Sorry

This feed does not validate.

In addition, interoperability with the widest range of feed readers could be improved by implementing the following recommendations.

Source: http://miguelabrantes.pt/en/feed/

  1. <?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
  2. xmlns:content="http://purl.org/rss/1.0/modules/content/"
  3. xmlns:wfw="http://wellformedweb.org/CommentAPI/"
  4. xmlns:dc="http://purl.org/dc/elements/1.1/"
  5. xmlns:atom="http://www.w3.org/2005/Atom"
  6. xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
  7. xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
  8. >
  9.  
  10. <channel>
  11. <title>Msa:: Miguelabrantes.pt &#187; Languages &#187; English</title>
  12. <atom:link href="http://miguelabrantes.pt/en/feed/" rel="self" type="application/rss+xml" />
  13. <link>https://miguelabrantes.pt</link>
  14. <description>Especialista em TI</description>
  15. <lastBuildDate>Sun, 26 Nov 2017 17:19:25 +0000</lastBuildDate>
  16. <language>en-US</language>
  17. <sy:updatePeriod>hourly</sy:updatePeriod>
  18. <sy:updateFrequency>1</sy:updateFrequency>
  19. <generator>https://wordpress.org/?v=4.2.37</generator>
  20. <item>
  21. <title>36 Hours in Lisbon</title>
  22. <link>https://miguelabrantes.pt/2015/04/36-hours-in-lisbon/</link>
  23. <comments>https://miguelabrantes.pt/2015/04/36-hours-in-lisbon/#comments</comments>
  24. <pubDate>Tue, 28 Apr 2015 16:21:54 +0000</pubDate>
  25. <dc:creator><![CDATA[Miguel Sampayo Abrantes (IT)]]></dc:creator>
  26. <category><![CDATA[activity]]></category>
  27. <category><![CDATA[publicity]]></category>
  28. <category><![CDATA[tourism]]></category>
  29. <category><![CDATA[videos]]></category>
  30.  
  31. <guid isPermaLink="false">http://miguelabrantes.pt/?p=3101</guid>
  32. <description><![CDATA[<p>36 Hours in Lisbon 36 Hours in Lisbon, by Fritzie Andrade, Max Cantor, Chris Carmichael, Will Lloyd, Sofia Perpetua e Sarah Brady Voll. 1 abr. 2015 &#124; 6:06 Video nytimes.com (US, United States). 36 Hours in Lisbon. Available at &#60;nytimes.com&#62;. Accessed on Apr. 28, 2015. &#8220;Throughout this hilly city on the Tagus River, structures and [&#8230;]</p>
  33. <p>The post <a rel="nofollow" href="https://miguelabrantes.pt/2015/04/36-hours-in-lisbon/">36 Hours in Lisbon</a> first appears on <a rel="nofollow" href="http://miguelabrantes.pt/en">Msa:: Miguelabrantes.pt</a>.</p>
  34. ]]></description>
  35. <content:encoded><![CDATA[<h2 class="nmostra">36 Hours in Lisbon</h2>
  36. <p>36 Hours in Lisbon, by Fritzie Andrade, Max Cantor, Chris Carmichael, Will Lloyd, Sofia Perpetua e Sarah Brady Voll.</p>
  37. <p>1 abr. 2015 | 6:06</p>
  38. <h3>Video</h3>
  39. <div class="video-container"><iframe scrolling="no" src="http://graphics8.nytimes.com/bcvideo/1.0/iframe/embed.html?videoId=100000003578139&#038;playerType=embed" allowfullscreen="" title="video"></iframe></div>
  40. <div>nytimes.com (US, United States). <strong>36 Hours in Lisbon</strong>. Available at &lt;nytimes.com&gt;. Accessed on Apr. 28, 2015.</div>
