Technology

Wireless Security tips from PC Magazine

This article provides a good summary of best practices for WLAN security.

http://www.pcmag.com/article2/0,4149,1276349,00.asp

Improving Wireless LAN Authentication: A Description of the Authentication in 802.1x Standard

white paper from RSA

Abstract: This article describes an Extensible Authentication Protocol (EAP) mechanism for mutual authentication and session key generation in a roaming environment. The server authentication and the negotiation of the session key is done using the PPP EAP Transport Layer Security (TLS) authentication protocol. This user authenticates using a PPP EAP mechanism, integrity and privacy protected by TLS. In essence, a wrapping of EAP inside TLS inside EAP is specified. An important application discussed in this document is providing authentication of access points and stations within an IEEE 802.11 Wireless Local Area Network (WLAN), but other applications such as Personal Area Network (PAN) access over Bluetooth might also be considered in the future.

Improving Wireless LAN Authentication: A Description of the Authentication in 802.1x Standard

white paper from RSA

Abstract: This article describes an Extensible Authentication Protocol (EAP) mechanism for mutual authentication and session key generation in a roaming environment. The server authentication and the negotiation of the session key is done using the PPP EAP Transport Layer Security (TLS) authentication protocol. This user authenticates using a PPP EAP mechanism, integrity and privacy protected by TLS. In essence, a wrapping of EAP inside TLS inside EAP is specified. An important application discussed in this document is providing authentication of access points and stations within an IEEE 802.11 Wireless Local Area Network (WLAN), but other applications such as Personal Area Network (PAN) access over Bluetooth might also be considered in the future.

UK Wants Libraries to Go Wi-Fi

If you haven't been following Bill Drew's Wireless Section you might be interested in This Short BBC Piece, spotted byGary Deane, that says the UK E-commerce minister's vision of Britain's broadband future includes wireless, high-speed broadband net access in libraries. "I want to see every public library in the UK have a wi-fi hotspot", he said. The minister said out of the £6 billion earmarked for e-government over the next three years, £1 billion of that would be pushed into ensuring Britons have increased broadband connectivity, particularly in rural areas.

Topic: 

My name is **** and I'm a Systems Librarian

Sarah Johnson writes "The prolific Rachel Singer Gordon has written another interesting piece on the nature of systems librarianship, this time for LIBRES, an e-journal based in Australia. Overcoming the Systems Librarian Imposter Syndrome talks about the reasons why many systems librarians feel needlessly inadequate in their positions, particularly when compared to IT staff with a formal technical background."

Topic: 

New WLAN Center at PC Magazine

"My So Called Wireless Life
Do you feel that way? Well now's the time to get real with wireless. Whether you're a wireless wannabe, or a war driving wizard, we've got loads of great content for you, starting today. Why? Because we're launching a Wireless Center on PCMag.com and rolling out the first of our eight-part weekly series on unwiring your life—starting with wirelessly enabling your home. So if you want to go wireless at home or on the go, or you want to improve the wireless you have, don't miss our special report." - Jim Louderback - ZDnet

Passwords multiply as users' rage rises

This One from The Baltimore Sun says in the digital age, people are on the verge of "password rage," frustrated with the abundance of codes they are required to memorize to secure their various networked devices. And the pressure to update the numerical and alphabetical soup keeps growing as threats of intrusions, cyberterrorism and identity theft increase.

"Our brains virtually have infinite capacity," says James L. McGaugh, director of the Center for the Neurobiology of Learning and Memory at the University of California at Irvine. "There's absolutely no problem with capacity. We do have problems with interference. If you're required to have eight characters with a combination of letters and numbers, and then you're asked to change that every few months - jeez, how do you remember all that? It's confusion."

Topic: 

Computer dangers may be hard to find

Steve Fesenmaier writes "Things are a lot worse than most people imagine when it comes to worms, viruses, and other alien software on your computer...here's a NYT article about the Klez and other lurking insidious PC dangers.

Topic: 

Join the Library Talk on Audio Avenue

Lori Bell writes "Join the Library Talk on Audio Avenue!Audio Avenue is a new, accessible online community developed by the talking book centers in Illinois using ivocalize.com software. The community will offer online programs and outreach for librarians and other professionals serving the visually impaired as well as programs of different types for the visually impaired.All times for programs are Central Time.Listed below are the fall programs at Audio Avenue. Join our electronic list for announcements on programs.

Topic: 

Whither those myriad library search boxes (federated searching)

Simultaneous searching of multiple collections and resources through a single
interface (sometimes called "federated searching" or "one search"
solutions) would represent the biggest improvement in library usability since
the switch from card catalogs and printed indexes to online catalogs and databases.
Below is a short introduction to federated searching and where its going.

Topic: 

Pages

Subscribe to Technology