General Gaming Article |
- Wi-Fi Basics: A Beginner's Guide to the Wireless Web
- Google Will Soon Encrypt All Your Searches
- Droid RAZR Unveiled: 1.2GHz Dual-Core, Water Resistant, $299
- Android App of the Week: Twonky Beam Browser
- Samsung Unveils Full HD Surveillance Gear, See the Freckles on Your Intruder's Face
- Battlefield 3 Torrent Leaked, But You Can't Play It
- Fast Forward: Whither Apple, After Steve?
- HP's Not-Quite-Dead TouchPad Gets WebOS Update
- Stinky Apple Supplier Shut Down Due To Terrible Odor
- StarTech Drive Duplicator Copies Three Drives at Once, No PC Required
Wi-Fi Basics: A Beginner's Guide to the Wireless Web Posted: 18 Oct 2011 02:42 PM PDT Mind your Bs, Ns, and Gs as we break down the ABCs (and many Ws) of Wi-FiThe popularity of home networks has increased dramatically over the last decade, a phenomenon which can be directly attributed to the increase in broadband availability, but credit is also due to the accessibility that Wi-Fi provides to consumers. Not only are Wi-Fi products easy to configure and relatively inexpensive to implement, but many home computing devices have wireless radios pre-installed. While connecting to a wireless network can be as simple as a few button presses or taps, there is a lot that goes into making the bits magically travel through the ether. We're going to take a look at some of the building blocks that go into making your wireless network stable and fast, with an eye toward security and standards. We'll also cover some of the devices that can improve your wireless network and ways you can use your Wi-Fi while away from home. Important TermsIn order to have an intelligent conversation about Wi-Fi, there are a couple of key terms that need to be defined up front. The first is the SSID (Service Set Identifier) or network name. The SSID is the door to connecting to a Wi-Fi network, and is often the only piece of information you will need to get connected. More of a concept than a term is the idea of channels. Like any Radio Frequency based technology, Wi-Fi uses radio waves of different band-widths to transmit data. Channels define the range of wave-lengths that a transmitter uses. For example several of the Wi-Fi standards use the 2.4GHz frequency, which ranges from 2.4000-2.4835GHz. This frequency range is divided into 13 channels which includes substantial overlap. To make matters more confusing only certain channels are usable from a legal standpoint in different countries. The United States for example uses channels 1-11. 802.11 StandardsThe term Wi-Fi refers specifically to the IEEE 802.11 set of standards for wireless networks. Different individual standards are designated by a letter following the 802.11, such as in 802.11g or 802.11n. In general all of the 802.11 standards operate on either a 2.4GHz or 5GHz radio frequency, though some can work on both bands. 802.11a and 802.11b are some of the oldest the Wi-Fi standards and operate on the 5GHz and 2.4GHz frequencies respectively. It could be said that 802.11b was the standard that popularized Wi-Fi, and many legacy devices still utilize this standard today. The biggest differentiators between these original standards from a practical standpoint are speed and range. 802.11a enables speeds of up to 54Mbit/s but the shorter wavelength isn't as effective at penetrating walls and other obstructions making it less feasible for home networks. 802.11b is limited to 11Mbit/s of throughput, but the 2.4GHz frequency handles signal degradation better. 802.11g combined the benefits of its predecessors, offering 54Mbit/s using a 2.4GHz radio. An additional benefit of using 802.11g is the backward compatibility with 802.11b client devices, though using an 802.11b device on an 802.11g network will reduce the data rate for all clients to 11Mbit/s. 802.11n is the current Wi-Fi standard, and supports the use of both 2.4GHz and 5GHz bands. This ability to use both sets of frequencies is known as MIMO (Multiple-Input Multiple-Output). The key benefits to using 802.11n devices are data rates up to 600MBit/s, and some additional security features. 802.11n offers backward compatibility, though for performance reasons these features are optional, and are not always enabled. Device TypesMuch of the confusion with Wi-Fi is due to the number of devices on the market and the range of terms that are used to describe hardware that perform the same functions. The simplest way to look at a wireless network is to realize that there are essentially only two types of devices, Access Points and Clients, both of which can come in a variety of form factors. An Access Point is generally the core of your wireless network and is generally physically connected to a wired network as well. Configuration of your wireless settings such as the radio channel, security, and SSID is managed on the Access Point