  41. <p>&#8220;<small>Throughout this hilly city on the Tagus River, structures and spaces are being stylishly reborn, harboring chic boutiques, galleries and new spots for eating and drinking.</small>&#8220;</p>
  42. <div class="fusion-sep-clear"></div><div class="fusion-separator sep-none" style="border-color:#e0dede;margin-top:20px;"></div>
  43. <div class="fusion-fullwidth fullwidth-box" style="background-attachment:scroll;background-position:top left;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;border-color:#eae9e9;border-bottom-width: 0px;border-top-width: 0px;border-bottom-style: solid;border-top-style: solid;padding-bottom:0px;padding-top:40px;"><div class="avada-row">
  44. <div class="fusion-title title"><h3 class="title-heading-left">Publicidade</h3><div class="title-sep-container"><div class="title-sep sep-double"></div></div></div>
  45. <div class="fusion-sep-clear"></div><div class="fusion-separator sep-none" style="border-color:#e0dede;margin-top:-30px;"></div>
  46. <script async src="//pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script><noscript>Enable JavaScript bs3</noscript><br />
  47. <ins class="adsbygoogle" style="display:block" data-ad-client="ca-pub-4395206803342039" data-ad-slot="7868201109" data-ad-format="auto"></ins><br />
  48. <script>
  49. (adsbygoogle = window.adsbygoogle || []).push({});
  50. </script><noscript>Enable JavaScript bs4</noscript><br />
  51. <div class="fusion-one-half one_half fusion-column">
  52. </div>
  53. <div class="fusion-one-half one_half fusion-column last">
  54. </div><div class="fusion-clearfix"></div>
  55. </div></div>
  56. <div class="fusion-sep-clear"></div><div class="fusion-separator sep-none" style="border-color:#e0dede;margin-top:70px;"></div>
  57. <p>The post <a rel="nofollow" href="https://miguelabrantes.pt/2015/04/36-hours-in-lisbon/">36 Hours in Lisbon</a> first appears on <a rel="nofollow" href="http://miguelabrantes.pt/en">Msa:: Miguelabrantes.pt</a>.</p>
  58. ]]></content:encoded>
  59. <wfw:commentRss>https://miguelabrantes.pt/2015/04/36-hours-in-lisbon/feed/</wfw:commentRss>
  60. <slash:comments>2</slash:comments>
  61. </item>
  62. <item>
  63. <title>Wireless Encryption WEP WPA and WPA2</title>
  64. <link>https://miguelabrantes.pt/2015/03/wireless-encryption-wep-wpa-and-wpa2/</link>
  65. <comments>https://miguelabrantes.pt/2015/03/wireless-encryption-wep-wpa-and-wpa2/#comments</comments>
  66. <pubDate>Fri, 27 Mar 2015 01:39:13 +0000</pubDate>
  67. <dc:creator><![CDATA[Miguel Sampayo Abrantes (IT)]]></dc:creator>
  68. <category><![CDATA[entertainment]]></category>
  69. <category><![CDATA[informatics]]></category>
  70. <category><![CDATA[investigation]]></category>
  71. <category><![CDATA[science]]></category>
  72. <category><![CDATA[technology]]></category>
  73. <category><![CDATA[web]]></category>
  74. <category><![CDATA[comment]]></category>
  75. <category><![CDATA[nowadays]]></category>
  76.  
