Data Security - Novell LINUX ENTERPRISE SERVER 11 - ADMINISTRATION Administration Manual

Hide thumbs Also See for LINUX ENTERPRISE SERVER 11 - ADMINISTRATION:
Table of Contents

Advertisement

WLAN
With the largest range of these wireless technologies, WLAN is the only one suitable
for the operation of large and sometimes even spatially disjointed networks. Single
machines can connect with each other to form an independent wireless network or
access the Internet. Devices called access points act as base stations for WLAN-
enabled devices and act as intermediaries for access to the Internet. A mobile user
can switch among access points depending on location and which access point is
offering the best connection. Like in cellular telephony, a large network is available
to WLAN users without binding them to a specific location for accessing it. Find
details about WLAN in
Bluetooth
Bluetooth has the broadest application spectrum of all wireless technologies. It can
be used for communication between computers (laptops) and PDAs or cellular
phones, as can IrDA. It can also be used to connect various computers within range.
Bluetooth is also used to connect wireless system components, like a keyboard or
mouse. The range of this technology is, however, not sufficient to connect remote
systems to a network. WLAN is the technology of choice for communicating
through physical obstacles like walls.
IrDA
IrDA is the wireless technology with the shortest range. Both communication parties
must be within viewing distance of each other. Obstacles like walls cannot be
overcome. One possible application of IrDA is the transmission of a file from a
laptop to a cellular phone. The short path from the laptop to the cellular phone is
then covered using IrDA. The long range transport of the file to the recipient of
the file is handled by the mobile network. Another application of IrDA is the
wireless transmission of printing jobs in the office.

14.1.4 Data Security

Ideally, you protect data on your laptop against unauthorized access in multiple ways.
Possible security measures can be taken in the following areas:
Protection against Theft
Always physically secure your system against theft whenever possible. Various
securing tools (like chains) are available in retail stores.
Section 18.1, "Wireless LAN"
(page 259).
Mobile Computing with Linux
171

Advertisement

Table of Contents
loading

This manual is also suitable for:

Suse linux enterprise server 11

Table of Contents