Skip to main content

How to Implement a WiFi Network

Joint Event between Bedford College and the Bedford branch of the British Computer Society

Date: Tuesday, 26 February 2013

Speaker:  Geraint Williams, Information Risk Consultant and Trainer, IT Governance Ltd., Honorary Visiting Fellow at the University of Bedfordshire.

Time:  6.00pm for 6.30-8.00pm

Location:  Studio Theatre, Bedford College, Cauldwell Street, Bedford MK42 9AH


Continuing the programme of highly successful events held at Bedford College, there will be another joint British Computer Society (BCS) and Bedford College free evening lecture on Tuesday 26 February 2013.

“WiFi Networks: The Practicalities of Implementing A WiFi Network” is the topic of a talk by Geraint Williams, Information Risk Consultant and Trainer, IT Governance Ltd., and Honorary Visiting Fellow at the University of Bedfordshire.

Secure configuration is becoming ever more important as an increasing number of devices are incorporating wireless technology - from laptops, smartphones, tablets, projectors and cameras, to multimedia entertainment systems and games consoles.  The growing demand for allowing BYOD (“Bring Your Own Device”) within the corporate network means that larger numbers of organisations are implementing wireless networks. 

The wireless network standard 802.11 was originally released in 1997 by the IEEE and, by computing timescales, is a mature technology with a large base of manufacturers and both commercial and domestic users.  Despite initiatives like Wireless Protected Setup (WPS) to make installation easier, there are still issues in implementing a network using wireless technology in both the corporate and home environments.

The courts have already convicted paedophiles for piggybacking neighbours wireless networks to download material, and hackers for using wireless networks for pirating software, music and films and for spying on occupants using their own security cameras.

Wireless networks have a history of security problems with flaws in the implementation of WEP and recently with WPS.  This talk will look at these issues, the (open source) tools that can be used, and how these apply to the wireless environment.  The talk will include practical demonstrations of the tools and techniques discussed in the presentation and will unravel the alphabetic soup of the available standards.

Geraint Williams is an Information Risk Consultant and Trainer for IT Governance Ltd. and an Honorary Visiting Fellow at the University of Bedfordshire.  Geraint is a knowledgeable and experienced Information Security consultant with experience including vulnerability testing, digital forensics, secure networking, and wireless security issues..  Geraint has a strong technical knowledge of security and IT infrastructure including high performance computing.  Geraint has a number of certifications in security and digital forensics including CISSP, CISA, CEH and CHFI.


6.00pm            Registration, refreshments and networking

6.30pm            Introduction
                        WiFi Networks: The Practicalities of Implementing A WiFi Network

7.20pm            Opportunity to question the speaker

7.45pm            Thanks
Opportunity to network and talk to the speaker

Details available :  

Popular posts from this blog

Experiments in teaching Neural Networks

Excel Based

More details available at including links to the code.

All views and opinions are the author's and do not necessarily reflected those of any organisation they are associated with. Twitter: @scottturneruon

Social Analysis of Publications

The Computing staff's network of co-authors, at the University of Northampton, based on the University's  research repository NECTAR - on 12th November 2016. The data goes back to 2010.

The data was analysed using the software VOSviewer - free software for visualising networks. Differences in colours represents, the clusters of publications with those authors picked out by the software. The relative size of the circles is the relative number of publications listed; so for the two biggest circles/hubs it relates to 55 and 34 publications in this time period. Some relatively new authors, to the University but not to research, explains some of the 'islands' and the number of publications within it - it only reflects publications whilst at the University of Northampton.

To dig a little deeper, going to  look at the two biggest 'hubs' through their NECTAR records, so potentially going …

Computer lecturer’s research helps improve the next generation of technology

Taken from: A computing lecturer at the University of Northampton, who is researching into how the efficiency of our everyday devices, such as mobile phones, can be improved, has been awarded the best paper at two recent conferences. Dr Michael Opoku Agyeman has written several journal papers focusing on how the next generation of technology can meet the ever increasing demands from consumers. He was invited to present his work at the 19th Euromicro Conference on Digital System Design in Cyprus and the Institute of Electrical and Electronics Engineers’ 14th International Conference in Paris. Part of his research concentrates on whether several processing elements can be incorporated on a single chip, known as System-On-Chip, to improve the efficiency and speed of the computing systems that we use every day, from mobile phones to video-game consoles and even medical equipment…