Wi-Fi Pages and links
  Homemade Antenna
  Antenna Connectors
  Laptop Mini Wireless Antenna
  Long Range How-To
  Customize your Wireless Router
  Howto - Windows XP VPN
  Public Wifi Safety
  The State of WiMAX
  Pre-N Wireless Roundup
  Securing Your Wireless Network
  Hardware for Point-to-point links
  MIMO Wireless Guide
  Highspeed Wireless Bridge
  Linux Based AP
  Access Point Comparison
  Limiting Shared Bandwidth
  Antenna Cabling
  Netgear DG834G
  USR MAXg Router
  Linksys WAG354G
  3Com 3CRWDR100A-72
Hardware insides
  Inside a 3Com 3CRWDR100A-72
  Inside a Buffalo WBRG54
  Inside a Linksys Wag54g
  Inside a Belkin F5D7130
  Inside a Buffalo Airstation
  Inside a Linksys Wap11
  Wireless Hacks
  Building Wireless Community Networks
  802.11 Security
  Wireless Network Starter Kit
  Hardware Hacking for Geeks
  Older News
  Privacy policy

Wireless Hacks

Wireless Hacks: 100 Industrial Strength Tips & Tricks.

By Rob Flickenger


As with any new technology, buying your gear is only the first step. Understanding how to make the best use of it is another story. Wireless Hacks offers 100 industrial-strength tips about wireless networking, contributed by experts who apply what they know in the real world every day. Each Hack can be read in just a few minutes, but can save you hours of research. Inside, you will find a wealth of useful techniques for making the most out of wireless technology, including:

  • Making sense of the alphabet soup of the 802.11 standards, and understanding which technology makes sense for your solving particular problem
  • Using Bluetooth, mobile radios, mobile data networks, and other exotic methods to keep you connected, no matter where you are
  • Practical methods for detecting, analyzing, and monitoring wireless networks
  • Extending the range of your network, and making the best possible use of the available radio spectrum
  • Designing and building your own antennas
  • Engineering long distance network links that span several miles
  • Understanding the security issues of wireless networking, and protecting yourself and your users from unauthorized access and eavesdropping

© 2002-2010 wireless.gumph.org

Valid HTML 4.01! Valid CSS!