wireless attack

wireless attack
атака на беспроводную сеть
попытка несанкционированного доступа к беспроводной ЛВС
см. тж. wireless security

Англо-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. . 1998-2007.

Игры ⚽ Поможем решить контрольную работу

Смотреть что такое "wireless attack" в других словарях:

  • Wireless intrusion prevention system — In computing, a wireless intrusion prevention system (WIPS) is a network device that monitors the radio spectrum for the presence of unauthorized access points (intrusion detection) , and can automatically take countermeasures (intrusion… …   Wikipedia

  • Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… …   Wikipedia

  • Wireless hacking — In security breaches, wireless hacking is the unauthorized use or penetration of a wireless network. A wireless network can be penetrated in a number of ways. There are methods ranging from those that demand a high level of technological skill… …   Wikipedia

  • Wireless Festival — Main stage of the 2008 Wireless Festival The Wireless Festival is a music festival in England that takes place every year in Hyde Park, London, and took place at Harewood House, Leeds in 2006 and 2007. It is owned and managed by Live Nation. Fro …   Wikipedia

  • Attack on Sydney Harbour — Infobox Military Conflict conflict=Attack on Sydney Harbour partof=the Battle for Australia during World War II caption=1 June 1942. A Japanese Ko hyoteki class midget submarine, believed to be Midget No. 14, is raised from Sydney Harbour date=31 …   Wikipedia

  • Wireless signal jammer — Due the nature of the radio transmission the wireless LANs are very vulnerable against denial of service (DoS) attacks. Wireless signal Jamming (RF jamming) is one kind of DoS attack, and devices used for these kind of attacks are called Wireless …   Wikipedia

  • Cracking of wireless networks — is the penetration of wireless networks. A wireless network can be penetrated in a number of ways. These ways vary greatly in the level of computer skill and commitment they require. Once within a network, a skilled hacker can modify software,… …   Wikipedia

  • Battle of Wireless Ridge — Infobox Military Conflict conflict=Battle of Wireless Ridge caption= partof=Falklands War date=13 June 1982 ndash; 14 June 1982 place=Wireless Ridge, Falkland Islands result=British victory combatant1=flagicon|UK United Kingdom… …   Wikipedia

  • Clear Channel Assessment attack — A Clear Channel Assessment attack or Queensland attack is physical layer DoS attack against Wi Fi networks. The attack focuses the need of a wireless network to receive the Clear Channel Assessment ; which is a function within CSMA/CA to… …   Wikipedia

  • Evil twin (wireless networks) — Evil Twin is a term for a rogue Wi Fi access point that appears to be a legitimate one offered on the premises, but actually has been set up by a hacker to eavesdrop on wireless communications among Internet surfers. [ Strange Wi Fi spots may… …   Wikipedia

  • Man-in-the-middle attack — Not to be confused with Meet in the middle attack. In cryptography, the man in the middle attack (often abbreviated MITM), bucket brigade attack, or sometimes Janus attack, is a form of active eavesdropping in which the attacker makes independent …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»