Interbrand also created the official 'Wi-Fi' logo. It is often assumed that Wi-Fi stands for &amp;quot;Wireless Fidelity&amp;quot;, however officially Wi-Fi is an abstract term and the Wi-Fi alliance is trying to downplay any association to &amp;quot;Hi-Fi&amp;quot; (High Fidelity).&lt;br /&gt;
&lt;br /&gt;
Many cities globally, have announced plans for a city-wide Wi-Fi network. Many such project have since been cancelled due to unforseen difficulties however, a few (such as Sunnyvale, California) were successful. The city-wide networks were created by meshing several wireless antenna together and effectively creating a very large hotspot.&lt;br /&gt;
&lt;br /&gt;
==Uses==&lt;br /&gt;
A Wi-Fi enabled device can connect to the internet if the access point it reaches is part of a network containing the internet. A wi-Fi enabled device can essentially use the internet for any networking purpose. &lt;br /&gt;
&lt;br /&gt;
There exists many wireless 'hotspots' which integrate one or more access points and the hotspots can span a range of a few meters to several kilometers( Sunnyvale, California for example, offers free city-wide Wi-Fi). Many businesses offer wireless hotspots as either free or pay services in order to attract customers. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi devices can operate in different modes such as peer-to-peer mode, which allows a direct connection between two people. In ad-hoc mode Wi-Fi devices are able to make client-to-client connections without a router. &lt;br /&gt;
&lt;br /&gt;
Wi-Fi can enable wireless voice application (VoIP). The widespread growth of Wi-Fi now allows access to the internet outside 'traditional' setups (such as the bathroom). Wi-Fi installations can ultimately provide: a sequre computer networking gateway, firewall, DHCP server, intrusion detection system and many other services.&lt;br /&gt;
&lt;br /&gt;
==Advantages and Challenges==&lt;br /&gt;
&lt;br /&gt;
==Security==&lt;br /&gt;
The greatest security issue with Wi-Fi (and all other wireless networks) is the easy of connectivity compared to traditional wired networks like Ethernet. Wireless communication (bluetooth especially) is designed to be simple and easily connected to. To make an attack on a wired network, the attacker must physically connect to the internal network or break through an external firewall. External access however is usually disallowed by business networks in order to protect sensitive data. It is because firewall encryption could be broken that most business networks disallow external access. Getting wireless reception is considered an attack to most business networks.&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The nature most wireless networks is to allow external access in order to maintain an degree of usability. If attackers gain access to a wireless network they can harm the user in a variety of ways from monitoring others' activity to fabricating a DNS spoofing attack. &lt;br /&gt;
&lt;br /&gt;
===Preventative Measures===&lt;br /&gt;
[[Image:Wep.gif|thumb|The WEP encryption standard. The vunerabilities are shown by malicious software and a single key for all users on the network.]]&lt;br /&gt;
WEP (Wired Equivalent Privacy) keys uses a deprecated algorithm to secure Wireless networks. First introduced in 1997, WEP keys were intended to make wireless networks have comparable security to that of wired networks. A WEP key could be interpreted as a 26 digit password allowing access to a home network. There are several security flaws in the WEP keys currently being used and there exists readily available software (such as AirSnort or AirCrack) that can obtain a WEP key in minutes. WEP keys are now considered completely broken. The security flaws of WEP keys was first counteracted in 2002 with 'Wi-Fi Protected Access' (WPA) but the attack vector are now known. Now (as of 2004), full IEEE 802.11i (WPA2) encryption standards have been release and are still considered secure as of 2009. &lt;br /&gt;
&lt;br /&gt;
Another security measure in effect involves suppressing the Access Points' SSID broadcast to only allow a predefined set of MAC addresses the ability to join the network. This security measure has since proven ineffective, since if an allowed MAC address is known (or found out) by an attacker then they could potentially change their own MAC address to spoof as an allowed machine.  &lt;br /&gt;
&lt;br /&gt;
===DNS Spoofing and Kaminsky Attack===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Piggybacking===&lt;br /&gt;
Piggybacking refers to accessing a wireless internet connection by bringing a wireless device in range of another connection and using the service without the owners knowledge or permission. Piggybacking is completely outlawed in some jurisdictions, but allowed in others. It is not considered piggybacking if a bussiness offers a Wi-Fi hotspot for free or as a pay service. &lt;br /&gt;
&lt;br /&gt;
Piggybacking ofter goes unnoticed since most people only use a fraction of their upstream bandwidth. Piggybacking may also be carried out unintentionally, as most access points are configured without encryption (WPA2) and operating systems can automatically connect to wireless networks. The danger in piggybacking exists in users logging into an insecure network where illicit activity is conducted (danger for network owner) or sensitive information is broadcast (danger for user).&lt;br /&gt;
&lt;br /&gt;
===The Wi-Fi Scam, Home Security Scam and Bluetooth Scam===&lt;br /&gt;
'The Real Hustle' a UK television show is premised as an educational program demonstrating how people are getting ripped-off by confidence men around the world. The hustlers demonstrate how easy it is to gain access to a Wireless network through various scams. &lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=jqic_aY3TqQ&amp;amp;feature=related Wi-Fi Scam], the hustlers hijack a wireless network then rename their own wireless network and route people to a dummy site that looks completely legitimate. &lt;br /&gt;
&lt;br /&gt;
In the Home Security Scam, the hustlers walk through a residential neighborhood and enter home wireless networks by either hacking WEP keys or finding an unlocked network. The hustlers then monitor others online activity.&lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=gvDp-DBh4Gc&amp;amp;feature=related Bluetooth Scam], the hustlers scan a shopping mall for bluetooth signals from mobile phones. Once a signal is found and a connection is made, the hustlers call their premium rate line and rack up a bill for the cell phone owner.&lt;br /&gt;
&lt;br /&gt;
There exists dozens of tutorials on the Internet on how to use Wi-Fi for illicit purposes, demonstrating just how vunerable a wireless network is.&lt;br /&gt;
&lt;br /&gt;
==Other 802 Standards and Amendments==&lt;br /&gt;
[http://en.wikipedia.org/wiki/IEEE_802 See: IEEE 802 Wiki]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
# Comer, D. E. (2006). Wi-Fi. ''Internetworking with TCP/IP'' (Fifth ed., pp. 419-441). Upper Saddle River, NJ: Pearson Prentice Hall.&lt;br /&gt;
# &amp;quot;[http://www.wilcorpinc.com/wifi_history.htm Wi-Fi History]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# &amp;quot;[http://networkbits.net/wireless-printing/80211-g-pros-cons-of-a-wireless-network-in-a-business-environment/ Pros and Cons...]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Hamilr3|Hamilr3]] 00:51, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Wi-Fi</id>
		<title>Wi-Fi</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Wi-Fi"/>
				<updated>2009-04-11T04:22:30Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Wifilogo.jpg|thumb|Wi-Fi logo]]&lt;br /&gt;
''Wi-Fi is a consortium that verifies 802.11b wireless network products interoperate, and a marketing term vendors use to sell their products.''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Wi-Fi is a subsection of the IEEE 802, a subcategory in the link layer of the TCP/IP [[The Five-Layer TCP/IP Model: Description/Attacks/Defense|Internet Protocol Suite]]. The Wi-Fi alliance is a trade group that owns the 'Wi-Fi' trademark, a symbol that certifies interoperability between wireless devices. Not every Internet product is Wi-Fi certified however, and there exists many devices that are able to interoperate wirelessly without the Wi-Fi logo. Some products have chosen to omit having Wi-Fi certification to avoid paying certification costs.&lt;br /&gt;
&lt;br /&gt;
The use of Wi-Fi has boomed in recent years and is supported by a multitude of different devices. Laptops. game consoles, smartphones, printers and other peripherals usually have Wi-Fi certification. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
[[Image:Metro Wireless Node.jpg|thumb|A municipal wireless antenna. Such devices are integral in creating a mesh network of access points. ]]&lt;br /&gt;
Wi-Fi was invented by Vic Hayes (dubbed 'the father of Wi-Fi') at the NCR Corporation/AT &amp;amp; T (later Lucent &amp;amp; Agere Systems), in 1991. Hayes had been designing IEEE standards for 802.11b, 802.11a and 802.11g and subsequent technology, initially meant for cashier systems. NCR initially released the technology under the name of 'WaveLAN' which operated in a range of 1Mbps-2 Mbps. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; The Wi-Fi alliance was created soon after the technology. &lt;br /&gt;
&lt;br /&gt;
The alliance is a consortium of separate, independent companies that promotes and develops IEEE 802.11 standards. The alliance also tests products to establish interoperability and certifies products that pass. The 'Wi-Fi' logo is allowed to be used by manufacturers who subscribe to the alliance and whose products pass testing. There exists sever unofficial &amp;quot;Wi-Fi&amp;quot; products that may work, but lack true certification.&lt;br /&gt;