  77. <guid isPermaLink="false">http://miguelabrantes.pt/?p=2942</guid>
  78. <description><![CDATA[<p>Wireless Encryption WEP WPA and WPA2 Many wireless users do not know WEP WPA WPA2 wireless encryption protocols and the security threats that may be subject while accessing a wireless network. When users set wireless network passwords with WEP WPA WPA2 Wireless encryption protocol, users tend to think they are immune from hackers. However, hackers [&#8230;]</p>
  79. <p>The post <a rel="nofollow" href="https://miguelabrantes.pt/2015/03/wireless-encryption-wep-wpa-and-wpa2/">Wireless Encryption WEP WPA and WPA2</a> first appears on <a rel="nofollow" href="http://miguelabrantes.pt/en">Msa:: Miguelabrantes.pt</a>.</p>
  80. ]]></description>
  81. <content:encoded><![CDATA[<h2 class="nmostra">Wireless Encryption WEP WPA and WPA2</h2>
  82. <p>Many wireless users do not know WEP WPA WPA2 wireless encryption protocols and the security threats that may be subject while accessing a wireless network.</p>
  83. <p>When users set wireless network passwords with WEP WPA WPA2 Wireless encryption protocol, users tend to think they are immune from hackers. However, hackers can easily get to their access and download a high potential of information about the user or human capital.</p>
  84. <p>Besides, the collected data may be used by hackers for their advantage while the right user pays.</p>
  85. <div class="fusion-sep-clear"></div><div class="fusion-separator sep-none" style="border-color:#e0dede;margin-top:30px;"></div>
  86. <p><img src="/wp-content/uploads/2015/03/wifi61.jpg" alt="Mpa: WiFi - Wireless Encryption WEP WPA and WPA2" title="Mpa: Image Zona WiFi" width="1600" height="885" /><br />
  87. Zona Wi-Fi</p>
  88. <div class="fusion-sep-clear"></div><div class="fusion-separator sep-none" style="border-color:#e0dede;margin-top:-15px;"></div>
  89. <div class="fusion-title title"><h3 class="title-heading-left">Types of wireless security encryption</h3><div class="title-sep-container"><div class="title-sep sep-double"></div></div></div>
  90. <p>There are some basic security measures listed below that you can take; but first, you may want to learn about Wireless Encryption WEP WPA and WPA2 and the difference between wireless security encryption protocols.</p>
  91. <p><div class="fusion-tabs fusion-tabs-1 vertical-tabs"><!--<style>#wrapper .fusion-tabs.fusion-tabs-1 .nav-tabs li a{border-top-color:#ebeaea;background-color:#ebeaea;}#wrapper .fusion-tabs.fusion-tabs-1 .nav-tabs{background-color:#ffffff;}#wrapper .fusion-tabs.fusion-tabs-1 .nav-tabs li.active a,#wrapper .fusion-tabs.fusion-tabs-1 .nav-tabs li.active a:hover,#wrapper .fusion-tabs.fusion-tabs-1 .nav-tabs li.active a:focus{background-color:#ffffff;border-right-color:#ffffff;}#wrapper .fusion-tabs.fusion-tabs-1 .nav-tabs li a:hover{background-color:#ffffff;border-top-color:#ffffff;}#wrapper .fusion-tabs.fusion-tabs-1 .tab-pane{background-color:#ffffff;}#wrapper .fusion-tabs.fusion-tabs-1 .nav,#wrapper .fusion-tabs.fusion-tabs-1 .nav-tabs,#wrapper .fusion-tabs.fusion-tabs-1 .tab-content .tab-pane{border-color:#ebeaea;}</style>--><div class="nav"><ul class="nav-tabs"><li class="active"><a class="tab-link" id="wpa2/aes" href="#a098df0bab79c51f1" data-toggle="tab">WPA2/AES</a></li><li><a class="tab-link" id="wpaandwpa2" href="#46f7e60a027692a7c" data-toggle="tab">WPA and WPA2</a></li><li><a class="tab-link" id="wep" href="#86cbe99cd9e793e33" data-toggle="tab">WEP</a></li></ul></div><div class="tab-content"><div class="tab-pane fade in active" id="a098df0bab79c51f1">The AES algorithm (stands for Advanced Encryption Standard) is a cryptographic cipher adopted by the US government (US). It was announced by the NIST (National Institute of Standards and Technology) in the US in 2001 after 5 years of standardization. It became effective in 2002, and it is one of the most popular algorithms today. The AES algorithm is the main difference between WPA and WPA2.<br />
