WEP - definição. O que é WEP. Significado, conceito
Diclib.com
Dicionário ChatGPT
Digite uma palavra ou frase em qualquer idioma 👆
Idioma:

Tradução e análise de palavras por inteligência artificial ChatGPT

Nesta página você pode obter uma análise detalhada de uma palavra ou frase, produzida usando a melhor tecnologia de inteligência artificial até o momento:

  • como a palavra é usada
  • frequência de uso
  • é usado com mais frequência na fala oral ou escrita
  • opções de tradução de palavras
  • exemplos de uso (várias frases com tradução)
  • etimologia

O que (quem) é WEP - definição


WEP         
Το WEP (Wired Equivalent Privacy) είναι ένας αλγόριθμος ασφάλειας για τα ασύρματα δίκτυα IEEE 802.11. Η εισαγωγή του έγινε το Σεπτέμβριο του 1999, σαν μέρος του αρχικού προτύπου. Η πρόθεσή του ήταν, όπως δηλώνει και το όνομά του, να παρέχει εμπιστευτικότητα δεδομένων συγκρίσιμη με τα παραδοσιακά ενσύρματα δίκτυα.
Exemplos do corpo de texto para WEP
1. Most WLAN networks used WEP encryption for security purposes, but FICORA recommends using the newer WPA encryption, if possible.
2. If you have a secure wireless network (WEP or WPA), you simply key in your security key via an onscreen virtual keyboard.
3. Well, if your connection‘s WEP isn‘t set up properly, then you are most definitely a potential victim of a WiFi kidnapping.
4. The main security protocol for wireless connections – known as WEP (Wireless Equivelancy Protocol) – is built into all home wireless routers, and provides some level of security and privacy by making users log in with a password.
5. While setting up WEP is relatively easy, many users either don‘t bother with it (often because they don‘t know how). If you‘re a "wireless leech" looking for free Internet connections, this works out just fine – but if you have your own wireless network, watch out, because you can lose your ability to connect smoothly (if your unwelcome guest seizes a large part of your bandwidth) – and even your freedom, as in a number of cases in the US and Britain, where leechers used unwitting hosts‘ connections for illicit purposes, causing unwitting hosts to be arrested and brought up on charges of abetting a crime.