&lt;br /&gt;
The term &amp;quot;Wi-Fi&amp;quot; was coined by Interbrand Corporation in August 1999 when hired by the Alliance to change the name from 'IEEE 802.11b Direct Sequence.' Interbrand also created the official 'Wi-Fi' logo. It is often assumed that Wi-Fi stands for &amp;quot;Wireless Fidelity&amp;quot;, however officially Wi-Fi is an abstract term and the Wi-Fi alliance is trying to downplay any association to &amp;quot;Hi-Fi&amp;quot; (High Fidelity).&lt;br /&gt;
&lt;br /&gt;
Many cities globally, have announced plans for a city-wide Wi-Fi network. Many such project have since been cancelled due to unforseen difficulties however, a few (such as Sunnyvale, California) were successful. The city-wide networks were created by meshing several wireless antenna together and effectively creating a very large hotspot.&lt;br /&gt;
&lt;br /&gt;
==Uses==&lt;br /&gt;
&lt;br /&gt;
==Advantages and Challenges==&lt;br /&gt;
&lt;br /&gt;
==Security==&lt;br /&gt;
The greatest security issue with Wi-Fi (and all other wireless networks) is the easy of connectivity compared to traditional wired networks like Ethernet. Wireless communication (bluetooth especially) is designed to be simple and easily connected to. To make an attack on a wired network, the attacker must physically connect to the internal network or break through an external firewall. External access however is usually disallowed by business networks in order to protect sensitive data. It is because firewall encryption could be broken that most business networks disallow external access. Getting wireless reception is considered an attack to most business networks.&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The nature most wireless networks is to allow external access in order to maintain an degree of usability. If attackers gain access to a wireless network they can harm the user in a variety of ways from monitoring others' activity to fabricating a DNS spoofing attack. &lt;br /&gt;
&lt;br /&gt;
===Preventative Measures===&lt;br /&gt;
[[Image:Wep.gif|thumb|The WEP encryption standard. The vunerabilities are shown by malicious software and a single key for all users on the network.]]&lt;br /&gt;
WEP (Wired Equivalent Privacy) keys uses a deprecated algorithm to secure Wireless networks. First introduced in 1997, WEP keys were intended to make wireless networks have comparable security to that of wired networks. A WEP key could be interpreted as a 26 digit password allowing access to a home network. There are several security flaws in the WEP keys currently being used and there exists readily available software (such as AirSnort or AirCrack) that can obtain a WEP key in minutes. WEP keys are now considered completely broken. The security flaws of WEP keys was first counteracted in 2002 with 'Wi-Fi Protected Access' (WPA) but the attack vector are now known. Now (as of 2004), full IEEE 802.11i (WPA2) encryption standards have been release and are still considered secure as of 2009. &lt;br /&gt;
&lt;br /&gt;
Another security measure in effect involves suppressing the Access Points' SSID broadcast to only allow a predefined set of MAC addresses the ability to join the network. This security measure has since proven ineffective, since if an allowed MAC address is known (or found out) by an attacker then they could potentially change their own MAC address to spoof as an allowed machine.  &lt;br /&gt;
&lt;br /&gt;
===DNS Spoofing and Kaminsky Attack===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Piggybacking===&lt;br /&gt;
Piggybacking refers to accessing a wireless internet connection by bringing a wireless device in range of another connection and using the service without the owners knowledge or permission. Piggybacking is completely outlawed in some jurisdictions, but allowed in others. It is not considered piggybacking if a bussiness offers a Wi-Fi hotspot for free or as a pay service. &lt;br /&gt;
&lt;br /&gt;
Piggybacking ofter goes unnoticed since most people only use a fraction of their upstream bandwidth. Piggybacking may also be carried out unintentionally, as most access points are configured without encryption (WPA2) and operating systems can automatically connect to wireless networks. The danger in piggybacking exists in users logging into an insecure network where illicit activity is conducted (danger for network owner) or sensitive information is broadcast (danger for user).&lt;br /&gt;
&lt;br /&gt;
===The Wi-Fi Scam, Home Security Scam and Bluetooth Scam===&lt;br /&gt;
'The Real Hustle' a UK television show is premised as an educational program demonstrating how people are getting ripped-off by confidence men around the world. The hustlers demonstrate how easy it is to gain access to a Wireless network through various scams. &lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=jqic_aY3TqQ&amp;amp;feature=related Wi-Fi Scam], the hustlers hijack a wireless network then rename their own wireless network and route people to a dummy site that looks completely legitimate. &lt;br /&gt;
&lt;br /&gt;
In the Home Security Scam, the hustlers walk through a residential neighborhood and enter home wireless networks by either hacking WEP keys or finding an unlocked network. The hustlers then monitor others online activity.&lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=gvDp-DBh4Gc&amp;amp;feature=related Bluetooth Scam], the hustlers scan a shopping mall for bluetooth signals from mobile phones. Once a signal is found and a connection is made, the hustlers call their premium rate line and rack up a bill for the cell phone owner.&lt;br /&gt;
&lt;br /&gt;
There exists dozens of tutorials on the Internet on how to use Wi-Fi for illicit purposes, demonstrating just how vunerable a wireless network is.&lt;br /&gt;
&lt;br /&gt;
==Other 802 Standards and Amendments==&lt;br /&gt;
[http://en.wikipedia.org/wiki/IEEE_802 See: IEEE 802 Wiki]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
# Comer, D. E. (2006). Wi-Fi. ''Internetworking with TCP/IP'' (Fifth ed., pp. 419-441). Upper Saddle River, NJ: Pearson Prentice Hall.&lt;br /&gt;
# &amp;quot;[http://www.wilcorpinc.com/wifi_history.htm Wi-Fi History]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# &amp;quot;[http://networkbits.net/wireless-printing/80211-g-pros-cons-of-a-wireless-network-in-a-business-environment/ Pros and Cons...]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Hamilr3|Hamilr3]] 00:51, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Wep.gif</id>
		<title>File:Wep.gif</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Wep.gif"/>
				<updated>2009-04-11T04:20:15Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Wi-Fi</id>
		<title>Wi-Fi</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Wi-Fi"/>
				<updated>2009-04-11T04:16:55Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Wifilogo.jpg|thumb|Wi-Fi logo]]&lt;br /&gt;
''Wi-Fi is a consortium that verifies 802.11b wireless network products interoperate, and a marketing term vendors use to sell their products.''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Wi-Fi is a subsection of the IEEE 802, a subcategory in the link layer of the TCP/IP [[The Five-Layer TCP/IP Model: Description/Attacks/Defense|Internet Protocol Suite]]. The Wi-Fi alliance is a trade group that owns the 'Wi-Fi' trademark, a symbol that certifies interoperability between wireless devices. Not every Internet product is Wi-Fi certified however, and there exists many devices that are able to interoperate wirelessly without the Wi-Fi logo. Some products have chosen to omit having Wi-Fi certification to avoid paying certification costs.&lt;br /&gt;
&lt;br /&gt;
The use of Wi-Fi has boomed in recent years and is supported by a multitude of different devices. Laptops. game consoles, smartphones, printers and other peripherals usually have Wi-Fi certification. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
[[Image:Metro Wireless Node.jpg|thumb|A municipal wireless antenna. Such devices are integral in creating a mesh network of access points. ]]&lt;br /&gt;
Wi-Fi was invented by Vic Hayes (dubbed 'the father of Wi-Fi') at the NCR Corporation/AT &amp;amp; T (later Lucent &amp;amp; Agere Systems), in 1991. Hayes had been designing IEEE standards for 802.11b, 802.11a and 802.11g and subsequent technology, initially meant for cashier systems. NCR initially released the technology under the name of 'WaveLAN' which operated in a range of 1Mbps-2 Mbps. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; The Wi-Fi alliance was created soon after the technology. &lt;br /&gt;
&lt;br /&gt;
The alliance is a consortium of separate, independent companies that promotes and develops IEEE 802.11 standards. The alliance also tests products to establish interoperability and certifies products that pass. The 'Wi-Fi' logo is allowed to be used by manufacturers who subscribe to the alliance and whose products pass testing. There exists sever unofficial &amp;quot;Wi-Fi&amp;quot; products that may work, but lack true certification.&lt;br /&gt;
&lt;br /&gt;
The term &amp;quot;Wi-Fi&amp;quot; was coined by Interbrand Corporation in August 1999 when hired by the Alliance to change the name from 'IEEE 802.11b Direct Sequence.' Interbrand also created the official 'Wi-Fi' logo. It is often assumed that Wi-Fi stands for &amp;quot;Wireless Fidelity&amp;quot;, however officially Wi-Fi is an abstract term and the Wi-Fi alliance is trying to downplay any association to &amp;quot;Hi-Fi&amp;quot; (High Fidelity).&lt;br /&gt;
&lt;br /&gt;
