31 relations: Brute-force attack, Checksum, Communication protocol, Cryptographic nonce, Extensible Authentication Protocol, Firmware, Home network, Microsoft, Near-field communication, Netgear, Network security, Order of magnitude, Out-of-band data, Personal identification number, Pre-shared key, Radio-frequency identification, Security, Software developer, Station (networking), Tactical Network Solutions, Type-length-value, United States Computer Emergency Readiness Team, Universal Plug and Play, Usability, USB flash drive, Wi-Fi, Wi-Fi Alliance, Wi-Fi Direct, Wi-Fi Protected Access, Windows Vista, Wireless access point.
Brute-force attack
In cryptography, a brute-force attack consists of an attacker trying many passwords or passphrases with the hope of eventually guessing correctly.
New!!: Wi-Fi Protected Setup and Brute-force attack · See more »
Checksum
A checksum is a small-sized datum derived from a block of digital data for the purpose of detecting errors which may have been introduced during its transmission or storage.
New!!: Wi-Fi Protected Setup and Checksum · See more »
Communication protocol
In telecommunication, a communication protocol is a system of rules that allow two or more entities of a communications system to transmit information via any kind of variation of a physical quantity.
New!!: Wi-Fi Protected Setup and Communication protocol · See more »
Cryptographic nonce
In cryptography, a nonce is an arbitrary number that can be used just once.
New!!: Wi-Fi Protected Setup and Cryptographic nonce · See more »
Extensible Authentication Protocol
Extensible Authentication Protocol, or EAP, is an authentication framework frequently used in wireless networks and point-to-point connections.
New!!: Wi-Fi Protected Setup and Extensible Authentication Protocol · See more »
Firmware
In electronic systems and computing, firmware is a specific class of computer software that provides the low-level control for the device's specific hardware.
New!!: Wi-Fi Protected Setup and Firmware · See more »
Home network
A home network or home area network (HAN) is a type of computer network that facilitates communication among devices within the close vicinity of a home.
New!!: Wi-Fi Protected Setup and Home network · See more »
Microsoft
Microsoft Corporation (abbreviated as MS) is an American multinational technology company with headquarters in Redmond, Washington.
New!!: Wi-Fi Protected Setup and Microsoft · See more »
Near-field communication
Near-field communication (NFC) is a set of communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone, to establish communication by bringing them within 4 cm (1.6 in) of each other.
New!!: Wi-Fi Protected Setup and Near-field communication · See more »
Netgear
Netgear Inc. (stylized NETGEAR) is a multinational computer networking company based in San Jose, California, with offices in about 25 other countries.
New!!: Wi-Fi Protected Setup and Netgear · See more »
Network security
Network security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.
New!!: Wi-Fi Protected Setup and Network security · See more »
Order of magnitude
An order of magnitude is an approximate measure of the number of digits that a number has in the commonly-used base-ten number system.
New!!: Wi-Fi Protected Setup and Order of magnitude · See more »
Out-of-band data
In computer networking, out-of-band data is the data transferred through a stream that is independent from the main in-band data stream.
New!!: Wi-Fi Protected Setup and Out-of-band data · See more »
Personal identification number
A personal identification number (PIN, pronounced "pin"; is often spoken out loud "PIN number" by mistake) is a numeric or alpha-numeric password or code used in the process of authenticating or identifying a user to a system and system to a user.
New!!: Wi-Fi Protected Setup and Personal identification number · See more »
Pre-shared key
In cryptography, a pre-shared key (PSK) is a shared secret which was previously shared between the two parties using some secure channel before it needs to be used.
New!!: Wi-Fi Protected Setup and Pre-shared key · See more »
Radio-frequency identification
Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects.
New!!: Wi-Fi Protected Setup and Radio-frequency identification · See more »
Security
Security is freedom from, or resilience against, potential harm (or other unwanted coercive change) from external forces.
New!!: Wi-Fi Protected Setup and Security · See more »
Software developer
A software developer is a person concerned with facets of the software development process, including the research, design, programming, and testing of computer software.
New!!: Wi-Fi Protected Setup and Software developer · See more »
Station (networking)
In IEEE 802.11 (Wi-Fi) terminology, a station (abbreviated as STA) is a device that has the capability to use the 802.11 protocol.
New!!: Wi-Fi Protected Setup and Station (networking) · See more »
Tactical Network Solutions
Tactical Network Solutions is a Maryland-based information security company specializing in 802.11 and Wi-Fi Protected Setup (WPS).
New!!: Wi-Fi Protected Setup and Tactical Network Solutions · See more »
Type-length-value
Within data communication protocols, TLV (type-length-value or tag-length-value) is an encoding scheme used for optional information element in a certain protocol.
New!!: Wi-Fi Protected Setup and Type-length-value · See more »
United States Computer Emergency Readiness Team
The United States Computer Emergency Readiness Team (US-CERT) is an organization within the Department of Homeland Security’s (DHS) National Protection and Programs Directorate (NPPD).
New!!: Wi-Fi Protected Setup and United States Computer Emergency Readiness Team · See more »
Universal Plug and Play
Universal Plug and Play (UPnP) is a set of networking protocols that permits networked devices, such as personal computers, printers, Internet gateways, Wi-Fi access points and mobile devices to seamlessly discover each other's presence on the network and establish functional network services for data sharing, communications, and entertainment.
New!!: Wi-Fi Protected Setup and Universal Plug and Play · See more »
Usability
Usability is the ease of use and learnability of a human-made object such as a tool or device.
New!!: Wi-Fi Protected Setup and Usability · See more »
USB flash drive
A USB flash drive, also variously known as a thumb drive, pen drive, gig stick, flash stick, jump drive, disk key, disk on key (after the original M-Systems DiskOnKey drive from 2000), flash-drive, memory stick (not to be confused with the Sony Memory Stick), USB stick or USB memory, is a data storage device that includes flash memory with an integrated USB interface.
New!!: Wi-Fi Protected Setup and USB flash drive · See more »
Wi-Fi
Wi-Fi or WiFi is technology for radio wireless local area networking of devices based on the IEEE 802.11 standards.
New!!: Wi-Fi Protected Setup and Wi-Fi · See more »
Wi-Fi Alliance
Wi-Fi Alliance is a non-profit organization that promotes Wi-Fi technology and certifies Wi-Fi products if they conform to certain standards of interoperability.
New!!: Wi-Fi Protected Setup and Wi-Fi Alliance · See more »
Wi-Fi Direct
Wi-Fi Direct, initially called Wi-Fi P2P, is a Wi-Fi standard enabling devices to easily connect with each other without requiring a wireless access point.
New!!: Wi-Fi Protected Setup and Wi-Fi Direct · See more »
Wi-Fi Protected Access
Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) are two security protocols and security certification programs developed by the Wi-Fi Alliance to secure wireless computer networks.
New!!: Wi-Fi Protected Setup and Wi-Fi Protected Access · See more »
Windows Vista
Windows Vista (codenamed Longhorn) is an operating system by Microsoft for use on personal computers, including home and business desktops, laptops, tablet PCs and media center PCs.
New!!: Wi-Fi Protected Setup and Windows Vista · See more »
Wireless access point
20018 In computer networking, a wireless access point (WAP), or more generally just access point (AP), is a networking hardware device that allows a Wi-Fi device to connect to a wired network.
New!!: Wi-Fi Protected Setup and Wireless access point · See more »
Redirects here:
QSS (Wi-Fi), Quick Security Setup, WPS-PBC, WPS-PIN, Wi-Fi Simple Config, Wifi Protected Setup.
References
[1] https://en.wikipedia.org/wiki/Wi-Fi_Protected_Setup