<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>NetStumbler</title>
	<atom:link href="http://www.netstumbler.com/category/administration/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.netstumbler.com</link>
	<description>The award-winning wireless networking tool and the best source for your daily Wi-Fi, WiMAX, 3G and VoIP news.</description>
	<lastBuildDate>Fri, 19 Sep 2014 17:52:12 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
		<item>
		<title>So you want to be a Security Consultant?</title>
		<link>http://www.netstumbler.com/2011/12/21/so-you-want-to-be-a-security-consultant/</link>
		<comments>http://www.netstumbler.com/2011/12/21/so-you-want-to-be-a-security-consultant/#comments</comments>
		<pubDate>Wed, 21 Dec 2011 20:23:35 +0000</pubDate>
		<dc:creator>Brad Slavin</dc:creator>
				<category><![CDATA[Administration]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com/?p=3050</guid>
		<description><![CDATA[This is my first guest blogging opportunity on Netstumbler.com and I wanted to discuss what I believe is missing in most of the student/consultants I encounter. I would recommend these things for anyone preparing to be a consultant in IT security. So, the first and most important thing to learn in my opinion is TCP/IP. [...]]]></description>
				<content:encoded><![CDATA[<p>This is my first guest blogging opportunity on Netstumbler.com and I wanted to discuss what I believe is missing in most of the student/consultants I encounter. I would recommend these things for anyone preparing to be a consultant in IT security.</p>
<p>So, the <strong>first and most important thing to learn</strong> in my opinion is <a href="http://en.wikipedia.org/wiki/TCP/IP_model">TCP/IP</a>. You need to know it as well as you do the alphabet. The majority of people I meet in the University world and out in industry do not have a detailed and thorough knowledge of TCP/IP. For a security consultant it is best that you can look at the packets and know exactly what is taking place at the lowest level the wire. Elite hackers know TCP/IP as well as they can write their name. To be able to secure the environment and the enterprise it is imperative you know it like they do.</p>
<p>Take wireless for example, many people will start playing with <a href="http://www.wireshark.org">Wireshark</a> to observe the traffic over the wireless card, as most of you can attest to when you first use Wireshark with a wireless card you start a capture, and you see NOTHING, because you are at the application layer, and do not have a good understanding of the lower layers, and also do not understand that you need to be in monitor mode to capture traffic for the most part, and you are connected to the network, and cannot sniff the wireless traffic, so as you read the alert message that tells you to check the selection for promiscuous mode, and then you deselect it, and what do you see?  You see the 802.3 Ethernet traffic and not the 802.11 traffic you were expecting. Taking it one step further you need an understanding of the PHY layer before you start looking at a tools that analyze it for you.<br />
<span id="more-3050"></span><br />
The <strong>second most important thing is to learn</strong> Linux and Unix. Also, do not stop at Linux, download one of the Unix virtual machines and play with it until you get proficient at it.</p>
<p>A note on<strong> certifications</strong>, <em>they are good for getting you an interview, but once you get that interview you have to convince the people there that you know what you are doing.</em> There is <strong>no certification that can replace hands-on experience and knowledge</strong>, you can get that on your own by using virtual machines and building and running your own test labs. <em>The concern over certifications is most are based on rote memorization, it is the same problem we have in academic circles (more on that in a moment). </em></p>
<p>The problem with this is when you study and cram for a certification exam you memorize something take a test, and then you get certified, but what does this really mean? In my view it means you studied and took a test, and  be honest, some of these classes cram all of the information into your brain in 4-5 days, and if the class does not provide a study guide, or something similar to practice the types of questions you  may encounter you would not see 90% and above exam success rates touted by so many sites. Now, we shall discuss academic thinking, most of the “academics” without industry experience do not understand what I have been talking about either. I was on a <em>team that developed a Master of Science in Information Security</em>, and I was the only non-academic on the team, the entire group was made up of all PhDs but me, and as we discussed the curriculum I focused on teaching the students protocol analysis &#8230;  that is packets! Well this shocked pretty much all of the team, but I argued my point in many of the meetings, and finally swayed enough support where we had packet and protocol analysis as part of the curriculum</p>