Many cities globally, have announced plans for a city-wide Wi-Fi network. Many such project have since been cancelled due to unforseen difficulties however, a few (such as Sunnyvale, California) were successful. The city-wide networks were created by meshing several wireless antenna together and effectively creating a very large hotspot.&lt;br /&gt;
&lt;br /&gt;
==Uses==&lt;br /&gt;
&lt;br /&gt;
==Advantages and Challenges==&lt;br /&gt;
&lt;br /&gt;
==Security==&lt;br /&gt;
The greatest security issue with Wi-Fi (and all other wireless networks) is the easy of connectivity compared to traditional wired networks like Ethernet. Wireless communication (bluetooth especially) is designed to be simple and easily connected to. To make an attack on a wired network, the attacker must physically connect to the internal network or break through an external firewall. External access however is usually disallowed by business networks in order to protect sensitive data. It is because firewall encryption could be broken that most business networks disallow external access. Getting wireless reception is considered an attack to most business networks.&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The nature most wireless networks is to allow external access in order to maintain an degree of usability. If attackers gain access to a wireless network they can harm the user in a variety of ways from monitoring others' activity to fabricating a DNS spoofing attack. &lt;br /&gt;
&lt;br /&gt;
===Preventative Measures===&lt;br /&gt;
WEP (Wired Equivalent Privacy) keys uses a deprecated algorithm to secure Wireless networks. First introduced in 1997, WEP keys were intended to make wireless networks have comparable security to that of wired networks. A WEP key could be interpreted as a 26 digit password allowing access to a home network. There are several security flaws in the WEP keys currently being used and there exists readily available software (such as AirSnort or AirCrack) that can obtain a WEP key in minutes. WEP keys are now considered completely broken. The security flaws of WEP keys was first counteracted in 2002 with 'Wi-Fi Protected Access' (WPA) but the attack vector are now known. Now (as of 2004), full IEEE 802.11i (WPA2) encryption standards have been release and are still considered secure as of 2009. &lt;br /&gt;
&lt;br /&gt;
Another security measure in effect involves suppressing the Access Points' SSID broadcast to only allow a predefined set of MAC addresses the ability to join the network. This security measure has since proven ineffective, since if an allowed MAC address is known (or found out) by an attacker then they could potentially change their own MAC address to spoof as an allowed machine.  &lt;br /&gt;
&lt;br /&gt;
===DNS Spoofing and Kaminsky Attack===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Piggybacking===&lt;br /&gt;
Piggybacking refers to accessing a wireless internet connection by bringing a wireless device in range of another connection and using the service without the owners knowledge or permission. Piggybacking is completely outlawed in some jurisdictions, but allowed in others. It is not considered piggybacking if a bussiness offers a Wi-Fi hotspot for free or as a pay service. &lt;br /&gt;
&lt;br /&gt;
Piggybacking ofter goes unnoticed since most people only use a fraction of their upstream bandwidth. Piggybacking may also be carried out unintentionally, as most access points are configured without encryption (WPA2) and operating systems can automatically connect to wireless networks. The danger in piggybacking exists in users logging into an insecure network where illicit activity is conducted (danger for network owner) or sensitive information is broadcast (danger for user).&lt;br /&gt;
&lt;br /&gt;
===The Wi-Fi Scam, Home Security Scam and Bluetooth Scam===&lt;br /&gt;
'The Real Hustle' a UK television show is premised as an educational program demonstrating how people are getting ripped-off by confidence men around the world. The hustlers demonstrate how easy it is to gain access to a Wireless network through various scams. &lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=jqic_aY3TqQ&amp;amp;feature=related Wi-Fi Scam], the hustlers hijack a wireless network then rename their own wireless network and route people to a dummy site that looks completely legitimate. &lt;br /&gt;
&lt;br /&gt;
In the Home Security Scam, the hustlers walk through a residential neighborhood and enter home wireless networks by either hacking WEP keys or finding an unlocked network. The hustlers then monitor others online activity.&lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=gvDp-DBh4Gc&amp;amp;feature=related Bluetooth Scam], the hustlers scan a shopping mall for bluetooth signals from mobile phones. Once a signal is found and a connection is made, the hustlers call their premium rate line and rack up a bill for the cell phone owner.&lt;br /&gt;
&lt;br /&gt;
There exists dozens of tutorials on the Internet on how to use Wi-Fi for illicit purposes, demonstrating just how vunerable a wireless network is.&lt;br /&gt;
&lt;br /&gt;
==Other 802 Standards and Amendments==&lt;br /&gt;
[http://en.wikipedia.org/wiki/IEEE_802 See: IEEE 802 Wiki]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
# Comer, D. E. (2006). Wi-Fi. ''Internetworking with TCP/IP'' (Fifth ed., pp. 419-441). Upper Saddle River, NJ: Pearson Prentice Hall.&lt;br /&gt;
# &amp;quot;[http://www.wilcorpinc.com/wifi_history.htm Wi-Fi History]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# &amp;quot;[http://networkbits.net/wireless-printing/80211-g-pros-cons-of-a-wireless-network-in-a-business-environment/ Pros and Cons...]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Hamilr3|Hamilr3]] 00:51, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Wi-Fi</id>
		<title>Wi-Fi</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Wi-Fi"/>
				<updated>2009-04-10T20:17:26Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;/* History */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Wifilogo.jpg|thumb|Wi-Fi logo]]&lt;br /&gt;
''Wi-Fi is a consortium that verifies 802.11b wireless network products interoperate, and a marketing term vendors use to sell their products.''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Wi-Fi is a subsection of the IEEE 802, a subcategory in the link layer of the TCP/IP [[The Five-Layer TCP/IP Model: Description/Attacks/Defense|Internet Protocol Suite]]. The Wi-Fi alliance is a trade group that owns the 'Wi-Fi' trademark, a symbol that certifies interoperability between wireless devices. Not every Internet product is Wi-Fi certified however, and there exists many devices that are able to interoperate wirelessly without the Wi-Fi logo. Some products have chosen to omit having Wi-Fi certification to avoid paying certification costs.&lt;br /&gt;
&lt;br /&gt;
The use of Wi-Fi has boomed in recent years and is supported by a multitude of different devices. Laptops. game consoles, smartphones, printers and other peripherals usually have Wi-Fi certification. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
[[Image:Metro Wireless Node.jpg|thumb|A municipal wireless antenna. Such devices are integral in creating a mesh network of access points. ]]&lt;br /&gt;
Wi-Fi was invented by Vic Hayes (dubbed 'the father of Wi-Fi') at the NCR Corporation/AT &amp;amp; T (later Lucent &amp;amp; Agere Systems), in 1991. Hayes had been designing IEEE standards for 802.11b, 802.11a and 802.11g and subsequent technology, initially meant for cashier systems. NCR initially released the technology under the name of 'WaveLAN' which operated in a range of 1Mbps-2 Mbps. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; The Wi-Fi alliance was created soon after the technology. &lt;br /&gt;
&lt;br /&gt;
The alliance is a consortium of separate, independent companies that promotes and develops IEEE 802.11 standards. The alliance also tests products to establish interoperability and certifies products that pass. The 'Wi-Fi' logo is allowed to be used by manufacturers who subscribe to the alliance and whose products pass testing. There exists sever unofficial &amp;quot;Wi-Fi&amp;quot; products that may work, but lack true certification.&lt;br /&gt;
&lt;br /&gt;
The term &amp;quot;Wi-Fi&amp;quot; was coined by Interbrand Corporation in August 1999 when hired by the Alliance to change the name from 'IEEE 802.11b Direct Sequence.' Interbrand also created the official 'Wi-Fi' logo. It is often assumed that Wi-Fi stands for &amp;quot;Wireless Fidelity&amp;quot;, however officially Wi-Fi is an abstract term and the Wi-Fi alliance is trying to downplay any association to &amp;quot;Hi-Fi&amp;quot; (High Fidelity).&lt;br /&gt;
&lt;br /&gt;
Many cities globally, have announced plans for a city-wide Wi-Fi network. Many such project have since been cancelled due to unforseen difficulties however, a few (such as Sunnyvale, California) were successful. The city-wide networks were created by meshing several wireless antenna together and effectively creating a very large hotspot.&lt;br /&gt;
&lt;br /&gt;
==Uses==&lt;br /&gt;
&lt;br /&gt;
==Advantages and Challenges==&lt;br /&gt;
&lt;br /&gt;
==Security==&lt;br /&gt;
The greatest security issue with Wi-Fi (and all other wireless networks) is the easy of connectivity compared to traditional wired networks like Ethernet. Wireless communication (bluetooth especially) is designed to be simple and easily connected to. To make an attack on a wired network, the attacker must physically connect to the internal network or break through an external firewall. External access however is usually disallowed by business networks in order to protect sensitive data. It is because firewall encryption could be broken that most business networks disallow external access. Getting wireless reception is considered an attack to most business networks.&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The nature most wireless networks is to allow external access in order to maintain an degree of usability. If attackers gain access to a wireless network they can harm the user in a variety of ways from monitoring others' activity to fabricating a DNS spoofing attack. &lt;br /&gt;
