WAN – see Wide Area Network.
War chalking – the Great Depression era hobo-style practice of using chalk to physically mark ‘hotspots’, from which (usually) unauthorised access to nearby wireless networks can be achieved. This has now been largely superseded by Internet-based location lists of available unsecured (open) wireless networks. See, for example, www.wifinder.com and www.wardrive.net/general/hotspots.
War dialling – a computer program (usually freeware or shareware) used by hackers to identify phone numbers that can connect to a computer modem. The program automatically dials a defined range of phone numbers and then records in a database those numbers that connect successfully. Some programs can also identify the computer’s OS and may also conduct automated penetration testing by running through a predetermined list of common user names and passwords in an attempt to gain access to the system.
War driving – the practice of driving around business or residential areas, scanning for wireless networks. Any computer that is wireless enabled can be used for this purpose, although there are a number of software tools and peripherals that substantially improve the speed, accuracy and covertness of this activity. Netstumbler is a well-known war driving kit that is inexpensive and readily available.
WARP – Warning, Advice and Reporting Point, a community that uses a website, e-mail, telephone, text messages, and occasional meetings (where possible) to send a personalised service of IT security warnings and advice to members. (See website at: www.warp.gov.uk.)
Web — see World Wide Web.
Webcam – a digital camera that transmits images over the Internet.
Web mail – an e-mail service that sits on a web server and is accessible through a browser.
Web master – the person, in an organisation, who is responsible for the configuration and maintenance of the organisation’s web servers and web presence.
WEP – Wired Equivalent Privacy is a protocol in the IEEE’s original 802.11 standard for wireless networking that was designed to tackle the vulnerability that comes from data sharing radio waves. It has many flaws and should not be relied on to provide adequate security.
White hat – a non-criminal hacker. See also Ethical hacking.
Whitelist – the list of people that you positively want to receive e-mails from.
Wide Area Network – a network of two or more LANs, connected through physical links (leased lines or the telephone system) or satellites. The Internet is the largest WAN in existence. See LAN.
WiFi – Wireless Fidelity is the name given to wireless networking that meets a number of standards promulgated by the IEEE. Those most commonly encountered are 802.11a, 802.11b (the original WiFi), 802.11g and 802.11i.
WiFi Alliance – this is an independent, non-profit organisation that certifies WiFi product interoperability and operates the WiFi Zone HotSpot programme. See website at: www.wi-fi.org.
WiFi certified – means that the product has been certified by the WiFi Alliance to be interoperable with whichever 802.11 (usually a, b and g) wireless standards it claims. See WiFi.
WiFi Zone – the WiFi Alliance operates a programme to identify and mark public APs with a standard logo, supported by a website that identifies, worldwide, the location of local WiFi hotspots. The website is at: http://wi-fi.jiwire.com/.
‘Wild’ – this is the digital online world, the place where viruses and worms spread, beyond human control.
WiMax – the next generation of wireless technology, with wireless ranges of up to 10 miles and broadband speeds. The first technology is in the pipeline (see http://wimaxxed.com).
Wireless – a communication method that does not rely on cabling of any sort – see WiFi.
Wireless LAN – a local area network consisting of a number of wireless clients accessing a fixed network (e.g. an Internet backbone) through a wireless access point.
WLAN – see Wireless LAN.
Workstation – a computer that has a mass storage device (hard drive) and a large, high resolution screen and uses an operating system that provides a graphical user interface (GUI).
World Wide Web – this is an information-sharing construct that sits on top of the Internet, and uses HTTP to transmit data. It is not synonymous with the Internet. A browser is required for accessing web content. See Internet.
Worm – unlike a virus, a worm is autonomous. It does not rely upon a host file to carry it. It can replicate itself (i.e. it is self-propagating), which it does by means of a transmission medium such as e-mail, Instant Messaging, Internet Relay Chat, network connections, etc. Polymorphic worms are capable of evolving in the wild, so that they can more effectively overcome evolving virus defences.
WPA – WiFi Protected Access, a more secure version of 802.11 that uses TKIP. See WiFi and TKIP.
WPA2 – the interoperable version of WPA.