WEP key


Also found in: Dictionary.

WEP key

A password chosen for the Wired Equivalent Privacy security protocol. See WEP.
Copyright © 1981-2019 by The Computer Language Company Inc. All Rights reserved. THIS DEFINITION IS FOR PERSONAL USE ONLY. All other reproduction is strictly prohibited without permission from the publisher.
References in periodicals archive ?
It's possible behind to use open key authentication that it is completely secure and doesn't expose the WEP key to traffic sniffers.
The WEP/WPA Key Generator supports 64 bit & 128 bit, WEP keys, and 64 bit, 160 bit, 504 bit, WPA keys for maximum security.
By capturing approximately 5 million data packets, Airsnort could "guess" most WEP keys. This number would statistically ensure collection of approximately 4,000 interesting IVs.
See the installation instructions provided by your NIC vendor on how to enter your WEP key on each device.
WEP keys are 64 or 128-bit (eight or 16-character) keys used to encrypt data using a public algorithm.
"Wavelink's cross-platform WEP key rotation enhancement is well suited for organizations looking for secure connections between their Cisco Aironet wireless LAN infrastructure and legacy handheld devices such as those found in retail and on the factory floor," said Bill Rossi, vice president and general manager, Cisco Wireless Networking Business Unit.
*Enhanced wireless security: 64/128-Bit WEP Key, WPA, WPA2
In addition, it is imperative that security on the routers is enabled by creating a Wep Key, not just change the SSID.
Wireless users are enrolled with two clicks, eliminating the need to manually enter user credentials, security certificates or hexadecimal keys for WEP key management, says Interlink.
* providing a WEP key from a VoIP phone and plugging it into the analyzer to fully decode the protocols; or
They must also have the same WEP key defined, if WEP is enabled.
Meetinghouse's AEGIS Client/Server solution addresses weaknesses in WEP (Wired Equivalency Protocol) allowing dynamic modification of the WEP key while supporting legacy, non-EAP, authentication methods such as PAP, CHAP, MS-CHAP, and MS-CHAP V2 through the authentication tunnel.