&lt;br /&gt;
===Preventative Measures===&lt;br /&gt;
WEP (Wired Equivalent Privacy) keys uses a deprecated algorithm to secure Wireless networks. First introduced in 1997, WEP keys were intended to make wireless networks have comparable security to that of wired networks. A WEP key could be interpreted as a 26 digit password allowing access to a home network. There are several security flaws in the WEP keys currently being used and there exists readily available software (such as AirSnort or AirCrack) that can obtain a WEP key in minutes. WEP keys are now considered completely broken. The security flaws of WEP keys was first counteracted in 2002 with 'Wi-Fi Protected Access' (WPA) but the attack vector are now known. Now (as of 2004), full IEEE 802.11i (WPA2) encryption standards have been release and are still considered secure as of 2009. &lt;br /&gt;
&lt;br /&gt;
Another security measure in effect involves suppressing the Access Points' SSID broadcast to only allow a predefined set of MAC addresses the ability to join the network. This security measure has since proven ineffective, since if an allowed MAC address is known (or found out) by an attacker then they could potentially change their own MAC address to spoof as an allowed machine.  &lt;br /&gt;
&lt;br /&gt;
===DNS Spoofing and Kaminsky Attack===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Piggybacking===&lt;br /&gt;
&lt;br /&gt;
===The Wi-Fi Scam, Home Security Scam and Bluetooth Scam===&lt;br /&gt;
'The Real Hustle' a UK television show is premised as an educational program demonstrating how people are getting ripped-off by confidence men around the world. The hustlers demonstrate how easy it is to gain access to a Wireless network through various scams. &lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=jqic_aY3TqQ&amp;amp;feature=related Wi-Fi Scam], the hustlers hijack a wireless network then rename their own wireless network and route people to a dummy site that looks completely legitimate. &lt;br /&gt;
&lt;br /&gt;
In the Home Security Scam, the hustlers walk through a residential neighborhood and enter home wireless networks by either hacking WEP keys or finding an unlocked network. The hustlers then monitor others online activity.&lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=gvDp-DBh4Gc&amp;amp;feature=related Bluetooth Scam], the hustlers scan a shopping mall for bluetooth signals from mobile phones. Once a signal is found and a connection is made, the hustlers call their premium rate line and rack up a bill for the cell phone owner.&lt;br /&gt;
&lt;br /&gt;
There exists dozens of tutorials on the Internet on how to use Wi-Fi for illicit purposes, demonstrating just how vunerable a wireless network is.&lt;br /&gt;
&lt;br /&gt;
==Other 802 Standards and Amendments==&lt;br /&gt;
[http://en.wikipedia.org/wiki/IEEE_802 See: IEEE 802 Wiki]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
# Comer, D. E. (2006). Wi-Fi. ''Internetworking with TCP/IP'' (Fifth ed., pp. 419-441). Upper Saddle River, NJ: Pearson Prentice Hall.&lt;br /&gt;
# &amp;quot;[http://www.wilcorpinc.com/wifi_history.htm Wi-Fi History]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# &amp;quot;[http://networkbits.net/wireless-printing/80211-g-pros-cons-of-a-wireless-network-in-a-business-environment/ Pros and Cons...]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Hamilr3|Hamilr3]] 00:51, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Wi-Fi</id>
		<title>Wi-Fi</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Wi-Fi"/>
				<updated>2009-04-10T20:13:36Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Wifilogo.jpg|thumb|Wi-Fi logo]]&lt;br /&gt;
''Wi-Fi is a consortium that verifies 802.11b wireless network products interoperate, and a marketing term vendors use to sell their products.''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Wi-Fi is a subsection of the IEEE 802, a subcategory in the link layer of the TCP/IP [[The Five-Layer TCP/IP Model: Description/Attacks/Defense|Internet Protocol Suite]]. The Wi-Fi alliance is a trade group that owns the 'Wi-Fi' trademark, a symbol that certifies interoperability between wireless devices. Not every Internet product is Wi-Fi certified however, and there exists many devices that are able to interoperate wirelessly without the Wi-Fi logo. Some products have chosen to omit having Wi-Fi certification to avoid paying certification costs.&lt;br /&gt;
&lt;br /&gt;
The use of Wi-Fi has boomed in recent years and is supported by a multitude of different devices. Laptops. game consoles, smartphones, printers and other peripherals usually have Wi-Fi certification. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
[[Image:Metro Wireless Node.jpg|thumb|A municipal wireless antenna. Such devices are integral in creating a mesh network of access points. ]]&lt;br /&gt;
Wi-Fi was invented by Vic Hayes (dubbed 'the father of Wi-Fi') at the NCR Corporation/AT &amp;amp; T (later Lucent &amp;amp; Agere Systems), in 1991. Hayes had been designing IEEE standards for 802.11b, 802.11a and 802.11g and subsequent technology, initially meant for cashier systems. NCR initially released the technology under the name of 'WaveLAN' which operated in a range of 1Mbps-2 Mbps. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; The Wi-Fi alliance was created soon after the technology. &lt;br /&gt;
&lt;br /&gt;
The alliance is a consortium of separate, independent companies that promotes and develops IEEE 802.11 standards. The alliance also tests products to establish interoperability and certifies products that pass. The 'Wi-Fi' logo is allowed to be used by manufacturers who subscribe to the alliance and whose products pass testing. There exists sever unofficial &amp;quot;Wi-Fi&amp;quot; products that may work, but lack true certification.&lt;br /&gt;
&lt;br /&gt;
The term &amp;quot;Wi-Fi&amp;quot; was coined by Interbrand Corporation in August 1999 when hired by the Alliance to change the name from 'IEEE 802.11b Direct Sequence.' Interbrand also created the official 'Wi-Fi' logo. It is often assumed that Wi-Fi stands for &amp;quot;Wireless Fidelity&amp;quot;, however officially Wi-Fi is an abstract term and the Wi-Fi alliance is trying to downplay any association to &amp;quot;Hi-Fi&amp;quot; (High Fidelity).&lt;br /&gt;
&lt;br /&gt;
==Uses==&lt;br /&gt;
&lt;br /&gt;
==Advantages and Challenges==&lt;br /&gt;
&lt;br /&gt;
==Security==&lt;br /&gt;
The greatest security issue with Wi-Fi (and all other wireless networks) is the easy of connectivity compared to traditional wired networks like Ethernet. Wireless communication (bluetooth especially) is designed to be simple and easily connected to. To make an attack on a wired network, the attacker must physically connect to the internal network or break through an external firewall. External access however is usually disallowed by business networks in order to protect sensitive data. It is because firewall encryption could be broken that most business networks disallow external access. Getting wireless reception is considered an attack to most business networks.&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The nature most wireless networks is to allow external access in order to maintain an degree of usability. If attackers gain access to a wireless network they can harm the user in a variety of ways from monitoring others' activity to fabricating a DNS spoofing attack. &lt;br /&gt;
&lt;br /&gt;
===Preventative Measures===&lt;br /&gt;
WEP (Wired Equivalent Privacy) keys uses a deprecated algorithm to secure Wireless networks. First introduced in 1997, WEP keys were intended to make wireless networks have comparable security to that of wired networks. A WEP key could be interpreted as a 26 digit password allowing access to a home network. There are several security flaws in the WEP keys currently being used and there exists readily available software (such as AirSnort or AirCrack) that can obtain a WEP key in minutes. WEP keys are now considered completely broken. The security flaws of WEP keys was first counteracted in 2002 with 'Wi-Fi Protected Access' (WPA) but the attack vector are now known. Now (as of 2004), full IEEE 802.11i (WPA2) encryption standards have been release and are still considered secure as of 2009. &lt;br /&gt;
&lt;br /&gt;
Another security measure in effect involves suppressing the Access Points' SSID broadcast to only allow a predefined set of MAC addresses the ability to join the network. This security measure has since proven ineffective, since if an allowed MAC address is known (or found out) by an attacker then they could potentially change their own MAC address to spoof as an allowed machine.  &lt;br /&gt;
&lt;br /&gt;
===DNS Spoofing and Kaminsky Attack===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Piggybacking===&lt;br /&gt;
&lt;br /&gt;
===The Wi-Fi Scam, Home Security Scam and Bluetooth Scam===&lt;br /&gt;
'The Real Hustle' a UK television show is premised as an educational program demonstrating how people are getting ripped-off by confidence men around the world. The hustlers demonstrate how easy it is to gain access to a Wireless network through various scams. &lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=jqic_aY3TqQ&amp;amp;feature=related Wi-Fi Scam], the hustlers hijack a wireless network then rename their own wireless network and route people to a dummy site that looks completely legitimate. &lt;br /&gt;
