What would a world completely without wires be like? In this Spotlight section we take a closer look at what is happening in the wireless space.
There are articles about research and initiatives which are on the horizon.
In this section you will also find stories about how companies are using wireless, such as trials being run using wireless technologies.
Red-M's Red-Alert Pro is a wireless intrusion detection probe that senses 802.11 a, b, g, and even Bluetooth activity simultaneously. It logs security threats and feeds the details to a Red Detect server if run in managed mode, or stores it if run standalone. Red-Alert Pro keeps track of connections between known and unknown devices, making an alert whenever a new unknown device is present and informing you of which device(s) the unknown entity is communicating with. If run in standalone mode, the security logs can be accessed via a convenient and intuitive web interface. If run in managed mode, the Red Detect server handles the logs.
This is a flexible, robust, very scalable and multi-purpose wireless security solution. It provides rogue detection, troubleshooting, vulnerability assessment, intrusion detection, performance management and usage accounting. It has a standard Windows GUI with an open source Firebird database that includes a secure, password-protected interface, and can be easily configured both for a small business or a large enterprise.
BlueSecure from Bluesocket is a leader in its field. Why? Because while most wireless security products are not able to detect anyone walking up with a wireless capable computer and connecting to their network, BlueSecure detects computers, access points, or any other type of wireless connection device.
Despite the names (Konstantin Gavrilenko, Andrei Mikhailovsky, Andrew Vladimirov), the three people who wrote this book are based in the UK and are the founders of an IT security company there by the name of Arhout. They have decided to impart gems of knowledge to us about wireless networks and how to kept hackers out. Or alternatively if you possess a degree of moral flexibility, you could use this book to learn about hacking into said networks.