<p>The <strong>most important thing I look for when hiring someone</strong> when I was running the Network Operations Center (NOC) is <strong>desire and initiative to learn</strong>. I would interview people with a list of certification as long as their arm, and when I asked them practical questions, they could not answer them, so they did not get the job. This is because I had junior personnel who could answer the questions, so how could I give someone a position over one of them at about 5 times the amount of pay they were getting. I could not justify it, and never did waiver on that. If  a person has desire that is the most important thing.  I had a guy come in fresh out of bootcamp that did not even know what UNIX was, and in 6 months he became my UNIX expert.</p>
<p>Another thing that helps is <strong>understanding programming</strong>, you do not have to be proficient at it, but being able to look at code and at least understand the fundamental concepts of it is very important in this field.</p>
<p><strong>Finally, it is all about research</strong>, I learned to do research in Graduate school, I had a Professor Frank Coyle that specializes in using JAVA for real time systems, and he was instrumental in teaching me how to do research, and that is the intent of these short research topics, the more practice you get the better you get to be at it. Today with the amount of online information you can  research  in a few hours with the Internet. When I was in graduate school, I spent weeks doing research at libraries, take advantage of this opportunity we have today. Recommend you dedicate one hour a night to reading something, a whitepaper etc. <em>There is a saying in the consultant field that as long as you can read the manual and understand it faster than the client you will always get the contract. That is why research is so important.</em></p>
<p>As I like to tell my clients, up until 2006 my certification count was 0, and now it is at 20, so it is not about getting a certification, it is what you do before and after you get that cert.</p>
<p><strong>- Kevin</strong></p>
<p>Kevin Cardwell currently works as a free-lance consultant and provides consulting services for companies throughout the world, and as an adviser to numerous government entities within the US and UK.</p>
<p>He is an Instructor, Technical Editor and Author for Computer Forensics, and Hacking courses. He is the<strong> author of the Center for Advanced Security and Training (CAST) Advanced Network Defense</strong> course. He is <strong>technical editor of the Learning Tree Course Ethical Hacking and Countermeasures</strong> and Computer Forensics. He is author of the Controlling Network Access course. He has presented at the Blackhat USA Conferences. He is a <strong>contributing author</strong> to the <strong>Computer Hacking Forensics Investigator V3 Study Guide and The Best Damn Cybercrime and Digital Forensics Book Period</strong>. He is a Certified Ethical Hacker (CEH), Certified Security analyst (E|CSA), Qualified Penetration Tester (QPT), Certified in Handheld Forensics, Computer Hacking Forensic Investigator (CHFI) and Live Computer Forensics Expert (LCFE), and holds a BS in Computer Science from National University in California and a MS in Software Engineering from the Southern Methodist University (SMU) in Texas.</p>
<p>You can find more information about Kevin at <a href="http://www.elitesecurityandforensics.com">www.elitesecurityandforensics.com</a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2011/12/21/so-you-want-to-be-a-security-consultant/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Getting Serious About Wi-Fi Management</title>
		<link>http://www.netstumbler.com/2004/12/16/getting-serious-about-wi-fi-management/</link>
		<comments>http://www.netstumbler.com/2004/12/16/getting-serious-about-wi-fi-management/#comments</comments>
		<pubDate>Fri, 17 Dec 2004 01:02:00 +0000</pubDate>
		<dc:creator>Wayne Slavin</dc:creator>
				<category><![CDATA[Administration]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com:8080/?p=1660</guid>