&lt;br /&gt;
In the Home Security Scam, the hustlers walk through a residential neighborhood and enter home wireless networks by either hacking WEP keys or finding an unlocked network. The hustlers then monitor others online activity.&lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=gvDp-DBh4Gc&amp;amp;feature=related Bluetooth Scam], the hustlers scan a shopping mall for bluetooth signals from mobile phones. Once a signal is found and a connection is made, the hustlers call their premium rate line and rack up a bill for the cell phone owner.&lt;br /&gt;
&lt;br /&gt;
There exists dozens of tutorials on the Internet on how to use Wi-Fi for illicit purposes, demonstrating just how vunerable a wireless network is.&lt;br /&gt;
&lt;br /&gt;
==Other 802 Standards and Amendments==&lt;br /&gt;
[http://en.wikipedia.org/wiki/IEEE_802 See: IEEE 802 Wiki]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
# Comer, D. E. (2006). Wi-Fi. ''Internetworking with TCP/IP'' (Fifth ed., pp. 419-441). Upper Saddle River, NJ: Pearson Prentice Hall.&lt;br /&gt;
# &amp;quot;[http://www.wilcorpinc.com/wifi_history.htm Wi-Fi History]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# &amp;quot;[http://networkbits.net/wireless-printing/80211-g-pros-cons-of-a-wireless-network-in-a-business-environment/ Pros and Cons...]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Hamilr3|Hamilr3]] 00:51, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Metro_Wireless_Node.jpg</id>
		<title>File:Metro Wireless Node.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Metro_Wireless_Node.jpg"/>
				<updated>2009-04-10T20:11:29Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Wi-Fi</id>
		<title>Wi-Fi</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Wi-Fi"/>
				<updated>2009-04-10T18:39:17Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;/* History */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Wifilogo.jpg|thumb|Wi-Fi logo]]&lt;br /&gt;
''Wi-Fi is a consortium that verifies 802.11b wireless network products interoperate, and a marketing term vendors use to sell their products.''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Wi-Fi is a subsection of the IEEE 802, a subcategory in the link layer of the TCP/IP [[The Five-Layer TCP/IP Model: Description/Attacks/Defense|Internet Protocol Suite]]. The Wi-Fi alliance is a trade group that owns the 'Wi-Fi' trademark, a symbol that certifies interoperability between wireless devices. Not every Internet product is Wi-Fi certified however, and there exists many devices that are able to interoperate wirelessly without the Wi-Fi logo. Some products have chosen to omit having Wi-Fi certification to avoid paying certification costs.&lt;br /&gt;
&lt;br /&gt;
The use of Wi-Fi has boomed in recent years and is supported by a multitude of different devices. Laptops. game consoles, smartphones, printers and other peripherals usually have Wi-Fi certification. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
Wi-Fi was invented by Vic Hayes (dubbed 'the father of Wi-Fi') at the NCR Corporation/AT &amp;amp; T (later Lucent &amp;amp; Agere Systems), in 1991. Hayes had been designing IEEE standards for 802.11b, 802.11a and 802.11g and subsequent technology, initially meant for cashier systems. NCR initially released the technology under the name of 'WaveLAN' which operated in a range of 1Mbps-2 Mbps. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt; The Wi-Fi alliance was created soon after the technology. &lt;br /&gt;
&lt;br /&gt;
The alliance is a consortium of separate, independent companies that promotes and develops IEEE 802.11 standards. The alliance also tests products to establish interoperability and certifies products that pass. The 'Wi-Fi' logo is allowed to be used by manufacturers who subscribe to the alliance and whose products pass testing. There exists sever unofficial &amp;quot;Wi-Fi&amp;quot; products that may work, but lack true certification.&lt;br /&gt;
&lt;br /&gt;
The term &amp;quot;Wi-Fi&amp;quot; was coined by Interbrand Corporation in August 1999 when hired by the Alliance to change the name from 'IEEE 802.11b Direct Sequence.' Interbrand also created the official 'Wi-Fi' logo. It is often assumed that Wi-Fi stands for &amp;quot;Wireless Fidelity&amp;quot;, however officially Wi-Fi is an abstract term and the Wi-Fi alliance is trying to downplay any association to &amp;quot;Hi-Fi&amp;quot; (High Fidelity).&lt;br /&gt;
&lt;br /&gt;
==Uses==&lt;br /&gt;
&lt;br /&gt;
==Advantages and Challenges==&lt;br /&gt;
&lt;br /&gt;
==Security==&lt;br /&gt;
The greatest security issue with Wi-Fi (and all other wireless networks) is the easy of connectivity compared to traditional wired networks like Ethernet. Wireless communication (bluetooth especially) is designed to be simple and easily connected to. To make an attack on a wired network, the attacker must physically connect to the internal network or break through an external firewall. External access however is usually disallowed by business networks in order to protect sensitive data. It is because firewall encryption could be broken that most business networks disallow external access. Getting wireless reception is considered an attack to most business networks.&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The nature most wireless networks is to allow external access in order to maintain an degree of usability. If attackers gain access to a wireless network they can harm the user in a variety of ways from monitoring others' activity to fabricating a DNS spoofing attack. &lt;br /&gt;
&lt;br /&gt;
===Preventative Measures===&lt;br /&gt;
WEP (Wired Equivalent Privacy) keys uses a deprecated algorithm to secure Wireless networks. First introduced in 1997, WEP keys were intended to make wireless networks have comparable security to that of wired networks. A WEP key could be interpreted as a 26 digit password allowing access to a home network. There are several security flaws in the WEP keys currently being used and there exists readily available software (such as AirSnort or AirCrack) that can obtain a WEP key in minutes. WEP keys are now considered completely broken. The security flaws of WEP keys was first counteracted in 2002 with 'Wi-Fi Protected Access' (WPA) but the attack vector are now known. Now (as of 2004), full IEEE 802.11i (WPA2) encryption standards have been release and are still considered secure as of 2009. &lt;br /&gt;
&lt;br /&gt;
Another security measure in effect involves suppressing the Access Points' SSID broadcast to only allow a predefined set of MAC addresses the ability to join the network. This security measure has since proven ineffective, since if an allowed MAC address is known (or found out) by an attacker then they could potentially change their own MAC address to spoof as an allowed machine.  &lt;br /&gt;
&lt;br /&gt;
===DNS Spoofing and Kaminsky Attack===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Piggybacking===&lt;br /&gt;
&lt;br /&gt;
===The Wi-Fi Scam, Home Security Scam and Bluetooth Scam===&lt;br /&gt;
'The Real Hustle' a UK television show is premised as an educational program demonstrating how people are getting ripped-off by confidence men around the world. The hustlers demonstrate how easy it is to gain access to a Wireless network through various scams. &lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=jqic_aY3TqQ&amp;amp;feature=related Wi-Fi Scam], the hustlers hijack a wireless network then rename their own wireless network and route people to a dummy site that looks completely legitimate. &lt;br /&gt;
&lt;br /&gt;
In the Home Security Scam, the hustlers walk through a residential neighborhood and enter home wireless networks by either hacking WEP keys or finding an unlocked network. The hustlers then monitor others online activity.&lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=gvDp-DBh4Gc&amp;amp;feature=related Bluetooth Scam], the hustlers scan a shopping mall for bluetooth signals from mobile phones. Once a signal is found and a connection is made, the hustlers call their premium rate line and rack up a bill for the cell phone owner.&lt;br /&gt;
&lt;br /&gt;
There exists dozens of tutorials on the Internet on how to use Wi-Fi for illicit purposes, demonstrating just how vunerable a wireless network is.&lt;br /&gt;
&lt;br /&gt;
==Other 802 Standards and Amendments==&lt;br /&gt;
[http://en.wikipedia.org/wiki/IEEE_802 See: IEEE 802 Wiki]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
# Comer, D. E. (2006). Wi-Fi. ''Internetworking with TCP/IP'' (Fifth ed., pp. 419-441). Upper Saddle River, NJ: Pearson Prentice Hall.&lt;br /&gt;
# &amp;quot;[http://www.wilcorpinc.com/wifi_history.htm Wi-Fi History]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# &amp;quot;[http://networkbits.net/wireless-printing/80211-g-pros-cons-of-a-wireless-network-in-a-business-environment/ Pros and Cons...]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Hamilr3|Hamilr3]] 00:51, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Wi-Fi</id>
		<title>Wi-Fi</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Wi-Fi"/>
				<updated>2009-04-10T17:55:55Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;/* History */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Wifilogo.jpg|thumb|Wi-Fi logo]]&lt;br /&gt;
