WPA weakness explained
Tags: Tech
Stumbled across this article explaining weaknesses in the Wireless Protected Access protocol.
Guess I should at least setup a radius server at home then (or move my wireless to the DMZ).
Anyone know if it's possible to have RADIUS pull it's authentication data from a Domino server? (LDAP)
Stumbled across this article explaining weaknesses in the Wireless Protected Access protocol.
Guess I should at least setup a radius server at home then (or move my wireless to the DMZ).
Anyone know if it's possible to have RADIUS pull it's authentication data from a Domino server? (LDAP)