		<description><![CDATA[The Radicati Group pegs the penetration of Wi-Fi in the enterprise at 50 percent by 2008. Cut that number in half and it&#8217;s still huge. So now that Wi-Fi is becoming a standard part of enterprise infrastructure, it&#8217;s time to get serious about security and management. Via [techworld.com]]]></description>
				<content:encoded><![CDATA[<p>The Radicati Group pegs the penetration of Wi-Fi in the enterprise at 50 percent by 2008. Cut that number in half and it&#8217;s still huge. So now that Wi-Fi is becoming a standard part of enterprise infrastructure, it&#8217;s time to get serious about security and management.<br />
Via [<a href="http://www.techworld.com/networking/features/index.cfm?featureid=1067&#038;Page=1&#038;pagePos=3">techworld.com</a>]</p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2004/12/16/getting-serious-about-wi-fi-management/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Azimuth Systems Launches VoWLAN Test Platform</title>
		<link>http://www.netstumbler.com/2004/11/30/azimuth-systems-launches-vowlan-test-platform/</link>
		<comments>http://www.netstumbler.com/2004/11/30/azimuth-systems-launches-vowlan-test-platform/#comments</comments>
		<pubDate>Tue, 30 Nov 2004 16:19:00 +0000</pubDate>
		<dc:creator>Wayne Slavin</dc:creator>
				<category><![CDATA[Administration]]></category>
		<category><![CDATA[VoIP]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com:8080/?p=1712</guid>
		<description><![CDATA[Wireless-network test-system developer Azimuth Systems today launched a benchmark test platform for testing VoIP (voice over Internet protocol) in Wi-Fi settings. The company claims that the W-Series wireless-LAN test platform validates both VoWLAN handsets and Wi-Fi infrastructure gear. Via [edn.com]]]></description>
				<content:encoded><![CDATA[<p>Wireless-network test-system developer Azimuth Systems today launched a benchmark test platform for testing VoIP (voice over Internet protocol) in Wi-Fi settings. The company claims that the W-Series wireless-LAN test platform validates both VoWLAN handsets and Wi-Fi infrastructure gear.<br />
Via [<a href="http://www.edn.com/article/CA483612.html?industryid=2282">edn.com</a>]</p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2004/11/30/azimuth-systems-launches-vowlan-test-platform/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Corporate Wi-Fi Integration, Part 4</title>
		<link>http://www.netstumbler.com/2004/10/30/corporate-wi-fi-integration-part-4/</link>
		<comments>http://www.netstumbler.com/2004/10/30/corporate-wi-fi-integration-part-4/#comments</comments>
		<pubDate>Sat, 30 Oct 2004 18:04:00 +0000</pubDate>
		<dc:creator>Wayne Slavin</dc:creator>
				<category><![CDATA[Administration]]></category>
		<category><![CDATA[Deployment]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com:8080/?p=1818</guid>
		<description><![CDATA[Mike Houghton wraps up his four-part series on integrating Wi-Fi with your corporate IT environment by providing a glimpse into the future and some final recommendations for a successful implementation. Via [enterpriseitplanet.com]]]></description>
				<content:encoded><![CDATA[<p>Mike Houghton wraps up his four-part series on integrating Wi-Fi with your corporate IT environment by providing a glimpse into the future and some final recommendations for a successful implementation.<br />
Via [<a href="http://www.enterpriseitplanet.com/networking/features/article.php/3428861">enterpriseitplanet.com</a>]</p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2004/10/30/corporate-wi-fi-integration-part-4/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Access All Areas</title>
		<link>http://www.netstumbler.com/2004/10/26/access-all-areas/</link>
		<comments>http://www.netstumbler.com/2004/10/26/access-all-areas/#comments</comments>
		<pubDate>Tue, 26 Oct 2004 18:49:00 +0000</pubDate>
		<dc:creator>Wayne Slavin</dc:creator>
				<category><![CDATA[Administration]]></category>
		<category><![CDATA[Deployment]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com:8080/?p=1835</guid>
		<description><![CDATA[When many companies find it hard enough to control the IT use of office-based employees, how do you convince them that giving staff remote access is a good idea? Via [vnunet.com]]]></description>
				<content:encoded><![CDATA[<p>When many companies find it hard enough to control the IT use of office-based employees, how do you convince them that giving staff remote access is a good idea?<br />