''Wi-Fi is a consortium that verifies 802.11b wireless network products interoperate, and a marketing term vendors use to sell their products.''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Wi-Fi is a subsection of the IEEE 802, a subcategory in the link layer of the TCP/IP [[The Five-Layer TCP/IP Model: Description/Attacks/Defense|Internet Protocol Suite]]. The Wi-Fi alliance is a trade group that owns the 'Wi-Fi' trademark, a symbol that certifies interoperability between wireless devices. Not every Internet product is Wi-Fi certified however, and there exists many devices that are able to interoperate wirelessly without the Wi-Fi logo. Some products have chosen to omit having Wi-Fi certification to avoid paying certification costs.&lt;br /&gt;
&lt;br /&gt;
The use of Wi-Fi has boomed in recent years and is supported by a multitude of different devices. Laptops. game consoles, smartphones, printers and other peripherals usually have Wi-Fi certification. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
Wi-Fi was invented by Vic Hayes (dubbed 'the father of Wi-Fi') at the NCR Corporation/AT &amp;amp; T (later Lucent &amp;amp; Agere Systems), in 1991. Hayes had been designing IEEE standards for 802.11b, 802.11a and 802.11g and subsequent technology, initially meant for cashier systems. NCR initially released the technology under the name of 'WaveLAN' which operated in a range of 1Mbps-2 Mbps. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The alliance is a consortium of separate, independent companies that promotes and develops IEEE 802.11 standards. The alliance also tests products to establish interoperability and certifies products that pass. The 'Wi-Fi' logo is allowed to be used by manufacturers who subscribe to the alliance and whose products pass testing. There exists sever unofficial &amp;quot;Wi-Fi&amp;quot; products that may work, but lack true certification.&lt;br /&gt;
&lt;br /&gt;
The term &amp;quot;Wi-Fi&amp;quot; was coined by Interbrand Corporation in August 1999 when hired by the Alliance to change the name from 'IEEE 802.11b Direct Sequence.' Interbrand also created the official 'Wi-Fi' logo. It is often assumed that Wi-Fi stands for &amp;quot;Wireless Fidelity&amp;quot;, however officially Wi-Fi is an abstract term and the Wi-Fi alliance is trying to downplay any association to &amp;quot;Hi-Fi&amp;quot; (High Fidelity).&lt;br /&gt;
&lt;br /&gt;
==Uses==&lt;br /&gt;
&lt;br /&gt;
==Advantages and Challenges==&lt;br /&gt;
&lt;br /&gt;
==Security==&lt;br /&gt;
The greatest security issue with Wi-Fi (and all other wireless networks) is the easy of connectivity compared to traditional wired networks like Ethernet. Wireless communication (bluetooth especially) is designed to be simple and easily connected to. To make an attack on a wired network, the attacker must physically connect to the internal network or break through an external firewall. External access however is usually disallowed by business networks in order to protect sensitive data. It is because firewall encryption could be broken that most business networks disallow external access. Getting wireless reception is considered an attack to most business networks.&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The nature most wireless networks is to allow external access in order to maintain an degree of usability. If attackers gain access to a wireless network they can harm the user in a variety of ways from monitoring others' activity to fabricating a DNS spoofing attack. &lt;br /&gt;
&lt;br /&gt;
===Preventative Measures===&lt;br /&gt;
WEP (Wired Equivalent Privacy) keys uses a deprecated algorithm to secure Wireless networks. First introduced in 1997, WEP keys were intended to make wireless networks have comparable security to that of wired networks. A WEP key could be interpreted as a 26 digit password allowing access to a home network. There are several security flaws in the WEP keys currently being used and there exists readily available software (such as AirSnort or AirCrack) that can obtain a WEP key in minutes. WEP keys are now considered completely broken. The security flaws of WEP keys was first counteracted in 2002 with 'Wi-Fi Protected Access' (WPA) but the attack vector are now known. Now (as of 2004), full IEEE 802.11i (WPA2) encryption standards have been release and are still considered secure as of 2009. &lt;br /&gt;
&lt;br /&gt;
Another security measure in effect involves suppressing the Access Points' SSID broadcast to only allow a predefined set of MAC addresses the ability to join the network. This security measure has since proven ineffective, since if an allowed MAC address is known (or found out) by an attacker then they could potentially change their own MAC address to spoof as an allowed machine.  &lt;br /&gt;
&lt;br /&gt;
===DNS Spoofing and Kaminsky Attack===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Piggybacking===&lt;br /&gt;
&lt;br /&gt;
===The Wi-Fi Scam, Home Security Scam and Bluetooth Scam===&lt;br /&gt;
'The Real Hustle' a UK television show is premised as an educational program demonstrating how people are getting ripped-off by confidence men around the world. The hustlers demonstrate how easy it is to gain access to a Wireless network through various scams. &lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=jqic_aY3TqQ&amp;amp;feature=related Wi-Fi Scam], the hustlers hijack a wireless network then rename their own wireless network and route people to a dummy site that looks completely legitimate. &lt;br /&gt;
&lt;br /&gt;
In the Home Security Scam, the hustlers walk through a residential neighborhood and enter home wireless networks by either hacking WEP keys or finding an unlocked network. The hustlers then monitor others online activity.&lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=gvDp-DBh4Gc&amp;amp;feature=related Bluetooth Scam], the hustlers scan a shopping mall for bluetooth signals from mobile phones. Once a signal is found and a connection is made, the hustlers call their premium rate line and rack up a bill for the cell phone owner.&lt;br /&gt;
&lt;br /&gt;
There exists dozens of tutorials on the Internet on how to use Wi-Fi for illicit purposes, demonstrating just how vunerable a wireless network is.&lt;br /&gt;
&lt;br /&gt;
==Other 802 Standards and Amendments==&lt;br /&gt;
[http://en.wikipedia.org/wiki/IEEE_802 See: IEEE 802 Wiki]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
# Comer, D. E. (2006). Wi-Fi. ''Internetworking with TCP/IP'' (Fifth ed., pp. 419-441). Upper Saddle River, NJ: Pearson Prentice Hall.&lt;br /&gt;
# &amp;quot;[http://www.wilcorpinc.com/wifi_history.htm Wi-Fi History]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# &amp;quot;[http://networkbits.net/wireless-printing/80211-g-pros-cons-of-a-wireless-network-in-a-business-environment/ Pros and Cons...]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Hamilr3|Hamilr3]] 00:51, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Wi-Fi</id>
		<title>Wi-Fi</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Wi-Fi"/>
				<updated>2009-04-10T17:47:32Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Wifilogo.jpg|thumb|Wi-Fi logo]]&lt;br /&gt;
''Wi-Fi is a consortium that verifies 802.11b wireless network products interoperate, and a marketing term vendors use to sell their products.''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Wi-Fi is a subsection of the IEEE 802, a subcategory in the link layer of the TCP/IP [[The Five-Layer TCP/IP Model: Description/Attacks/Defense|Internet Protocol Suite]]. The Wi-Fi alliance is a trade group that owns the 'Wi-Fi' trademark, a symbol that certifies interoperability between wireless devices. Not every Internet product is Wi-Fi certified however, and there exists many devices that are able to interoperate wirelessly without the Wi-Fi logo. Some products have chosen to omit having Wi-Fi certification to avoid paying certification costs.&lt;br /&gt;
&lt;br /&gt;
The use of Wi-Fi has boomed in recent years and is supported by a multitude of different devices. Laptops. game consoles, smartphones, printers and other peripherals usually have Wi-Fi certification. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
Wi-Fi was invented by Vic Hayes (dubbed 'the father of Wi-Fi') at the NCR Corporation/AT &amp;amp; T (later Lucent &amp;amp; Agere Systems), in 1991. Hayes had been designing IEEE standards for 802.11b, 802.11a and 802.11g and subsequent technology, initially meant for cashier systems. NCR initially released the technology under the name of 'WaveLAN' which operated in a range of 1Mbps-2 Mbps. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Uses==&lt;br /&gt;
&lt;br /&gt;
==Advantages and Challenges==&lt;br /&gt;
&lt;br /&gt;
==Security==&lt;br /&gt;
The greatest security issue with Wi-Fi (and all other wireless networks) is the easy of connectivity compared to traditional wired networks like Ethernet. Wireless communication (bluetooth especially) is designed to be simple and easily connected to. To make an attack on a wired network, the attacker must physically connect to the internal network or break through an external firewall. External access however is usually disallowed by business networks in order to protect sensitive data. It is because firewall encryption could be broken that most business networks disallow external access. Getting wireless reception is considered an attack to most business networks.&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The nature most wireless networks is to allow external access in order to maintain an degree of usability. If attackers gain access to a wireless network they can harm the user in a variety of ways from monitoring others' activity to fabricating a DNS spoofing attack. &lt;br /&gt;
&lt;br /&gt;
===Preventative Measures===&lt;br /&gt;