itself. Some examples of Access Point type devices are Wireless Routers or Wireless Range Extenders. While the differences between these monikers are subtle, they can be important to how your network is configured. In its purest form, an Access Point is simply a device that connects a wireless network to a wired network. A Wireless Router indicates that the device includes additional functionality from a networking standpoint that will allow various devices to talk to each other and share an internet connection. Range Extenders are a little hard to explain, but essentially combine features of both Access Point and Client to extend the range of your wireless network without requiring you to run additional networking cable. Wi-Fi Client devices are any device that connects to the wireless network offered up by an Access Point. These could be laptop or desktop computers, tablets, cellular phones, printers, or even home theater equipment. Typically a Wi-Fi client will have some means of connecting to a specific SSID or list of SSID's, and the ability to configure security settings like an encryption key or passphrase. Clients can also create an ad-hoc or peer-to-peer network, which is made by two clients connecting to each other. This doesn't offer the same flexibility or power of an Access Point based network, but there are scenarios where a peer-to-peer network makes sense. Use CasesOk, so now that you know the basics let's get our hands dirty by running through a few common scenarios where you would use a Wi-Fi connection and detail the basic steps to get things working. The most common example is a basic home wireless network. Let's say you have two computers, one wired desktop and one wireless laptop. The first device you would need for your wireless network would be an Access Point. For cost reasons it makes a lot of sense to buy one device that will perform multiple roles, so we'll recommend some sort of wireless router. Typically a wireless router will offer wired connectivity, so you should connect your desktop in to one of the Ethernet ports. Following the manufacturer's instructions you will want to enable the wireless interface, configure an SSID, and enable the wireless security features. You will want to make a note of your SSID and security key for later use. The laptop will then need to be configured to use the SSID and security key to communicate to the wireless router. A second common example is using a public Wi-Fi hotspot, such as a coffee shop or library. This is a much easier scenario as generally there is no security key involved. Simply find the SSID for the Wi-Fi network you wish to connect with and away you go. Be aware that public networks should be treated as such, and using computer security features like antivirus and firewall software is highly recommended. It's also worth noting that public hotspots also have "terms of agreement" that must be agreed to, and you may want to give those a look before using the connection. Our third use case is a little more advanced. Let's pick up where we left off with the home networking example, we have an existing network with a wireless router, but we need to extend the reach of the wireless network into another part of the house. The best solution is to run an Ethernet cable from your wireless router to a location that is central to the area you want Wi-Fi signal. An additional Access Point can be added to the network to provide better signal to a larger area. When adding a second Access Point there are some additional things to consider. You will typically want to configure the same SSID and security key, to allow your wireless devices to roam between Access Points. However, you need to make sure that the Wi-Fi channels are configured differently, and that your frequency use does not overlap. This will help prevent interference which could potentially degrade the usability of your wireless network. Best PracticesWi-Fi networking offers great flexibility over wired networks and the speed increases in the latest standards make it a very attractive solution, but there are tradeoffs. The biggest area of concern for people trying to get the most from their wireless network is signal strength. Wi-Fi signals are fairly robust, and will generally function throughout a good sized house, but sometimes there are simple solutions for improving your coverage. The best rule of thumb for getting the best coverage from your Access Point is to centrally locate it in the area where you want to be able to get a signal. If your house is the primary area of use you should find a location as close to the center of the house as possible. If you want coverage in your back yard you might think about moving the Access Point closer to the rear of the house. An additional thing to consider is the height at which you place your Access Point. Generally