answersLogoWhite

0


Best Answer

The simple wireless configuration technique that can make the network invisible to unauthorized users are disable SSID broadcasting. This will disable the network from being broadcasted.

User Avatar

Wiki User

9y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Which simple wireless configuration technique can make the network invisible to unauthorized users?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Wireless zero configuration?

Wireless Zero Configuration is a Windows term. It has to do with connecting to a wireless network. In Windows XP it has utilities for connecting to wireless networks built into the Operating System. Windows uses Wireless Zero Configuration Service to automatically connect to a wireless access point (WI-FI). Basically it means you can bring a laptop anywhere there is a WI-FI Hotspot and your computer will connect automatically and alert you. Hence, Wireless Zero Configuration Service.


Which two wireless configuration features make it harder for a hacker to see and attach to a wireless network?

Which two wireless configuration features make it harder for a hacker to see and attach to a wireless network?Read more: Which_two_wireless_configuration_features_make_it_harder_for_a_hacker_to_see_and_attach_to_a_wireless_network


Wireless Zero Configuration is included from which Windows Operating system?

(Q)-Wireless Zero Configuration was first introduced with which operating system? (A)-Windows XP


Which configuration on a wireless router is not considered to be adequate security for a wireless network?

disable an SSID broadcast


What is the advantage of using WPA to secure a wireless network?

It uses a 128-bit pre-shared hexadecimal key to prevent unauthorized wireless access.


Wi-fi is it a computer type?

Wi-fi stands for the wireless fidility . it is a wireless technique .


How does one enable Wireless Zero configuration on Windows?

Wireless Zero is only supported on Windows XP and Server 2003. Step by step instructions can be found at MSDN Microsoft's site. Type in wireless zero in the search box in the upper right corner. Go to Wireless Zero Configuration Reference.


Why there is Request for network password?

For either a personal or a business wireless network, it's to protect it from unauthorized users.


When compared with wired communications what are the advantages of wireless communications?

Portability Rapid configuration Mobility


What is bcmwls32?

bcmwls32.exe is the Broadcom Wireless Network Card Utility. It is accompanied by the system drivers for a Broadcom wireless card. It replaces the Windows Wireless Zero Configuration Service as your interface for configuring and connecting to wireless networks.


Connecting Linksys Wireless Router?

The Linksys Wireless Router is easy to connect. Here is how to configure linksys wireless router. First, note that the Linksys wireless routers are compatible with Windows 7, Vista, and Windows XP. The Linksys Wireless router package should contain full set up instructions and configuration model. Take the wireless router out of the box and place it in a clear area near the computer. Load the CD into the computer and follow the setup and configuration steps.


What is the function of a wireless bridge?

Wireless bridging is the technique of connecting two wireless access points together. This can be done to extend the range of a wireless network, or to create a wireless bridge between two or more wired networks, perhaps in separate buildings.