Via [<a href="http://www.vnunet.com/features/1158962">vnunet.com</a>]</p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2004/10/26/access-all-areas/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Drive-Through Wireless</title>
		<link>http://www.netstumbler.com/2004/10/05/drive-through-wireless/</link>
		<comments>http://www.netstumbler.com/2004/10/05/drive-through-wireless/#comments</comments>
		<pubDate>Tue, 05 Oct 2004 17:00:00 +0000</pubDate>
		<dc:creator>Wayne Slavin</dc:creator>
				<category><![CDATA[Administration]]></category>
		<category><![CDATA[Commentary]]></category>
		<category><![CDATA[Deployment]]></category>
		<category><![CDATA[HotSpots]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com:8080/?p=1910</guid>
		<description><![CDATA[We&#8217;ve told this story in a dozen variations: The entrepreneur who envisions a new use for Wi-Fi, a moneymaker sure to tap into the demands of a previously unrecognized audience. Latte sippers. Boaters. RV drivers. Via [wi-fiplanet.com]]]></description>
				<content:encoded><![CDATA[<p>We&#8217;ve told this story in a dozen variations: The entrepreneur who envisions a new use for Wi-Fi, a moneymaker sure to tap into the demands of a previously unrecognized audience. Latte sippers. Boaters. RV drivers.<br />
Via [<a href="http://www.wi-fiplanet.com/columns/article.php/3417481">wi-fiplanet.com</a>]</p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2004/10/05/drive-through-wireless/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Wound Up In Wireless</title>
		<link>http://www.netstumbler.com/2004/10/04/wound-up-in-wireless/</link>
		<comments>http://www.netstumbler.com/2004/10/04/wound-up-in-wireless/#comments</comments>
		<pubDate>Mon, 04 Oct 2004 21:26:00 +0000</pubDate>
		<dc:creator>Wayne Slavin</dc:creator>
				<category><![CDATA[Administration]]></category>
		<category><![CDATA[Commentary]]></category>
		<category><![CDATA[Deployment]]></category>
		<category><![CDATA[Guide]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com:8080/?p=1915</guid>
		<description><![CDATA[With all the media coverage and vendor hype it is easy to believe we are in the middle of a wireless revolution. But don&#8217;t get carried away: while there is an opportunity to deliver value to customers through wireless solutions, resellers must present solid business cases and help customers around technical complexities Via [vnunet.com]]]></description>
				<content:encoded><![CDATA[<p>With all the media coverage and vendor hype it is easy to believe we are in the middle of a wireless revolution. But don&#8217;t get carried away: while there is an opportunity to deliver value to customers through wireless solutions, resellers must present solid business cases and help customers around technical complexities<br />
Via [<a href="http://www.vnunet.com/analysis/1158552">vnunet.com</a>]</p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2004/10/04/wound-up-in-wireless/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Voice Over Wi-Fi: Too Green For The Enterprise</title>
		<link>http://www.netstumbler.com/2004/10/04/voice-over-wi-fi-too-green-for-the-enterprise/</link>
		<comments>http://www.netstumbler.com/2004/10/04/voice-over-wi-fi-too-green-for-the-enterprise/#comments</comments>
		<pubDate>Mon, 04 Oct 2004 14:35:00 +0000</pubDate>
		<dc:creator>Wayne Slavin</dc:creator>
				<category><![CDATA[Administration]]></category>
		<category><![CDATA[Commentary]]></category>
		<category><![CDATA[Guide]]></category>
		<category><![CDATA[VoIP]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com:8080/?p=1921</guid>
		<description><![CDATA[Everyone likes to get something for nothing, so the combination of Internet telephony and open wireless access can seem irresistible. Imagine a wireless phone that can work with networks all over the world, without needing a subscription to a service provider. Via [networkmagazine.com]]]></description>
				<content:encoded><![CDATA[<p>Everyone likes to get something for nothing, so the combination of Internet telephony and open wireless access can seem irresistible. Imagine a wireless phone that can work with networks all over the world, without needing a subscription to a service provider.<br />
Via [<a href="http://www.networkmagazine.com/shared/article/showArticle.jhtml?articleId=47205162">networkmagazine.com</a>]</p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2004/10/04/voice-over-wi-fi-too-green-for-the-enterprise/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Group Proposes Wireless Smart Card Authentication</title>
		<link>http://www.netstumbler.com/2004/10/01/group-proposes-wireless-smart-card-authentication/</link>
