Examples of use of WEP
1. Most WLAN networks used WEP encryption for security purposes, but FICORA recommends using the newer WPA encryption, if possible.
2. If you have a secure wireless network (WEP or WPA), you simply key in your security key via an onscreen virtual keyboard.
3. Well, if your connection‘s WEP isn‘t set up properly, then you are most definitely a potential victim of a WiFi kidnapping.
4. The main security protocol for wireless connections – known as WEP (Wireless Equivelancy Protocol) – is built into all home wireless routers, and provides some level of security and privacy by making users log in with a password.
5. While setting up WEP is relatively easy, many users either don‘t bother with it (often because they don‘t know how). If you‘re a "wireless leech" looking for free Internet connections, this works out just fine – but if you have your own wireless network, watch out, because you can lose your ability to connect smoothly (if your unwelcome guest seizes a large part of your bandwidth) – and even your freedom, as in a number of cases in the US and Britain, where leechers used unwitting hosts‘ connections for illicit purposes, causing unwitting hosts to be arrested and brought up on charges of abetting a crime.