Jighi

About Jighi

This author has not yet filled in any details.
So far Jighi has created 44 blog entries.
3 10, 2017

Insider fraud in the banking industry: What if we could help you prevent, detect and respond to insider fraud?

By | October 3rd, 2017|Conference|0 Comments

An insider threat is a malicious hacker (also called a cracker or a black hat) who is an employee or officer of a business, institution, or agency. The term can also apply to an outside person who poses as an employee or officer by obtaining false credentials. The hacker obtains access to the computer systems [...]

9 09, 2016

Wi-Fi / WLAN Channels, Frequencies, Bands & Bandwidths

By | September 9th, 2016|Tech Reference|0 Comments

Wi-Fi / WLAN / 802.11 channels, their channel frequencies and bandwidth allocations around the globe, spectral mask and summary of which channels can be used together for WLAN solutions. The IEEE 802.11 Wi-Fi / WLAN standards set the attributes for the different channels that may be used. These attributes enable different Wi-Fi modules to talk [...]

7 12, 2015

RADIUS Security and Best Practices

By | December 7th, 2015|Tech Reference|0 Comments

Remote Authentication Dial-In User Service (RADIUS) is commonly used to provide centralized authentication, authorization, and accounting for dial-up, virtual private network, and, more recently, wireless network access. This article provides an overview of RADIUS and the Extensible Authentication Protocol (EAP) and discusses how to minimize or resolve various security issues of the RADIUS protocol using [...]

7 07, 2015

Wireless Network Installation Tips

By | July 7th, 2015|Tech Reference|0 Comments

When building your wireless network some basic installation techniques and rules must be followed to ensure optimal performance. The bullets below outline some of the basic steps that are required for a successful installation.

7 07, 2015

WIFI Channels

By | July 7th, 2015|Tech Reference|0 Comments

We've long been pretty comfortable with TCP/IP networking down to the bit level, but our conversion to 802.11b wireless has been very recent. We love the functionality, of course, but we've been puzzled by how all the pieces fit together. What are "channels"? How does "sniffing" work? What's the over-the-air protocol?