  92. <br/>Moreover, it also introduced the CCMP (Counter Cipher Mode Protocol) which is a protocol encryption focused on wireless networks products that apply the IEEE802.11i safety standards to the original standard IEEE802.11.<br />
  93. <br/>The use of CCMP against the use of TKIP (Temporal Key Integrity Protocol) encryption is an improved data encapsulation mechanism oriented to the confidentiality of data based on the counter mode with CBC-MAC (CCM) of the AES standard. It was created to address the vulnerabilities presented by WEP, currently insecure.<br />
  94. <br/>In the current scenario the use of WPA2 system can be the way to make the network more secure.<br />
  95. </div><div class="tab-pane fade" id="46f7e60a027692a7c">WPA (Wi-Fi Protected Access) and WPA2 (Wi-Fi Protected Access II) &#8211; WPA and WPA2 are two security protocols developed by the <a href="https://www.wi-fi.org/product-finder" title="Wi-Fi Alliance" target="_blank" class="external floatbox" >Wi-Fi Alliance</a> to secure and protect the wireless communication of computers networks.<br />
  96. <br/>WPA is an improved WEP that became available in 2003 after a year of official retirement by WEP.<br />
  97. <br/>The increase from 64-bit and 128-bit to 256-bit WPA makes a difference in the method and how Encryption keys are used.<br />
  98. <br/>Message integrity check and TKIP (Temporal Key Integrity Protocol) was another change later introduced in the WPA in terms of integrity and intrusion check, providing more security for the user.<br />
  99. <br/>However, despite the innovations, WPA still presents some flaws, and thus still prone to hacking, but not so easily as in the case of WEP.<br />
  100. </div><div class="tab-pane fade" id="86cbe99cd9e793e33">WEP (Wired Equivalent Privacy) was introduced in 1999 and despite recommendation of stricter security protocols for safer web connectivity over the years, WEP has been found to have security flaws making the network as well as the users vulnerable to hackers.</div></div></div><br />
  101. <div class="fusion-sep-clear"></div><div class="fusion-separator sep-none" style="border-color:#e0dede;margin-top:-5px;"></div>
  102. <div class="fusion-fullwidth fullwidth-box" style="background-attachment:scroll;background-position:top left;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;border-color:#eae9e9;border-bottom-width: 0px;border-top-width: 0px;border-bottom-style: solid;border-top-style: solid;padding-bottom:0px;padding-top:40px;"><div class="avada-row">
  103. <div class="fusion-title title"><h3 class="title-heading-left">Advertising</h3><div class="title-sep-container"><div class="title-sep sep-double"></div></div></div>
  104. <div class="fusion-sep-clear"></div><div class="fusion-separator sep-none" style="border-color:#e0dede;margin-top:-30px;"></div>
  105. <script async src="//pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script><noscript>Enable JavaScript bs3</noscript><br />
  106. <ins class="adsbygoogle" style="display:block" data-ad-client="ca-pub-4395206803342039" data-ad-slot="7868201109" data-ad-format="auto"></ins><br />
  107. <script>
  108. (adsbygoogle = window.adsbygoogle || []).push({});
  109. </script><noscript>Enable JavaScript bs4</noscript><br />
  110. <div class="fusion-one-half one_half fusion-column">
  111. </div>
  112. <div class="fusion-one-half one_half fusion-column last">
  113. </div><div class="fusion-clearfix"></div>
  114. </div></div>
  115. <div class="fusion-sep-clear"></div><div class="fusion-separator sep-none" style="border-color:#e0dede;margin-top:70px;"></div>
  116. <div class="fusion-title title"><h4 class="title-heading-left">List of measures</h4><div class="title-sep-container"><div class="title-sep sep-double"></div></div></div>
  117. <p>Below I present a list of measures that can be taken to protect the wireless network:</p>
  118. <ul class="fusion-checklist">
  119.  
