Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Free
Faster access than browser!
 

Wi-Fi Protected Setup

Index Wi-Fi Protected Setup

Wi-Fi Protected Setup (WPS; originally, Wi-Fi Simple Config) is a network security standard to create a secure wireless home network. [1]

31 relations: Brute-force attack, Checksum, Communication protocol, Cryptographic nonce, Extensible Authentication Protocol, Firmware, Home network, Microsoft, Near-field communication, Netgear, Network security, Order of magnitude, Out-of-band data, Personal identification number, Pre-shared key, Radio-frequency identification, Security, Software developer, Station (networking), Tactical Network Solutions, Type-length-value, United States Computer Emergency Readiness Team, Universal Plug and Play, Usability, USB flash drive, Wi-Fi, Wi-Fi Alliance, Wi-Fi Direct, Wi-Fi Protected Access, Windows Vista, Wireless access point.

Brute-force attack

In cryptography, a brute-force attack consists of an attacker trying many passwords or passphrases with the hope of eventually guessing correctly.

New!!: Wi-Fi Protected Setup and Brute-force attack · See more »

Checksum

A checksum is a small-sized datum derived from a block of digital data for the purpose of detecting errors which may have been introduced during its transmission or storage.

New!!: Wi-Fi Protected Setup and Checksum · See more »

Communication protocol

In telecommunication, a communication protocol is a system of rules that allow two or more entities of a communications system to transmit information via any kind of variation of a physical quantity.

New!!: Wi-Fi Protected Setup and Communication protocol · See more »

Cryptographic nonce

In cryptography, a nonce is an arbitrary number that can be used just once.

New!!: Wi-Fi Protected Setup and Cryptographic nonce · See more »

Extensible Authentication Protocol

Extensible Authentication Protocol, or EAP, is an authentication framework frequently used in wireless networks and point-to-point connections.

New!!: Wi-Fi Protected Setup and Extensible Authentication Protocol · See more »

Firmware

In electronic systems and computing, firmware is a specific class of computer software that provides the low-level control for the device's specific hardware.

New!!: Wi-Fi Protected Setup and Firmware · See more »

Home network

A home network or home area network (HAN) is a type of computer network that facilitates communication among devices within the close vicinity of a home.

New!!: Wi-Fi Protected Setup and Home network · See more »

Microsoft

Microsoft Corporation (abbreviated as MS) is an American multinational technology company with headquarters in Redmond, Washington.

New!!: Wi-Fi Protected Setup and Microsoft · See more »

Near-field communication

Near-field communication (NFC) is a set of communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone, to establish communication by bringing them within 4 cm (1.6 in) of each other.

New!!: Wi-Fi Protected Setup and Near-field communication · See more »

Netgear

Netgear Inc. (stylized NETGEAR) is a multinational computer networking company based in San Jose, California, with offices in about 25 other countries.

New!!: Wi-Fi Protected Setup and Netgear · See more »

Network security

Network security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.

New!!: Wi-Fi Protected Setup and Network security · See more »

Order of magnitude

An order of magnitude is an approximate measure of the number of digits that a number has in the commonly-used base-ten number system.

New!!: Wi-Fi Protected Setup and Order of magnitude · See more »

Out-of-band data

In computer networking, out-of-band data is the data transferred through a stream that is independent from the main in-band data stream.

New!!: Wi-Fi Protected Setup and Out-of-band data · See more »

Personal identification number

A personal identification number (PIN, pronounced "pin"; is often spoken out loud "PIN number" by mistake) is a numeric or alpha-numeric password or code used in the process of authenticating or identifying a user to a system and system to a user.

New!!: Wi-Fi Protected Setup and Personal identification number · See more »

Pre-shared key

In cryptography, a pre-shared key (PSK) is a shared secret which was previously shared between the two parties using some secure channel before it needs to be used.

New!!: Wi-Fi Protected Setup and Pre-shared key · See more »

Radio-frequency identification

Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects.

New!!: Wi-Fi Protected Setup and Radio-frequency identification · See more »

Security

Security is freedom from, or resilience against, potential harm (or other unwanted coercive change) from external forces.

