Here are a series of three outstanding articles on how WEP is cracked, and how it can be secured:
Part 1, Setup & Network Recon
Part 2, Performing the Crack
Part 3, Securing your WLAN
Printable View
Here are a series of three outstanding articles on how WEP is cracked, and how it can be secured:
Part 1, Setup & Network Recon
Part 2, Performing the Crack
Part 3, Securing your WLAN