there are more physical obstructions the closer you get to the floor. Small furniture, electronics, even pets or other people have a negative effect on radio frequency. Placing your Access Point on a bookshelf or even mounting it on a wall can increase your signal dramatically. Of course adding variables like a house with multiple floors adds complexity, and your results will vary. Our last recommendation is harder to troubleshoot, and can be painful to execute. Wi-Fi devices use radio frequencies that are open game for other wireless standards and devices like Bluetooth, cordless phones, or wireless peripherals like a mouse or keyboard. Interference is often caused when two wireless devices are attempting to operate using the same radio frequency. Most Wi-Fi Access Points allow for the user to change the channel used by the radio, which will sometimes help mitigate interference caused by other wireless devices. SecurityWe would be remiss if we didn't point out that Wi-Fi networks need to be secured. There are many reasons for this ranging from protecting your personal information to not getting sued because of what an unauthorized user was doing with your network. The bottom line is security is worth being concerned about. Wired Equivalent Privacy (WEP) was once the standard for Wi-Fi security, but has been frequently maligned and is not considered secure. Several tools exist that will analyze encrypted Wi-Fi traffic and provide the security key with little technical knowledge required. Wi-Fi Protected Access (WPA) is a more secure solution than WEP, and is supported on most modern Wi-Fi devices. WPA also has vulnerabilities, but may be your best option if you're using an older Access Point. WPA2 is the current standard for Wi-Fi security, and is required for new devices seeking Wi-Fi certification. WPA2 supports backwards compatibility with WPA clients, so there shouldn't be any client compatibility reasons to revert to WPA. An additional security step that is commonly used is a hidden SSID. This isn't a full security measure, but can help prevent unauthorized users from seeing your network. Our last security recommendation is to change the username and password used to log in to your Access Point itself. This will prevent unauthorized users or even viruses from modifying the configuration of your network. ConclusionWi-Fi networks are pretty well here to stay, so you might as well get familiar with the various ins and outs provided by your current configuration. The convenience and flexibility offered by the standard is unparalleled, and the stability, speed, and security are improving by leaps and bounds. When configuring or troubleshooting your wireless network keep our best practices in mind. For reviews of specific hardware visit our Networking section under Reviews. Also feel free to post your suggestions or ask your questions in the comment section below. |
Google Will Soon Encrypt All Your Searches Posted: 18 Oct 2011 02:37 PM PDT If the idea of sending your shady search queries into the ether makes you a little nervous, Google is coming to the rescue with a plan to encrypt searches. In the next few weeks, users that are signed into their Google account will automatically be directed to the HTTPS search page for secure searches. Google says this change will be especially important to users that do searches from public Wi-Fi networks. SSL encryption has traditionally been used in banking and other financial sites, but it is increasingly being implemented in other ways. For instance, most email service how have SSL as the default view. Sites that get clicks from searches will still see a list of aggregated search terms that were big winners, but will not get information about individual clicks. Users that don't have a Google account, but want to be more secure can manually navigate to the HTTPS google site and search that way. |
Droid RAZR Unveiled: 1.2GHz Dual-Core, Water Resistant, $299 Posted: 18 Oct 2011 02:24 PM PDT As expected, Motorola has announced the new Droid RAZR Android phone for Verizon's 4G LTE network. The iconic name evokes images of something impossibly thin, and the Droid RAZR delivers on that count. The device is powerful, but only 7.1mm thick. That's thinner than the iPhone, and Motorola claims over 12 hours of talk time per charge. The new RAZR runs on a TI OMAP4430 SoC clocked up to 1.2GHz, 1GB of RAM, and 16GB of internal storage. The 8MP camera is capable of shooting 1080p video, and there is a front camera as well. The screen is a first of its kind qHD resolution Super AMOLED. The phone itself is splash resistant and has a tough kevlar back. However, that form factor comes with a drawback; the battery is apparently non-removable. The RAZR is running an Android 2.3 Gingerbread with is going to be the current version of the platform for all of 4 more hours at the time of posting. Moto has also locked the bootloader on this device. The Droid RAZR will be available for pre-order on October 27 for $299 on contract. |
