User Manual
Table Of Contents
- User Guide
- Table of Contents
- List of Figures
- Chapter 1: Introduction
- Chapter 2: Planning your Wireless Network
- Chapter 3: Getting to Know the Wireless-G Notebook Adapter
- Chapter 4: Software Installation and Configuration
- Chapter 5: Hardware Installation
- Chapter 6: Using the WLAN Monitor
- Appendix A: Troubleshooting
- Appendix B: Wireless Security
- Appendix C: Windows Help
- Appendix D: Glossary
- Appendix E: Specifications
- Appendix F: Warranty Information
- Appendix G: Regulatory Information
- Appendix H: Contact Information

32
Appendix A: Troubleshooting
Frequently Asked Questions
Wireless-G Notebook Adapter
Would the information be intercepted while transmitting on air?
WLAN features two-fold protection in security. On the hardware side, as with Direct Sequence Spread Spectrum
technology, it has the inherent security feature of scrambling. On the software side, WLAN offers the encryption
function (WEP) to enhance security and access control.
What is WEP?
WEP is Wired Equivalent Privacy, a data privacy mechanism based on a shared key algorithm, as described in the
IEEE 802.11 standard.










