Network Settings: "Work" compared to "The Internet"

To obtain the most functionality out of your iPAQ, we suggest you configure your settings to reflect “WORK” instead of “The Internet” whenever possible, as a lot of methods of connectivity are NOT supported under “The Internet” (see table below).

Function/Ability Work The Internet
         
         
VPN     x-mark
ActiveSync     x-mark 
Socks/Winsock   (Both)   x-mark 
Host Access   WINS Style (no periods)   DNS Style (periods)
Proxy Server     x-mark 

 

I would whole-heartedly suggest that EVERYONE set their connection to WORK (aka “My Work Network”), as it offers so much more than THE INTERNET. Here’s how to do it:

1.) Go to START > SETTINGS > CONNECTIONS > ADVANCED (tab). Choose “Select Networks” button and make sure BOTH of the entries on the subsequent page are set to “My Work Network”. Click “OK”.
2.) Then, click on the “Network Card” button, and then choose the Network Adapters tab (if it’s not already the default tab). Make sure this selection also refers to “My network card connections to:” and then the choice “Work”. Click on OK.
3.) Then the last verification: Go to START > SETTINGS > CONNECTIONS, then on the (default) Tasks Tab, choose SET UP MY PROXY SERVER option and make sure the top option “This network connects to the Internet” is checked, and that the 2nd option is UNCHECKED!

You’re done!

Side by Side Comparison of Wireless Formats

If you have ever wondered about the various Wireless protocols like CDMA and GSM, here they are! I have provided all of the formats that I can think of, as well as a run down on the specifications of each format:

PROTOCOL: 802.11a

  • MAIN USE: PC Networking
  • FREQUENCY: 5GHz
  • RANGE: 25-75ft inside/100ft Outside
  • SPEED: ~54Mbps
  • NOTES: Not backwardly compatible with 802.11b, 802.11g. Other 5GHz devices may disrupt connection

Continue reading

The Different WiFi Authentication & Encryption Standards

WEP:
The 40-bit and 64-bit Question:
Wired Equivalent Privacy uses a streaming cipher, which combines the use of a 40-bit WEP Key with a 24-bit random number (known as the Initialization Vector, or IV ) generated by the Router/AP to encrypt the data. You can think of the IV as simply a header for the key. So, for a 64-bit Cipher, the user actually contributes a key length is 40-bits (5 bytes or 10HEX characters), with an additional 24-bits (3 bytes) of system-generated data, for a total of 64-bits (8 bytes) total.

* If you are entering your Key in HEX format, your Key should be 10 HEX characters long.

Continue reading