Android App of the Week: Twonky Beam Browser Posted: 18 Oct 2011 12:40 PM PDT Twonky is a name many readers of this site will find familiar. Twonky's media server provides DLNA functionality in high-end NAS appliances like the QNAP TS-459 Pro II, and is a great solution for those looking to serve media from their PC. Twonky Beam Browser is an application for Android devices that makes use of the company's experience with DLNA, but takes it to an entirely new level. Twonky Beam Browser is built as a streaming video client, giving users the ability to view Internet-based content on their mobile device. The app includes links to the usual suspects such as YouTube, Vimeo, and ESPN. Where Twonky differentiates itself from other streaming video clients is the ability to use DLNA to push, or "beam," the video stream to a device serving as a DLNA Renderer, making the video available to a larger display such as an HDTV. Note that you will need a DLNA Renderer to use the Beaming function, and Flash video streams cannot be beamed to a DLNA Renderer. Twonky Beam Browser is available from the Android Marketplace as a free download. You can learn about Twonky's other applications at Twonky.com. |
Samsung Unveils Full HD Surveillance Gear, See the Freckles on Your Intruder's Face Posted: 18 Oct 2011 11:58 AM PDT Samsung is taking its surveillance game to the next level by introducing a new series of Full HD analog video products. Included in the new lineup is the HD-SDI 1920x1080 box camera, HD-SDI 1920x1080 dome camera, and a four-channel HD-SDI digital video recorder (DVR). Samsung's HD-SDI technology makes it possible to transmit uncompressed and non-packetized digital video signals with no loss of image data and zero latency, the company said. The obvious benefit here is improved image quality, which is more than five times better than conventional analog technology, Samsung says. But it also offers a "more cost-effective and easier alternative to network-based systems, using standard coax cable." Samsung's top-of-the-line SNB-7000 box camera features the company's advanced WiseNetII digital signal processing, Full HD resolution, up to 3MP of image quality, wide dynamic range (WDR), onboard video analytics, bi-directional audio, SD memory card slot, and true day/night (ICR) functionality. Image Credit: Samsung |
Battlefield 3 Torrent Leaked, But You Can't Play It Posted: 18 Oct 2011 11:37 AM PDT Can't wait for the October 25th launch of Battlefield 3? Neither can a lot of other people – and some of them aren't waiting. As can only be expected for such a high-profile title, a leaked copy of the PC version of the game has worked its way onto the Internet in the form of – you guessed it – a torrent. Aspiring pirates shouldn't rush out to download the torrent, though. You still won't be able to play Battlefield 3 even with those illegal disc images in hand thanks to EA's always-on DRM. Remember that you'll need an active Internet connection and Origin account in order to play BF3, even in single-player mode. While those limitations really, truly suck for gamers on the up-and-up who actually shell out hard-earned dollars for the game, that strict DRM is currently preventing file sharers from enjoying multi-person mayhem prior to the game's release date. Of course, it's only a matter of time before a crack becomes available, of course, but for now, Softpedia reports that the 9.96Gb files won't do anything other than take up space on your hard drive. |
Fast Forward: Whither Apple, After Steve? Posted: 18 Oct 2011 11:24 AM PDT Apple is pronounced dead every 10 years or so, inevitably before another miraculous revival. Although Steve Jobs's recent resignation as CEO didn't provoke the same gloomy predictions as the company's previous setbacks, there was widespread moaning about Apple's future. Conspicuously missing was speculation about the ways in which Jobs's diminished role might improve Apple. To some, any such speculation is heresy. So first, let me affirm that Jobs was perhaps our brightest entrepreneur. His marketing savvy was uncanny. His standards were extraordinarily high, and he attracted some of the best talent on the planet. Like everyone, however, Jobs was flawed. One flaw was well known but was mainly an internal company matter. Another was less recognized but eventually will harm Apple's competitiveness. The famous flaw was that Jobs was a hothead. At times, his behavior exceeded the allowances made for a "tough boss." His abuse could become unprofessional and wouldn't be tolerated at most companies if he were a middle manager. But this character flaw mainly affected the relatively few people immediately around him, so it was