		<comments>http://www.netstumbler.com/2004/10/01/group-proposes-wireless-smart-card-authentication/#comments</comments>
		<pubDate>Fri, 01 Oct 2004 18:51:00 +0000</pubDate>
		<dc:creator>Wayne Slavin</dc:creator>
				<category><![CDATA[Administration]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Standards]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com:8080/?p=1925</guid>
		<description><![CDATA[The WLAN Smart Card Consortium Thursday proposed a new type of authentication that it claims will simplify securely logging on to all types of wireless networks. Via [internetweek.com]]]></description>
				<content:encoded><![CDATA[<p>The WLAN Smart Card Consortium Thursday proposed a new type of authentication that it claims will simplify securely logging on to all types of wireless networks.<br />
Via [<a href="http://www.internetweek.com/allStories/showArticle.jhtml?articleID=48800522">internetweek.com</a>]</p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2004/10/01/group-proposes-wireless-smart-card-authentication/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Corporate Wi-Fi Integration, Part 3</title>
		<link>http://www.netstumbler.com/2004/09/29/corporate-wi-fi-integration-part-3/</link>
		<comments>http://www.netstumbler.com/2004/09/29/corporate-wi-fi-integration-part-3/#comments</comments>
		<pubDate>Thu, 30 Sep 2004 02:01:00 +0000</pubDate>
		<dc:creator>Wayne Slavin</dc:creator>
				<category><![CDATA[Administration]]></category>
		<category><![CDATA[Deployment]]></category>
		<category><![CDATA[Guide]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com:8080/?p=1934</guid>
		<description><![CDATA[Parts 1 and 2 of this of this 4-part series, we discussed some of the reasons for making the switch to Wi-Fi, the all-important site survey, and what components make up a WLAN. In this, part 3 of our series, we&#8217;ll discuss some of the issues that inevitably crop up and a list of the [...]]]></description>
				<content:encoded><![CDATA[<p>Parts 1 and 2 of this of this 4-part series, we discussed some of the reasons for making the switch to Wi-Fi, the all-important site survey, and what components make up a WLAN. In this, part 3 of our series, we&#8217;ll discuss some of the issues that inevitably crop up and a list of the top Wi-Fi vendors.<br />
Via [<a href="http://www.enterpriseitplanet.com/networking/features/article.php/3414781">enterpriseitplanet.com</a>]</p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2004/09/29/corporate-wi-fi-integration-part-3/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Wireless Security Enhances Worm Detection</title>
		<link>http://www.netstumbler.com/2004/09/28/wireless-security-enhances-worm-detection/</link>
		<comments>http://www.netstumbler.com/2004/09/28/wireless-security-enhances-worm-detection/#comments</comments>
		<pubDate>Tue, 28 Sep 2004 15:47:00 +0000</pubDate>
		<dc:creator>Wayne Slavin</dc:creator>
				<category><![CDATA[Administration]]></category>
		<category><![CDATA[Products]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com:8080/?p=1940</guid>
		<description><![CDATA[Network Chemistry, a provider of RF (radio frequency) security solutions, announced Monday that new worm-detection capabilities have been added to its RFprotect Wireless Intrusion Protection System. Via [news.zdnet.com]]]></description>
				<content:encoded><![CDATA[<p>Network Chemistry, a provider of RF (radio frequency) security solutions, announced Monday that new worm-detection capabilities have been added to its RFprotect Wireless Intrusion Protection System.<br />
Via [<a href="http://news.zdnet.com/2110-1009_22-5385802.html">news.zdnet.com</a>]</p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2004/09/28/wireless-security-enhances-worm-detection/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>WLANs Go Feral In Corporate Undergrowth</title>
		<link>http://www.netstumbler.com/2004/09/21/wlans-go-feral-in-corporate-undergrowth/</link>
		<comments>http://www.netstumbler.com/2004/09/21/wlans-go-feral-in-corporate-undergrowth/#comments</comments>
		<pubDate>Tue, 21 Sep 2004 16:47:00 +0000</pubDate>
		<dc:creator>Wayne Slavin</dc:creator>
				<category><![CDATA[Administration]]></category>
		<category><![CDATA[Research]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com:8080/?p=1960</guid>
		<description><![CDATA[Frustrated employees are taking IT into their own hands by installing DIY Wi-Fi access points (APs) in their offices while their IT departments donâ€™t even notice, according to Gartner. A rogue access point can leave an organisationâ€™s network wide open and once on the network, an unauthorised user could go undetected. Via [theregister.co.uk]]]></description>