  120. <li class="fusion-li-item size-small"><span style="background-color:#67b7e1;" class="icon-wrapper circle-yes"><i class="fusion-li-icon fa fa-check" style="color:#ffffff;"></i></span><span class="fusion-li-item-content"><strong>Router Firmware</strong><br/>Using the latest Router Firmware can play a very crucial part in securing the wireless network. Use the latest updated firmware versions in providing protection against hackers.</span></li>
  121. <li class="fusion-li-item size-small"><span style="background-color:#67b7e1;" class="icon-wrapper circle-yes"><i class="fusion-li-icon fa fa-check" style="color:#ffffff;"></i></span><span class="fusion-li-item-content"><strong>Establish Strong Passwords</strong><br/>Password strength is a measure of the effectiveness of a password in resisting guessing and brute force attacks. It estimates how many trials an attacker who does not have direct access to the password would need, to guess it correctly.<br/>Even if you are using the most secure encryption you can become an easy target with a weak password.<br/>The strength of password is the result of its length, unpredictability and complexity. The best password security policy is a combination of capital and lower case letters, numbers and symbols and minimum 8 characters long.
  122. </span></li>
  123. <li class="fusion-li-item size-small"><span style="background-color:#67b7e1;" class="icon-wrapper circle-yes"><i class="fusion-li-icon fa fa-check" style="color:#ffffff;"></i></span><span class="fusion-li-item-content"><strong>SSID Name</strong><br/>Many users ignore the importance of changing the name of the used network. However, keeping the same name of the wireless network (system default), help the discovery of network access password, using its name and the use of tools available on the Internet.<br/>If you suspect that there was an intrusion in your network, you should contact IT Specialists about systems &#038; network administration to perform the necessary procedures to safeguard your data.
  124. </span></li>
  125.  
  126. </ul>
  127. <div class="fusion-sep-clear"></div><div class="fusion-separator sep-none" style="border-color:#e0dede;margin-top:-5px;"></div>
  128. <div class="fusion-fullwidth fullwidth-box" style="background-attachment:scroll;background-position:top left;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;border-color:#eae9e9;border-bottom-width: 0px;border-top-width: 0px;border-bottom-style: solid;border-top-style: solid;padding-bottom:0px;padding-top:40px;"><div class="avada-row">
  129. <div class="fusion-title title"><h3 class="title-heading-left">Advertising</h3><div class="title-sep-container"><div class="title-sep sep-double"></div></div></div>
  130. <div class="fusion-sep-clear"></div><div class="fusion-separator sep-none" style="border-color:#e0dede;margin-top:-30px;"></div>
  131. <script async src="//pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script><noscript>Enable JavaScript bs3</noscript><br />
  132. <ins class="adsbygoogle" style="display:block" data-ad-client="ca-pub-4395206803342039" data-ad-slot="7868201109" data-ad-format="auto"></ins><br />
  133. <script>
  134. (adsbygoogle = window.adsbygoogle || []).push({});
  135. </script><noscript>Enable JavaScript bs4</noscript><br />
  136. <div class="fusion-one-half one_half fusion-column">
  137. </div>
  138. <div class="fusion-one-half one_half fusion-column last">
  139. </div><div class="fusion-clearfix"></div>
  140. </div></div>
  141. <div class="fusion-sep-clear"></div><div class="fusion-separator sep-none" style="border-color:#e0dede;margin-top:70px;"></div>
  142. <div class="fusion-fullwidth fullwidth-box" style="background-attachment:scroll;background-color:#ffffff;background-position:top left;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;border-color:#f6f6f6;border-bottom-width: 0px;border-top-width: 0px;border-bottom-style: solid;border-top-style: solid;padding-bottom:0px;padding-top:0px;"><div class="avada-row">
  143. <div class="fusion-reading-box-container reading-box-container-1"><section class="reading-box element-bottomshadow" style="background-color:#fff;border-width:1px;border-color:#e8e6e6;border-top-width:3px;border-top-color:#0080ff;border-style:solid;"><h2><strong>802.1x</strong> wireless authentication<br/>(for medium-sized companies)</h2><p>Local wireless networks (WLAN) have at least discussed the advantages and disadvantages of the use of wireless technology in small businesses.</p></section></div>
  144. </div></div>
  145. <div class="fusion-sep-clear"></div><div class="fusion-separator sep-none" style="border-color:#e0dede;margin-top:20px;"></div>
  146. <p>Actually, companies that have already implemented wireless networks usually have concerns about the security of your data and their human capital.