tolerable—unless his successors believe it was a key to his success. His more relevant shortcoming was a blind spot for software development. Unlike, say, Bill Gates, Jobs never made his mark as a programmer. Apple's iOS is a restrictive platform that requires Objective-C, a programming language rarely used elsewhere. Mac OS is more open but heavily favors the same nonstandard language. This complaint may seem trifling now, because Apple's products are wildly popular. Over time, however, Apple's captive developers will defect to platforms offering more choices. Apple executives proclaim that they will follow in Jobs's footsteps because his DNA is woven into the company. For the most part, I hope they are right. But there is always room for improvement. |
HP's Not-Quite-Dead TouchPad Gets WebOS Update Posted: 18 Oct 2011 11:21 AM PDT "I'm not dead!" It's one of our favorite quotes in "Monty Python and the Holy Grail." We don't picture TouchPad owners shouting that from the rooftops, though. HP basically called the tablet (along with WebOS) dead in the water and tossed it on the shelves at $99 to clear inventory; after a fire sale like that, you can't expect much ongoing support. But surprise, surprise! TouchPad owners aren't quite dead to HP yet. The company has just released a WebOS update for the tablet. The over-the-air update brings several new features and improvements to the TouchPad. According to the HP Palm blog, you'll find the following after installing WebOS 3.0.4:
Jon Zilber, HP/Palm's Director of Online Communications writes, says, "You'll also experience better performance, user interface improvements, and other enhancements such as support for accelerometer events in Adobe Flash Player, and more robust Skype video calling." There's no reason not to check the free update out now if you're a TouchPad owner. |
Stinky Apple Supplier Shut Down Due To Terrible Odor Posted: 18 Oct 2011 10:48 AM PDT An apple a day may keep those pesky, prodding doctors at bay, but apparently, the odor from an Apple supplier's factory is all it takes to keep nearby residents away. Catcher Technology builds those oh-so-sleek aluminum cases that give Apple's laptops their distinct look, but Chinese citizens near the company's Fenghuang City factory say they stink. In fact, things got so bad that officials recently temporarily shut the facility down. Residents from the area told Computerworld that the smell exuded by Catcher's factory was an unappetizing mixture of "chemical fertilizer and burning plastic." Several people have reported difficulty breathing. The smell is reportedly so strong that it penetrates sealed windows. On their end, Catcher Technology claims that the factory might be stinky, but it fully meets all air safety requirements. However, they aren't simply ignoring the problem; the company is working on improving its exhaust systems and taking other steps to reduce the odor. Meanwhile, the government's shutdown of the facility will remain active until state monitors can assess the situation and determine if the odor is damaging to the health of nearby citizens. Image credit: lonestar7766 on sketchfu.com |
StarTech Drive Duplicator Copies Three Drives at Once, No PC Required Posted: 18 Oct 2011 10:47 AM PDT StarTech specializes in hard-to-find connectivity parts and the occasional gee-whiz device, the latter of which is what the company's new USB 3.0/eSATA to SATA Standalone 1:3 Hard Drive Duplicator Dock falls under. In case it's not obvious from the product title, this is a device that performs 1:3 sector-by-sector duplication from a single SATA drive onto three others all at the same time, and you don't need to plug it into a PC. "IT professionals are always looking for ways to make their jobs more efficient and this new multi-drive duplicator allows them to accomplish just that," commented StarTech.com Senior Product Manager, Carey Cline. "The ability to perform a sector by sector duplication on up to three drives simultaneously, frees up the user's time to perform other functions while the back-ups are created in the background. The fact it acts as a standalone unit also means it doesn't use up resources on their computer system." You can also use the device as an external 4-bay hard drive dock connected via USB 3.0 or eSATA. It supports up to 72MB/s transfer rates in duplication mode and up to 5Gbps or 3Gbps as an external dock, has a Secure Erase feature, dual 60mm cooling fans, integrated LCD display, and supports both 2.5-inch and 3.5-inch form factor drives. There's a SATA to IDE apapter included with the dock. IT gurus interested in something like this can find it online for around $400, or 20 percent less than it's MSRP ($500). Image Credit: StarTech.com |
You are subscribed to email updates from Maximum PC - All Articles To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |