WEP - definitie. Wat is WEP
Diclib.com
Woordenboek ChatGPT
Voer een woord of zin in in een taal naar keuze 👆
Taal:     

Vertaling en analyse van woorden door kunstmatige intelligentie ChatGPT

Op deze pagina kunt u een gedetailleerde analyse krijgen van een woord of zin, geproduceerd met behulp van de beste kunstmatige intelligentietechnologie tot nu toe:

  • hoe het woord wordt gebruikt
  • gebruiksfrequentie
  • het wordt vaker gebruikt in mondelinge of schriftelijke toespraken
  • opties voor woordvertaling
  • Gebruiksvoorbeelden (meerdere zinnen met vertaling)
  • etymologie

Wat (wie) is WEP - definitie


WEP         
Το WEP (Wired Equivalent Privacy) είναι ένας αλγόριθμος ασφάλειας για τα ασύρματα δίκτυα IEEE 802.11. Η εισαγωγή του έγινε το Σεπτέμβριο του 1999, σαν μέρος του αρχικού προτύπου. Η πρόθεσή του ήταν, όπως δηλώνει και το όνομά του, να παρέχει εμπιστευτικότητα δεδομένων συγκρίσιμη με τα παραδοσιακά ενσύρματα δίκτυα.
Voorbeelden uit tekstcorpus voor WEP
1. Most WLAN networks used WEP encryption for security purposes, but FICORA recommends using the newer WPA encryption, if possible.
2. If you have a secure wireless network (WEP or WPA), you simply key in your security key via an onscreen virtual keyboard.
3. Well, if your connection‘s WEP isn‘t set up properly, then you are most definitely a potential victim of a WiFi kidnapping.
4. The main security protocol for wireless connections – known as WEP (Wireless Equivelancy Protocol) – is built into all home wireless routers, and provides some level of security and privacy by making users log in with a password.
5. While setting up WEP is relatively easy, many users either don‘t bother with it (often because they don‘t know how). If you‘re a "wireless leech" looking for free Internet connections, this works out just fine – but if you have your own wireless network, watch out, because you can lose your ability to connect smoothly (if your unwelcome guest seizes a large part of your bandwidth) – and even your freedom, as in a number of cases in the US and Britain, where leechers used unwitting hosts‘ connections for illicit purposes, causing unwitting hosts to be arrested and brought up on charges of abetting a crime.