PDF documents require
Adobe Acrobat Reader,
available free at:



Wireless 802.11 Sites

Palo Wireless


MetaGeek.Net: Wi-Spy

Wi-Fi  www.wi-fi.org

Wi-Fi Planet



VisiWave WLAN

Wireless Security, Wardriving

Wireless Antenna Cables -- DataPro


Wireless Antenna Connectors

Five JavaScript Calculators


802.11 Protocol Map

WiFi_Signal Values


home mail contact Us site map
  Wireless Resource Center (802.11, Bluetooth, GSM, GPRS ...)

Free WiFi Solutions (Zone:CD)

Wi-Spy 2.4GHz spectrum analyzer

Wi-Fi Alliance - certified products

Wi-Fi News, Research and Technology

Wireless LAN tool - recovers WEP encryption keys passively

Wireless network diagnostics and Wi-Fi news

Wireless LAN site survey tool

Wireless LAN 802.11 Security

Wireless antenna cables


Wireless cable connectors - images

Wireless Calculators (Power and Performance)

Wireless 802.11 poster - PDF

802.11 Signal and noise metrics - PDF





WPA-PSK Key Generator

Wi-Fi Protected Access (WPA and WPA2) is a class of systems to secure wireless networks.
WPA implements the majority of the IEEE 802.11i standard, WPA2 implements the full standard.

Personal WPA utilizes less scalable "pre-shared key" (PSK) mode,
where every allowed computer is given the same passphrase.
In PSK mode, security depends on the strength of the passphrase.

Data is encrypted using the RC4 stream cipher, with a 128-bit key and a 48-bit initialization vector (IV).
One major improvement in WPA over WEP is the Temporal Key Integrity Protocol (TKIP),
which dynamically changes keys as the system is used.
When combined with the much larger initialization vector, this defeats the well-known key recovery attacks on WEP.

 A more secure message authentication code, for improved payload integrity (usually known as a MAC,
 but here termed a MIC for "message integrity code")  is used in WPA,
 an algorithm named "Michael". The MIC used in WPA includes a frame counter,
 which prevents replay attacks being executed.

WPA2 implements the mandatory elements of 802.11i. In particular, in addition to TKIP and the Michael algorithm,
it introduces a new AES-based algorithm, CCMP, that is considered fully secure.


Any material furnished by Nickerson Consulting Group, N-cg.net, is furnished on an "as is" basis. Nickerson Consulting Group makes no warranties of any kind, either expressed or implied as to any matter including, but not limited to, warranty of fitness for a particular purpose or merchantability, exclusivity or results obtained from use of the material. Nickerson Consulting Group does not make any warranty of any kind with respect to freedom from patent, trademark, or copyright infringement.


© copyright 2007 created by www.ITCharts.com