  147. </p>
  148. <p>Often they move away from the wireless network technology with the obvious prejudice on their productivity and infrastructure that may no longer hold.</p>
  149. <p>Many alternatives have been available, as well as technology that allowed greater reliability and higher speeds, existing today many standards and updates to protect wireless transmissions.</p>
  150. <p>The most recent security wireless protocols including WPA2, based on the IEEE_802.1X standard, help provide the best protection for trafficking in the business environment of a medium enterprise. Current standards, when configured correctly (DNS/DHCP/Radius servers, VLAN, AP, IEEE_802.1X protocol, network devices and other components) are very safe and can be used with a high level of confidence in the business environment of a small/medium company at low cost.</p>
  151. <p class="nmostra"> Wireless Encryption WEP WPA and WPA2 Wireless Encryption WEP WPA and WPA2 Wireless Encryption WEP WPA and WPA2 Wireless Encryption WEP WPA and WPA2 </p>
  152. <h2>Pre-requisites</h2>
  153. <ul class="fusion-checklist">
  154.  
  155. <li class="fusion-li-item size-small"><span style="background-color:#67b7e1;" class="icon-wrapper circle-yes"><i class="fusion-li-icon fa fa-check" style="color:#ffffff;"></i></span><span class="fusion-li-item-content">Active Directory</span></li>
  156. <li class="fusion-li-item size-small"><span style="background-color:#67b7e1;" class="icon-wrapper circle-yes"><i class="fusion-li-icon fa fa-check" style="color:#ffffff;"></i></span><span class="fusion-li-item-content">DNS</span></li>
  157. <li class="fusion-li-item size-small"><span style="background-color:#67b7e1;" class="icon-wrapper circle-yes"><i class="fusion-li-icon fa fa-check" style="color:#ffffff;"></i></span><span class="fusion-li-item-content">DHCP</span></li>
  158. <li class="fusion-li-item size-small"><span style="background-color:#67b7e1;" class="icon-wrapper circle-yes"><i class="fusion-li-icon fa fa-check" style="color:#ffffff;"></i></span><span class="fusion-li-item-content">IAS or NPS (Radius)</span></li>
  159. <li class="fusion-li-item size-small"><span style="background-color:#67b7e1;" class="icon-wrapper circle-yes"><i class="fusion-li-icon fa fa-check" style="color:#ffffff;"></i></span><span class="fusion-li-item-content">IEEE 802.1X</span></li>
  160. <li class="fusion-li-item size-small"><span style="background-color:#67b7e1;" class="icon-wrapper circle-yes"><i class="fusion-li-icon fa fa-check" style="color:#ffffff;"></i></span><span class="fusion-li-item-content">VLAN</span></li>
  161. <li class="fusion-li-item size-small"><span style="background-color:#67b7e1;" class="icon-wrapper circle-yes"><i class="fusion-li-icon fa fa-check" style="color:#ffffff;"></i></span><span class="fusion-li-item-content">AP WPA2/AES</span></li>
  162. <li class="fusion-li-item size-small"><span style="background-color:#67b7e1;" class="icon-wrapper circle-yes"><i class="fusion-li-icon fa fa-check" style="color:#ffffff;"></i></span><span class="fusion-li-item-content">EAP-PEAP, Encryption: MSCHAPv2</span></li>
  163.  
