WEP - definizione. Che cos'è WEP
Diclib.com
Dizionario ChatGPT
Inserisci una parola o una frase in qualsiasi lingua 👆
Lingua:

Traduzione e analisi delle parole tramite l'intelligenza artificiale ChatGPT

In questa pagina puoi ottenere un'analisi dettagliata di una parola o frase, prodotta utilizzando la migliore tecnologia di intelligenza artificiale fino ad oggi:

  • come viene usata la parola
  • frequenza di utilizzo
  • è usato più spesso nel discorso orale o scritto
  • opzioni di traduzione delle parole
  • esempi di utilizzo (varie frasi con traduzione)
  • etimologia

Cosa (chi) è WEP - definizione


WEP         
Το WEP (Wired Equivalent Privacy) είναι ένας αλγόριθμος ασφάλειας για τα ασύρματα δίκτυα IEEE 802.11. Η εισαγωγή του έγινε το Σεπτέμβριο του 1999, σαν μέρος του αρχικού προτύπου. Η πρόθεσή του ήταν, όπως δηλώνει και το όνομά του, να παρέχει εμπιστευτικότητα δεδομένων συγκρίσιμη με τα παραδοσιακά ενσύρματα δίκτυα.
Esempi dal corpus di testo per WEP
1. Most WLAN networks used WEP encryption for security purposes, but FICORA recommends using the newer WPA encryption, if possible.
2. If you have a secure wireless network (WEP or WPA), you simply key in your security key via an onscreen virtual keyboard.
3. Well, if your connection‘s WEP isn‘t set up properly, then you are most definitely a potential victim of a WiFi kidnapping.
4. The main security protocol for wireless connections – known as WEP (Wireless Equivelancy Protocol) – is built into all home wireless routers, and provides some level of security and privacy by making users log in with a password.
5. While setting up WEP is relatively easy, many users either don‘t bother with it (often because they don‘t know how). If you‘re a "wireless leech" looking for free Internet connections, this works out just fine – but if you have your own wireless network, watch out, because you can lose your ability to connect smoothly (if your unwelcome guest seizes a large part of your bandwidth) – and even your freedom, as in a number of cases in the US and Britain, where leechers used unwitting hosts‘ connections for illicit purposes, causing unwitting hosts to be arrested and brought up on charges of abetting a crime.