home *** CD-ROM | disk | FTP | other *** search
/ New Perspectives on Computer Concepts / New Perspectives on Computer Concepts.iso / np2010c / page341.pag < prev    next >
Portable Network Graphic  |  2008-10-02  |  87KB  |  817x1045  |  8-bit (256 colors)
Labels: hakham | laptop | path | plant | road | sky | stairs
OCR: LANS AND WLANS 27 3 should be left on until you configure the rest of the devices that you plan to use on your network Do need to take any special steps to secure my wireless net work? Wireless networks are much more susceptible to unauthorized access and use than wired networks Some measure security can be gained by enabling encryption as explained in Section When is the router configuration complete? Basic router configu- ration requires you to change the router password enter an SSID and activate encryption. Your wireless networking utility offers additional config- uration options, but they are not needed for typical home and school networks. With your router configuration complete, you can close the router utility and set up the rest of the network. How do Iset up workstations and oth ...