<p><span style="font-family: "Cambria","serif"; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;"><span style="font-size: small;"><span style="color: #000000;">Wireless networking has become very popular in the last couple of years. The necessary hardware is widely availabe and relatively easy to install and configure. With wireless network users can connect to Internet from every part of the house without any cable necessary which makes thier life much easier. This technology brings meny benefits but it has to be properly secured to prevent many serious risks and dangers if left wide open.</span></span></span></p><p><span style="font-family: "Cambria","serif"; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;"><span style="font-size: small;"><span style="color: #000000;">In best case, intruder only uses the victim's broadband connection to surf the web and download content. It can slow down Internet or network access for the victim and couse additional cost it the ISP meters used bandwith and charges for actual usage.</span></span></span></p><p><span style="font-family: "Cambria","serif"; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;"><span style="font-size: small;"><span style="color: #000000;">An unauthorized user could abuse the connection for hacking, launching DoS attack or distributing illegal material.</span></span></span></p><p><span style="font-family: "Cambria","serif"; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;"><span style="font-size: small;"><span style="color: #000000;">Through wireless network, intruder can access victim's private network. He can access confidential data such as financial data, tax records, development information… By employing a sniffer an intruder can even sniff email of FTP user names and passwords and use information to gain unauthorized access to email accounts or web services without the victim's knowledge. </span></span></span></p><p><span style="font-family: "Cambria","serif"; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;"><span style="font-size: small;"><span style="color: #000000;">What is also important, one does not have to be a programmer or network specialist to discover and gain unauthorized access to wireless network. <span style="mso-spacerun: yes;"> </span></span></span></span></p><p><span style="font-family: "Cambria","serif"; mso-ascii-theme-font: major-latin; mso-hansi-theme-font: major-latin;"><span style="font-size: small;"><span style="color: #000000;">Considering all of the possible attacks, it's clearly that every wireless network has to be secured in order to avoid problems. </span></span></span></p>