Wireless lan, Wireless lan -28, Security – Toshiba Satellite Pro M40 User Manual
Page 94

4-28
User’s Manual
Operating Basics
Wireless LAN
The Wireless LAN is compatible with other LAN systems based on Direct
Sequence Spread Spectrum/Orthogonal Frequency Division Multiplexing
radio technology that complies with IEEE802.11 wireless LAN standard
(Revision A, B or G) and Turbo Mode.
Supported features. It supports the following features:
■
Automatic Transmit Rate Select mechanism in the transmit range of
54, 48, 36, 24, 18, 12, 9 and 6 Mbit/s (Revision A and G, Revision A/B,
B/G, A/B/G combo type).
■
Automatic Transmit Rate Select mechanism in the transmit range of 11,
5.5, 2 and 1 Mbit/s (Revision B).
■
Automatic Transmit Rate Select mechanism in the transmit range of
108, 96, 72, 48, 36, 24, 18 and 12 Mbit/s (Turbo mode, Revision A/B/G
combo type).
■
Frequency Channel Selection (Revision A/Turbo Mode: 5 GHz,
Revision B/G: 2.4GHz)
■
Roaming over multiple channels
■
Card Power Management
■
Atheros Super G™ or Super AG™ technology (Atheros module type).
■
Wired Equivalent Privacy (WEP) data encryption, based on the
152 bit encryption algorithm (Atheros module type).
■
Wired Equivalent Privacy (WEP) data encryption, based on the
128 bit encryption algorithm (Atheros module type).
■
Advanced Encryption Standard (AES) data encryption, based on
256 bit encryption algorithm (Atheros module type).
Security
■
Be sure to enable WEP (encryption) function. Otherwise your computer
will allow the illegal access by outsider through wireless LAN to cause
illegal instruction, eavesdropping, and loss or destruction of stored data.
TOSHIBA strongly recommends the customer to enable the WEP
function.
■
TOSHIBA is not liable for the eavesdropping of data due to the use of
Wireless LAN and the damage thereof.
Radio links
You can easily establish links between two or more devices. The link is
maintained even if the devices are not within line of sight.
Security
Two advanced security mechanisms ensure a high level of security:
■
Authentication prevents access to critical data and makes it impossible
to falsify the origin of a message.
■
Encryption prevents eavesdropping and maintains link privacy.