New!!: Wi-Fi Protected Setup and Security · See more »

Software developer

A software developer is a person concerned with facets of the software development process, including the research, design, programming, and testing of computer software.

New!!: Wi-Fi Protected Setup and Software developer · See more »

Station (networking)

In IEEE 802.11 (Wi-Fi) terminology, a station (abbreviated as STA) is a device that has the capability to use the 802.11 protocol.

New!!: Wi-Fi Protected Setup and Station (networking) · See more »

Tactical Network Solutions

Tactical Network Solutions is a Maryland-based information security company specializing in 802.11 and Wi-Fi Protected Setup (WPS).

New!!: Wi-Fi Protected Setup and Tactical Network Solutions · See more »

Type-length-value

Within data communication protocols, TLV (type-length-value or tag-length-value) is an encoding scheme used for optional information element in a certain protocol.

New!!: Wi-Fi Protected Setup and Type-length-value · See more »

United States Computer Emergency Readiness Team

The United States Computer Emergency Readiness Team (US-CERT) is an organization within the Department of Homeland Security’s (DHS) National Protection and Programs Directorate (NPPD).

New!!: Wi-Fi Protected Setup and United States Computer Emergency Readiness Team · See more »

Universal Plug and Play

Universal Plug and Play (UPnP) is a set of networking protocols that permits networked devices, such as personal computers, printers, Internet gateways, Wi-Fi access points and mobile devices to seamlessly discover each other's presence on the network and establish functional network services for data sharing, communications, and entertainment.

New!!: Wi-Fi Protected Setup and Universal Plug and Play · See more »

Usability

Usability is the ease of use and learnability of a human-made object such as a tool or device.

New!!: Wi-Fi Protected Setup and Usability · See more »

USB flash drive

A USB flash drive, also variously known as a thumb drive, pen drive, gig stick, flash stick, jump drive, disk key, disk on key (after the original M-Systems DiskOnKey drive from 2000), flash-drive, memory stick (not to be confused with the Sony Memory Stick), USB stick or USB memory, is a data storage device that includes flash memory with an integrated USB interface.

New!!: Wi-Fi Protected Setup and USB flash drive · See more »

Wi-Fi

Wi-Fi or WiFi is technology for radio wireless local area networking of devices based on the IEEE 802.11 standards.

New!!: Wi-Fi Protected Setup and Wi-Fi · See more »

Wi-Fi Alliance

Wi-Fi Alliance is a non-profit organization that promotes Wi-Fi technology and certifies Wi-Fi products if they conform to certain standards of interoperability.

New!!: Wi-Fi Protected Setup and Wi-Fi Alliance · See more »

Wi-Fi Direct

Wi-Fi Direct, initially called Wi-Fi P2P, is a Wi-Fi standard enabling devices to easily connect with each other without requiring a wireless access point.

New!!: Wi-Fi Protected Setup and Wi-Fi Direct · See more »

Wi-Fi Protected Access

Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) are two security protocols and security certification programs developed by the Wi-Fi Alliance to secure wireless computer networks.

New!!: Wi-Fi Protected Setup and Wi-Fi Protected Access · See more »

Windows Vista

Windows Vista (codenamed Longhorn) is an operating system by Microsoft for use on personal computers, including home and business desktops, laptops, tablet PCs and media center PCs.

New!!: Wi-Fi Protected Setup and Windows Vista · See more »

Wireless access point

20018 In computer networking, a wireless access point (WAP), or more generally just access point (AP), is a networking hardware device that allows a Wi-Fi device to connect to a wired network.

New!!: Wi-Fi Protected Setup and Wireless access point · See more »

Redirects here:

QSS (Wi-Fi), Quick Security Setup, WPS-PBC, WPS-PIN, Wi-Fi Simple Config, Wifi Protected Setup.

References

[1] https://en.wikipedia.org/wiki/Wi-Fi_Protected_Setup

OutgoingIncoming
Hey! We are on Facebook now! »