				<content:encoded><![CDATA[<p>Frustrated employees are taking IT into their own hands by installing DIY Wi-Fi access points (APs) in their offices while their IT departments donâ€™t even notice, according to Gartner. A rogue access point can leave an organisationâ€™s network wide open and once on the network, an unauthorised user could go undetected.<br />
Via [<a href="http://www.theregister.co.uk/2004/09/21/diy_wifi_security/">theregister.co.uk</a>]</p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2004/09/21/wlans-go-feral-in-corporate-undergrowth/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>College Backs Off Wi-Fi Ban</title>
		<link>http://www.netstumbler.com/2004/09/17/college-backs-off-wi-fi-ban/</link>
		<comments>http://www.netstumbler.com/2004/09/17/college-backs-off-wi-fi-ban/#comments</comments>
		<pubDate>Fri, 17 Sep 2004 14:30:00 +0000</pubDate>
		<dc:creator>Wayne Slavin</dc:creator>
				<category><![CDATA[Administration]]></category>
		<category><![CDATA[Commentary]]></category>
		<category><![CDATA[Deployment]]></category>
		<category><![CDATA[HotSpots]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com:8080/?p=1976</guid>
		<description><![CDATA[High-tech tensions at the University of Texas at Dallas are easing, as administrators are curtailing the regulation of private hot spots in campus housing, but problems with interference may continue. Via [news.zdnet.com]]]></description>
				<content:encoded><![CDATA[<p>High-tech tensions at the University of Texas at Dallas are easing, as administrators are curtailing the regulation of private hot spots in campus housing, but problems with interference may continue.<br />
Via [<a href="http://news.zdnet.com/2100-3513_22-5369921.html">news.zdnet.com</a>]</p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2004/09/17/college-backs-off-wi-fi-ban/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Wireless Is More</title>
		<link>http://www.netstumbler.com/2004/09/17/wireless-is-more/</link>
		<comments>http://www.netstumbler.com/2004/09/17/wireless-is-more/#comments</comments>
		<pubDate>Fri, 17 Sep 2004 14:27:00 +0000</pubDate>
		<dc:creator>Wayne Slavin</dc:creator>
				<category><![CDATA[Administration]]></category>
		<category><![CDATA[Commentary]]></category>
		<category><![CDATA[Guide]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com:8080/?p=1977</guid>
		<description><![CDATA[Want to free yourself from the clutter of computer cables, surf the web from the sofa, and download music in the garden? It&#8217;s easy &#8211; all you need is a wireless home network. Via [vnunet.com]]]></description>
				<content:encoded><![CDATA[<p>Want to free yourself from the clutter of computer cables, surf the web from the sofa, and download music in the garden? It&#8217;s easy &#8211; all you need is a wireless home network.<br />
Via [<a href="http://www.vnunet.com/features/1158138">vnunet.com</a>]</p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2004/09/17/wireless-is-more/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Airespace Wins IBM Partnership For WiFi Service</title>
		<link>http://www.netstumbler.com/2004/09/16/airespace-wins-ibm-partnership-for-wifi-service/</link>
		<comments>http://www.netstumbler.com/2004/09/16/airespace-wins-ibm-partnership-for-wifi-service/#comments</comments>
		<pubDate>Thu, 16 Sep 2004 15:06:00 +0000</pubDate>
		<dc:creator>Wayne Slavin</dc:creator>
				<category><![CDATA[Administration]]></category>
		<category><![CDATA[Deployment]]></category>
		<category><![CDATA[Products]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com:8080/?p=1984</guid>
		<description><![CDATA[Airespace, a Silicon Valley telecom services start-up, won a partnership with International Business Machines Corp. that will help Airespace grab a piece of the growing market for WiFi services, the two companies told Reuters on Wednesday. Via [reuters.com]]]></description>
				<content:encoded><![CDATA[<p>Airespace, a Silicon Valley telecom services start-up, won a partnership with International Business Machines Corp. that will help Airespace grab a piece of the growing market for WiFi services, the two companies told Reuters on Wednesday.<br />
Via [<a href="http://www.reuters.com/newsArticle.jhtml?type=technologyNews&#038;storyID=6247339">reuters.com</a>]</p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2004/09/16/airespace-wins-ibm-partnership-for-wifi-service/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