WEP (Wired Equivalent Privacy) keys uses a deprecated algorithm to secure Wireless networks. First introduced in 1997, WEP keys were intended to make wireless networks have comparable security to that of wired networks. A WEP key could be interpreted as a 26 digit password allowing access to a home network. There are several security flaws in the WEP keys currently being used and there exists readily available software (such as AirSnort or AirCrack) that can obtain a WEP key in minutes. WEP keys are now considered completely broken. The security flaws of WEP keys was first counteracted in 2002 with 'Wi-Fi Protected Access' (WPA) but the attack vector are now known. Now (as of 2004), full IEEE 802.11i (WPA2) encryption standards have been release and are still considered secure as of 2009. &lt;br /&gt;
&lt;br /&gt;
Another security measure in effect involves suppressing the Access Points' SSID broadcast to only allow a predefined set of MAC addresses the ability to join the network. This security measure has since proven ineffective, since if an allowed MAC address is known (or found out) by an attacker then they could potentially change their own MAC address to spoof as an allowed machine.  &lt;br /&gt;
&lt;br /&gt;
===DNS Spoofing and Kaminsky Attack===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Piggybacking===&lt;br /&gt;
&lt;br /&gt;
===The Wi-Fi Scam, Home Security Scam and Bluetooth Scam===&lt;br /&gt;
'The Real Hustle' a UK television show is premised as an educational program demonstrating how people are getting ripped-off by confidence men around the world. The hustlers demonstrate how easy it is to gain access to a Wireless network through various scams. &lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=jqic_aY3TqQ&amp;amp;feature=related Wi-Fi Scam], the hustlers hijack a wireless network then rename their own wireless network and route people to a dummy site that looks completely legitimate. &lt;br /&gt;
&lt;br /&gt;
In the Home Security Scam, the hustlers walk through a residential neighborhood and enter home wireless networks by either hacking WEP keys or finding an unlocked network. The hustlers then monitor others online activity.&lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=gvDp-DBh4Gc&amp;amp;feature=related Bluetooth Scam], the hustlers scan a shopping mall for bluetooth signals from mobile phones. Once a signal is found and a connection is made, the hustlers call their premium rate line and rack up a bill for the cell phone owner.&lt;br /&gt;
&lt;br /&gt;
There exists dozens of tutorials on the Internet on how to use Wi-Fi for illicit purposes, demonstrating just how vunerable a wireless network is.&lt;br /&gt;
&lt;br /&gt;
==Other 802 Standards and Amendments==&lt;br /&gt;
[http://en.wikipedia.org/wiki/IEEE_802 See: IEEE 802 Wiki]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
# Comer, D. E. (2006). Wi-Fi. ''Internetworking with TCP/IP'' (Fifth ed., pp. 419-441). Upper Saddle River, NJ: Pearson Prentice Hall.&lt;br /&gt;
# &amp;quot;[http://www.wilcorpinc.com/wifi_history.htm Wi-Fi History]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# &amp;quot;[http://networkbits.net/wireless-printing/80211-g-pros-cons-of-a-wireless-network-in-a-business-environment/ Pros and Cons...]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Hamilr3|Hamilr3]] 00:51, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Wi-Fi</id>
		<title>Wi-Fi</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Wi-Fi"/>
				<updated>2009-04-10T17:37:08Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;/* The Wi-Fi Scam, Home Security Scam and Bluetooth Scam */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Wifilogo.jpg|thumb|Wi-Fi logo]]&lt;br /&gt;
''Wi-Fi is a consortium that verifies 802.11b wireless network products interoperate, and a marketing term vendors use to sell their products.''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Wi-Fi is a subsection of the IEEE 802, a subcategory in the link layer of the TCP/IP [[The Five-Layer TCP/IP Model: Description/Attacks/Defense|Internet Protocol Suite]]. The Wi-Fi alliance is a trade group that owns the 'Wi-Fi' trademark, a symbol that certifies interoperability between wireless devices. Not every Internet product is Wi-Fi certified however, and there exists many devices that are able to interoperate wirelessly without the Wi-Fi logo. Some products have chosen to omit having Wi-Fi certification to avoid paying certification costs.&lt;br /&gt;
&lt;br /&gt;
The use of Wi-Fi has boomed in recent years and is supported by a multitude of different devices. Laptops. game consoles, smartphones, printers and other peripherals usually have Wi-Fi certification. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
Wi-Fi was invented by Vic Hayes (dubbed 'the father of Wi-Fi') at the NCR Corporation/AT &amp;amp; T (later Lucent &amp;amp; Agere Systems), in 1991. Hayes had been designing IEEE standards for 802.11b, 802.11a and 802.11g and subsequent technology, initially meant for cashier systems. NCR initially released the technology under the name of 'WaveLAN' which operated in a range of 1Mbps-2 Mbps. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Uses==&lt;br /&gt;
&lt;br /&gt;
==Advantages and Challenges==&lt;br /&gt;
&lt;br /&gt;
==Security==&lt;br /&gt;
The greatest security issue with Wi-Fi (and all other wireless networks) is the easy of connectivity compared to traditional wired networks like Ethernet. Wireless communication (bluetooth especially) is designed to be simple and easily connected to. To make an attack on a wired network, the attacker must physically connect to the internal network or break through an external firewall. External access however is usually disallowed by business networks in order to protect sensitive data. It is because firewall encryption could be broken that most business networks disallow external access. Getting wireless reception is considered an attack to most business networks.&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The nature most wireless networks is to allow external access in order to maintain an degree of usability. If attackers gain access to a wireless network they can harm the user in a variety of ways from monitoring others' activity to fabricating a DNS spoofing attack. &lt;br /&gt;
&lt;br /&gt;
===WEP keys===&lt;br /&gt;
WEP (Wired Equivalent Privacy) keys uses a deprecated algorithm to secure Wireless networks. First introduced in 1997, WEP keys were intended to make wireless networks have comparable security to that of wired networks. A WEP key could be interpreted as a 26 digit password allowing access to a home network.&lt;br /&gt;
&lt;br /&gt;
There are several security flaws in WEP keys currently being used and there exists readily available software that can obtain a WEP key in minutes. &lt;br /&gt;
&lt;br /&gt;
===DNS Spoofing and Kaminsky Attack===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Piggybacking===&lt;br /&gt;
&lt;br /&gt;
===The Wi-Fi Scam, Home Security Scam and Bluetooth Scam===&lt;br /&gt;
'The Real Hustle' a UK television show is premised as an educational program demonstrating how people are getting ripped-off by confidence men around the world. The hustlers demonstrate how easy it is to gain access to a Wireless network through various scams. &lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=jqic_aY3TqQ&amp;amp;feature=related Wi-Fi Scam], the hustlers hijack a wireless network then rename their own wireless network and route people to a dummy site that looks completely legitimate. &lt;br /&gt;
&lt;br /&gt;
In the Home Security Scam, the hustlers walk through a residential neighborhood and enter home wireless networks by either hacking WEP keys or finding an unlocked network. The hustlers then monitor others online activity.&lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=gvDp-DBh4Gc&amp;amp;feature=related Bluetooth Scam], the hustlers scan a shopping mall for bluetooth signals from mobile phones. Once a signal is found and a connection is made, the hustlers call their premium rate line and rack up a bill for the cell phone owner.&lt;br /&gt;
&lt;br /&gt;
There exists dozens of tutorials on the Internet on how to use Wi-Fi for illicit purposes, demonstrating just how vunerable a wireless network is.&lt;br /&gt;
&lt;br /&gt;
==Other 802 Standards and Amendments==&lt;br /&gt;
[http://en.wikipedia.org/wiki/IEEE_802 See: IEEE 802 Wiki]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
# Comer, D. E. (2006). Wi-Fi. ''Internetworking with TCP/IP'' (Fifth ed., pp. 419-441). Upper Saddle River, NJ: Pearson Prentice Hall.&lt;br /&gt;
# &amp;quot;[http://www.wilcorpinc.com/wifi_history.htm Wi-Fi History]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# &amp;quot;[http://networkbits.net/wireless-printing/80211-g-pros-cons-of-a-wireless-network-in-a-business-environment/ Pros and Cons...]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Hamilr3|Hamilr3]] 00:51, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Wi-Fi</id>
		<title>Wi-Fi</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Wi-Fi"/>
				<updated>2009-04-10T06:30:25Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Wifilogo.jpg|thumb|Wi-Fi logo]]&lt;br /&gt;
''Wi-Fi is a consortium that verifies 802.11b wireless network products interoperate, and a marketing term vendors use to sell their products.''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Wi-Fi is a subsection of the IEEE 802, a subcategory in the link layer of the TCP/IP [[The Five-Layer TCP/IP Model: Description/Attacks/Defense|Internet Protocol Suite]]. The Wi-Fi alliance is a trade group that owns the 'Wi-Fi' trademark, a symbol that certifies interoperability between wireless devices. Not every Internet product is Wi-Fi certified however, and there exists many devices that are able to interoperate wirelessly without the Wi-Fi logo. Some products have chosen to omit having Wi-Fi certification to avoid paying certification costs.&lt;br /&gt;
&lt;br /&gt;
