Security threats in a Wi-Fi Network

This article attempts to understand what kind of threats a Wi-Fi network could face, especially given the fact that even a person going on a road nearby could reach the enterprise Wi-Fi singals. We look at the vulnerabilities of WEP network, Network sniffers, SSID broadcasting, DOS attacks, De-Auth attacks, Mac-address spoofing, Man-in-the-middle attacks, honey pot attacks, rogue access points and the threat faced by them, Patches in your PC not being up to date, ad-hoc networks, Special Wi-Fi devices like Wireless cameras and wireless phones, loopholes in the authentication protocols, hackers who escape counter scanning by wireless IDS devices.

Continue reading

Options available for displaying content in Video Conferencing along with video

This article tells about the various options available to display content (other than the video output from the camera(s)) – document camera output, DVD player output, Output from a PC monitor, Smart board output and the options of displaying them at the other end. These optional accessories and their applications are to compliment the face to face discussions. Of course, the main display is the video conference output and along with it, other content can be displayed.

Continue reading

Wireless Mesh Networks

This article is about Wireless Mesh networks – how they eliminate the wires that connect to the wireless access point, applications of a mesh network, how mesh networks are formed and managed, what is mesh clustering and what are the advantages, what are the dis-advantages of a mesh network and of course, why mesh networks are exciting.

Continue reading

PC based personal Video Conferencing systems

This article looks at the alternatives available to web-conferences (video) to enable a more professional and quality video conferences right from your desktop via a software application. These PC based personal video conferencing solutions can also enable inter-office one to one or one-to-many video calling/ conferences. So, we look at the features, options, constraints and of course, why it is exciting.

Continue reading