CHAPTER 5: Wi-Fi and 3G Connectivity
130
4.
Check the boxes to turn on Wi-Fi and receive a notification when an open Wi-Fi
network is within range.
5.
Tap an available network to log into it. If the network requires a password, you’ll
only have to type it here once. Your DROID will remember your settings next time
you use this service.
If you want to add a private network that doesn’t broadcast its SSID, tap
Add Wi-Fi
network
. If you want to remove networks you no longer use, such as hotels you visited
only once, tap
Manage Networks
.
TIP:
You can also use a Wi-Fi widget from your
Home
screen to toggle Wi-Fi on and off. See
Chapter 6, “Organize Your Home Screens” for specifics on adding widgets.
The clear advantage of Wi-Fi is speed. Wi-Fi is superior when it comes to uploading or
watching videos. Its chief disadvantage is distance. If you’re not within range of a Wi-Fi
network all day or even most of the day, you can extend your DROID’s battery life by
turning off your Wi-Fi signal.
Wi-Fi Security
A big consideration with Wi-Fi is security. If you’re using an encrypted connection, this
isn’t as much of a problem. However, those convenient, open Wi-Fi access points at the
coffee shop may in theory expose your phone to unwanted eavesdropping through an
exploit called the
man-in-the-middle
attack where someone intercepts your
unencrypted information before it reaches the Wi-Fi access point. It’s also sometimes
called a
bucket brigade
attack, so think of the attacker as a stranger standing in the
middle of a bucket brigade with the chance to see the contents of each bucket that
passes by.
Wi-Fi security usually involves some sort of password protection to access the network.
An older, less secure method of connecting to Wi-Fi is WEP. A more secure method is
WPA or WPA2. Most personal networks, like your router at home, can be set to use
WPA-PSK (pre-shared key.) This is a fancy way of saying that you have to type in a
password or passphrase to get access to the network.
CAUTION:
If you have a choice in the matter, avoid relying on WEP for your Wi-Fi security. It’s an
old standard and very easy to crack.
Businesses that want to sell or restrict access to their network use a form of WPA-
enterprise. This type of connection usually requires you to log in when you open your
first web page, and it compares your username with a list of authorized users. In some
cases, you don’t actually have to log in, but you do have to click something to agree to
the location’s terms of service. This is still part of WPA security.
Содержание DROID 2 Global
Страница 1: ...DROIDS Made Simple MartinTrautschold Gary Mazo Marziah Karch DROIDS ...
Страница 3: ......
Страница 25: ... ACKNOWLEDGMENTS xxii ...
Страница 27: ......
Страница 55: ......
Страница 61: ...INTRODUCTION 36 ...
Страница 63: ......
Страница 120: ...CHAPTER 2 Typing Voice Copy and Search 95 Now you have instant access to Google Search right from your Home screen ...
Страница 121: ...CHAPTER 2 Typing Voice Copy and Search 96 ...
Страница 151: ...CHAPTER 4 Other Sync Methods 126 ...
Страница 213: ...CHAPTER 7 Making Phone Calls 188 ...
Страница 245: ...CHAPTER 9 Email on Your DROID 220 ...
Страница 263: ...CHAPTER 10 SMS MMS and Instant Messaging 238 Figure 10 6 Logging in to your AIM account using AIM or Facebook ...
Страница 349: ...CHAPTER 15 Viewing Videos TV Shows and More 324 ...
Страница 367: ...CHAPTER 16 New Media Reading Newspapers Magazines and E books 342 ...
Страница 415: ...CHAPTER 18 Taking Photos and Videos 390 ...
Страница 493: ...CHAPTER 21 Working With Notes and Documents 468 ...
Страница 529: ...CHAPTER 24 Troubleshooting 504 ...
Страница 531: ......
Страница 548: ...CHAPTER 25 DROID Media Sync 523 Figure 25 6 Finding and purchasing music in the Amazon MP3 store from doubleTwist ...
Страница 549: ...CHAPTER 25 DROID Media Sync 524 ...
Страница 581: ...APPENDIX DRIOD App Guide 556 ...
Страница 611: ......
Страница 612: ......
Страница 613: ...Index ...
Страница 614: ......
Страница 615: ...Index ...
Страница 616: ......
Страница 617: ...Index ...