The use of Wi-Fi has boomed in recent years and is supported by a multitude of different devices. Laptops. game consoles, smartphones, printers and other peripherals usually have Wi-Fi certification. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
Wi-Fi was invented by Vic Hayes (dubbed 'the father of Wi-Fi') at the NCR Corporation/AT &amp;amp; T (later Lucent &amp;amp; Agere Systems), in 1991. Hayes had been designing IEEE standards for 802.11b, 802.11a and 802.11g and subsequent technology, initially meant for cashier systems. NCR initially released the technology under the name of 'WaveLAN' which operated in a range of 1Mbps-2 Mbps. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Uses==&lt;br /&gt;
&lt;br /&gt;
==Advantages and Challenges==&lt;br /&gt;
&lt;br /&gt;
==Security==&lt;br /&gt;
The greatest security issue with Wi-Fi (and all other wireless networks) is the easy of connectivity compared to traditional wired networks like Ethernet. Wireless communication (bluetooth especially) is designed to be simple and easily connected to. To make an attack on a wired network, the attacker must physically connect to the internal network or break through an external firewall. External access however is usually disallowed by business networks in order to protect sensitive data. It is because firewall encryption could be broken that most business networks disallow external access. Getting wireless reception is considered an attack to most business networks.&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The nature most wireless networks is to allow external access in order to maintain an degree of usability. If attackers gain access to a wireless network they can harm the user in a variety of ways from monitoring others' activity to fabricating a DNS spoofing attack. &lt;br /&gt;
&lt;br /&gt;
===WEP keys===&lt;br /&gt;
WEP (Wired Equivalent Privacy) keys uses a deprecated algorithm to secure Wireless networks. First introduced in 1997, WEP keys were intended to make wireless networks have comparable security to that of wired networks. A WEP key could be interpreted as a 26 digit password allowing access to a home network.&lt;br /&gt;
&lt;br /&gt;
There are several security flaws in WEP keys currently being used and there exists readily available software that can obtain a WEP key in minutes. &lt;br /&gt;
&lt;br /&gt;
===DNS Spoofing and Kaminsky Attack===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Piggybacking===&lt;br /&gt;
&lt;br /&gt;
===The Wi-Fi Scam, Home Security Scam and Bluetooth Scam===&lt;br /&gt;
'The Real Hustle' a UK television show is premised as an educational program demonstrating how people are getting ripped-off by confidence men around the world. The hustlers demonstrate how easy it is to gain access to a Wireless network through various scams.&lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=jqic_aY3TqQ&amp;amp;feature=related Wi-Fi Scam], the hustlers hijack a wireless network then rename their own wireless network and route people to a dummy site that looks completely legitimate. &lt;br /&gt;
&lt;br /&gt;
In the Home Security Scam, the hustlers walk through a residential neighborhood and enter home wireless networks by either hacking WEP keys or finding an unlocked network. The hustlers then monitor others online activity.&lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=gvDp-DBh4Gc&amp;amp;feature=related Bluetooth Scam], the hustlers scan a shopping mall for bluetooth signals from mobile phones. Once a signal is found and a connection is made, the hustlers call their premium rate line and rack up a bill for the cell phone owner. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Other 802 Standards and Amendments==&lt;br /&gt;
[http://en.wikipedia.org/wiki/IEEE_802 See: IEEE 802 Wiki]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
# Comer, D. E. (2006). Wi-Fi. ''Internetworking with TCP/IP'' (Fifth ed., pp. 419-441). Upper Saddle River, NJ: Pearson Prentice Hall.&lt;br /&gt;
# &amp;quot;[http://www.wilcorpinc.com/wifi_history.htm Wi-Fi History]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# &amp;quot;[http://networkbits.net/wireless-printing/80211-g-pros-cons-of-a-wireless-network-in-a-business-environment/ Pros and Cons...]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Hamilr3|Hamilr3]] 00:51, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Wi-Fi</id>
		<title>Wi-Fi</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Wi-Fi"/>
				<updated>2009-04-10T06:09:20Z</updated>
		
		<summary type="html">&lt;p&gt;Hamilr3:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Wifilogo.jpg|thumb|Wi-Fi logo]]&lt;br /&gt;
''Wi-Fi is a consortium that verifies 802.11b wireless network products interoperate, and a marketing term vendors use to sell their products.''&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Wi-Fi is a subsection of the IEEE 802, a subcategory in the link layer of the TCP/IP [[The Five-Layer TCP/IP Model: Description/Attacks/Defense|Internet Protocol Suite]]. The Wi-Fi alliance is a trade group that owns the 'Wi-Fi' trademark, a symbol that certifies interoperability between wireless devices. Not every Internet product is Wi-Fi certified however, and there exists many devices that are able to interoperate wirelessly without the Wi-Fi logo. Some products have chosen to omit having Wi-Fi certification to avoid paying certification costs.&lt;br /&gt;
&lt;br /&gt;
The use of Wi-Fi has boomed in recent years and is supported by a multitude of different devices. Laptops. game consoles, smartphones, printers and other peripherals usually have Wi-Fi certification. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==History==&lt;br /&gt;
Wi-Fi was invented by Vic Hayes (dubbed 'the father of Wi-Fi') at the NCR Corporation/AT &amp;amp; T (later Lucent &amp;amp; Agere Systems), in 1991. Hayes had been designing IEEE standards for 802.11b, 802.11a and 802.11g and subsequent technology, initially meant for cashier systems. NCR initially released the technology under the name of 'WaveLAN' which operated in a range of 1Mbps-2 Mbps. &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Uses==&lt;br /&gt;
&lt;br /&gt;
==Advantages and Challenges==&lt;br /&gt;
&lt;br /&gt;
==Security==&lt;br /&gt;
The greatest security issue with Wi-Fi (and all other wireless networks) is the easy of connectivity compared to traditional wired networks like Ethernet. Wireless communication (bluetooth especially) is designed to be simple and easily connected to. To make an attack on a wired network, the attacker must physically connect to the internal network or break through an external firewall. External access however is usually disallowed by business networks in order to protect sensitive data. It is because firewall encryption could be broken that most business networks disallow external access. Getting wireless reception is considered an attack to most business networks.&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The nature most wireless networks is to allow external access in order to maintain an degree of usability. If&lt;br /&gt;
&lt;br /&gt;
===WEP keys===&lt;br /&gt;
WEP (Wired Equivalent Privacy) keys uses a deprecated algorithm to secure Wireless networks. First introduced in 1997, WEP keys were intended to make wireless networks have comparable security to that of wired networks. A WEP key could be interpreted as a 26 digit password allowing access to a home network.&lt;br /&gt;
&lt;br /&gt;
There are several security flaws in WEP keys currently being used and there exists readily available software that can obtain a WEP key in minutes. &lt;br /&gt;
&lt;br /&gt;
===DNS Spoofing and Kaminsky Attack===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Piggybacking===&lt;br /&gt;
&lt;br /&gt;
===The Wi-Fi Scam, Home Security Scam and Bluetooth Scam===&lt;br /&gt;
'The Real Hustle' a UK television show is premised as an educational program demonstrating how people are getting ripped-off by confidence men around the world. The hustlers demonstrate how easy it is to gain access to a Wireless network through various scams.&lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=jqic_aY3TqQ&amp;amp;feature=related Wi-Fi Scam], the hustlers hijack a wireless network then rename their own wireless network and route people to a dummy site that looks completely legitimate. &lt;br /&gt;
&lt;br /&gt;
In the Home Security Scam, the hustlers walk through a residential neighborhood and enter home wireless networks by either hacking WEP keys or finding an unlocked network. The hustlers then monitor others online activity.&lt;br /&gt;
&lt;br /&gt;
In the [http://www.youtube.com/watch?v=gvDp-DBh4Gc&amp;amp;feature=related Bluetooth Scam], the hustlers scan a shopping mall for bluetooth signals from mobile phones. Once a signal is found and a connection is made, the hustlers call their premium rate line and rack up a bill for the cell phone owner. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Other 802 Standards and Amendments==&lt;br /&gt;
[http://en.wikipedia.org/wiki/IEEE_802 See: IEEE 802 Wiki]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
# Comer, D. E. (2006). Wi-Fi. ''Internetworking with TCP/IP'' (Fifth ed., pp. 419-441). Upper Saddle River, NJ: Pearson Prentice Hall.&lt;br /&gt;
# &amp;quot;[http://www.wilcorpinc.com/wifi_history.htm Wi-Fi History]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
# &amp;quot;[http://networkbits.net/wireless-printing/80211-g-pros-cons-of-a-wireless-network-in-a-business-environment/ Pros and Cons...]&amp;quot;. Retrieved on 2009-04-07&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Hamilr3|Hamilr3]] 00:51, 10 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Hamilr3</name></author>	</entry>

	</feed>