  164. </ul>
  165. <div class="fusion-sep-clear"></div><div class="fusion-separator sep-none" style="border-color:#e0dede;margin-top:-30px;"></div>
  166. <div class="fusion-fullwidth fullwidth-box" style="background-attachment:scroll;background-position:top left;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;border-color:#eae9e9;border-bottom-width: 0px;border-top-width: 0px;border-bottom-style: solid;border-top-style: solid;padding-bottom:0px;padding-top:40px;"><div class="avada-row">
  167. <div class="fusion-title title"><h3 class="title-heading-left">Advertising</h3><div class="title-sep-container"><div class="title-sep sep-double"></div></div></div>
  168. <div class="fusion-sep-clear"></div><div class="fusion-separator sep-none" style="border-color:#e0dede;margin-top:-30px;"></div>
  169. <script async src="//pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script><noscript>Enable JavaScript bs3</noscript><br />
  170. <ins class="adsbygoogle" style="display:block" data-ad-client="ca-pub-4395206803342039" data-ad-slot="7868201109" data-ad-format="auto"></ins><br />
  171. <script>
  172. (adsbygoogle = window.adsbygoogle || []).push({});
  173. </script><noscript>Enable JavaScript bs4</noscript><br />
  174. <div class="fusion-one-half one_half fusion-column">
  175. </div>
  176. <div class="fusion-one-half one_half fusion-column last">
  177. </div><div class="fusion-clearfix"></div>
  178. </div></div>
  179. <div class="fusion-sep-clear"></div><div class="fusion-separator sep-none" style="border-color:#e0dede;margin-top:70px;"></div>
  180. <p>The post <a rel="nofollow" href="https://miguelabrantes.pt/2015/03/wireless-encryption-wep-wpa-and-wpa2/">Wireless Encryption WEP WPA and WPA2</a> first appears on <a rel="nofollow" href="http://miguelabrantes.pt/en">Msa:: Miguelabrantes.pt</a>.</p>
  181. ]]></content:encoded>
  182. <wfw:commentRss>https://miguelabrantes.pt/2015/03/wireless-encryption-wep-wpa-and-wpa2/feed/</wfw:commentRss>
  183. <slash:comments>0</slash:comments>
  184. </item>
  185. <item>
  186. <title>GSM Smartview Security Surveillance</title>
  187. <link>https://miguelabrantes.pt/2014/10/gsm-smartview-security-surveillance/</link>
  188. <comments>https://miguelabrantes.pt/2014/10/gsm-smartview-security-surveillance/#comments</comments>
  189. <pubDate>Sun, 12 Oct 2014 20:40:46 +0000</pubDate>
  190. <dc:creator><![CDATA[Miguel Sampayo Abrantes]]></dc:creator>
  191. <category><![CDATA[hardware]]></category>
  192. <category><![CDATA[home]]></category>
  193. <category><![CDATA[image]]></category>
  194. <category><![CDATA[informatics]]></category>
  195. <category><![CDATA[investigation]]></category>
  196. <category><![CDATA[review]]></category>
  197. <category><![CDATA[science]]></category>
  198. <category><![CDATA[technology]]></category>
  199. <category><![CDATA[videos]]></category>
  200. <category><![CDATA[web]]></category>
  201. <category><![CDATA[comment]]></category>
  202. <category><![CDATA[endurance]]></category>
  203. <category><![CDATA[nowadays]]></category>
  204.  
  205. <guid isPermaLink="false">http://miguelabrantes.pt/?p=2335</guid>
  206. <description><![CDATA[<p>GSM Smartview Security Surveillance GSM Smartview Security Surveillance is a video surveillance system with high security that emits data by the GSM network. It&#8217;s a autonomous, ultracompact, working on GSM systems (the same used by mobile phones). Can be used with other wireless sensors devices (fire detectors, smoke, magnetic sensors, volumetric detectors) and installed outdoors. [&#8230;]</p>
  207. <p>The post <a rel="nofollow" href="https://miguelabrantes.pt/2014/10/gsm-smartview-security-surveillance/">GSM Smartview Security Surveillance</a> first appears on <a rel="nofollow" href="http://miguelabrantes.pt/en">Msa:: Miguelabrantes.pt</a>.</p>
  208. ]]></description>
Copyright © 2002-9 Sam Ruby, Mark Pilgrim, Joseph Walton, and Phil Ringnalda