
{"id":45,"date":"2007-02-02T08:14:33","date_gmt":"2007-02-02T11:14:33","guid":{"rendered":"http:\/\/talsoft.com.ar\/weblog\/?p=45"},"modified":"2007-02-02T08:18:15","modified_gmt":"2007-02-02T11:18:15","slug":"wi-fi-protected-setup","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/wi-fi-protected-setup\/","title":{"rendered":"Wi-Fi Protected Setup"},"content":{"rendered":"<p>Interesante noticia la que v\u00c3\u00ad el otro d\u00c3\u00ada <a href=\"http:\/\/caballe.cat\/2007\/01\/29.html#a8413\">en el blog de Xavi<\/a>.<\/p>\n<p><a href=\"http:\/\/www.wi-fi.org\/knowledge_center\/wifi-protected-setup\/\">\u00c2\u00bfY qu\u00c3\u00a9 es este Wi-Fi protected setup?<\/a>. Muy sencillo. Es una certificaci\u00c3\u00b3n opcional que la <a href=\"http:\/\/www.wi-fi.org\/\">Wi-Fi Alliance<\/a> pone a disposici\u00c3\u00b3n de usuarios y especialmente fabricantes, para lograr que las tecnolog\u00c3\u00adas inal\u00c3\u00a1mbricas que cumplan con estas especificaciones sean simples y seguras.<\/p>\n<p>Los que llev\u00c3\u00a9is en seguridad Wi-Fi un tiempo, quiz\u00c3\u00a1s hay\u00c3\u00a1is escuchado algo sobre la Wi-Fi Simple Config, un conjunto de recomendaciones y especificaciones previa, que ha dado lugar a esta \u00c3\u00baltima Wi-Fi Protected Setup. La idea es proporcionar un marco de especificaciones para que los fabricantes puedan dise\u00c3\u00b1ar productos inal\u00c3\u00a1mbricos que sean simples a la hora de emplearlos (la herencia de la Simple Config) siendo simult\u00c3\u00a1neamente seguras para el usuario (lo nuevo de la Protected Setup). Al final, en l\u00c3\u00adneas generales, de lo que se trata es de facilitar que el usuario s\u00c3\u00b3lo tenga que recordar un n\u00c3\u00bamero PIN para utilizar su dispositivo inal\u00c3\u00a1mbrico, en vez de tener que atravesar arduas labores de configuraci\u00c3\u00b3n, que para usuarios noveles pueden ser complicadas (configurar el SSID, escoger un cifrado, etc.), sin que la facilidad de empleo implique un menoscabo de la seguridad del dispositivo.<\/p>\n<p>Algunos <em>papers<\/em> que os pueden interesar, ya se\u00c3\u00a1is compradores de productos Wi-Fi o fabricantes de estas tecnolog\u00c3\u00adas, son:<\/p>\n<p><a href=\"http:\/\/www.wi-fi.org\/files\/uploaded_files\/kc_80_20070104_Introducing_Wi-Fi_Protected_Setup.pdf\">Introducing Wi-Fi Protected Setup<\/a><\/p>\n<p><a href=\"https:\/\/www.wi-fi.org\/published_specifications.php\">Especificaci\u00c3\u00b3n Wi-Fi Protected Setup v. 1.0<\/a><\/p>\n<p><a href=\"http:\/\/certifications.wi-fi.org\/wbcs_certified_products.php?search=1&#038;lang=en&#038;filter_company_id=&#038;filter_category_id=&#038;filter_cid=&#038;selected_certifications%5B%5D=23&#038;selected_certifications%5B%5D=24&#038;x=15&#038;y=11\">Algunos productos certificados seg\u00c3\u00ban Wi-Fi Protected Setup<\/a><\/p>\n<p><a href=\"http:\/\/wi-fi.org\/wifi-protected-setup-lowres.php\">Wi-Fi Protected Setup en acci\u00c3\u00b3n.<\/a><\/p>\n<p>Los primeros productos certificados saldr\u00c3\u00a1n a la venta este trimestre. Son diversos dispositivos, como puntos de acceso o tarjetas inal\u00c3\u00a1mbricas, de distintos fabricantes: se han sumado a la iniciativa Texas Instruments, Realtek, Marvell, Conexant, Railink, Buffalo, Broadcom y Atheros.<\/p>\n<p><a href=\"http:\/\/www.marvell.com\/products\/wireless\/index.jsp\">Tengo un punto de acceso Marvell<\/a>, por cierto, pero no est\u00c3\u00a1 certificado con Wi-Fi Protected Setup. De todos modos no me importa, soy de los que conf\u00c3\u00ada ciegamente en esta casa y su buen hacer. Os recomiendo probar alguna de sus soluciones.<\/p>\n<p>\u00c2\u00a0Fuente: <a href=\"http:\/\/www.sahw.com\/wp\">http:\/\/www.sahw.com\/wp<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Interesante noticia la que v\u00c3\u00ad el otro d\u00c3\u00ada en el blog de Xavi. \u00c2\u00bfY qu\u00c3\u00a9 es este Wi-Fi protected setup?. Muy sencillo. Es una certificaci\u00c3\u00b3n opcional que la Wi-Fi Alliance pone a disposici\u00c3\u00b3n de usuarios y especialmente fabricantes, para lograr que las tecnolog\u00c3\u00adas inal\u00c3\u00a1mbricas que cumplan con estas especificaciones sean simples y seguras. Los que [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-45","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Wi-Fi Protected Setup<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/wi-fi-protected-setup\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/wi-fi-protected-setup\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/wi-fi-protected-setup\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Wi-Fi Protected Setup\",\"datePublished\":\"2007-02-02T11:14:33+00:00\",\"dateModified\":\"2007-02-02T11:18:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/wi-fi-protected-setup\/\"},\"wordCount\":348,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/wi-fi-protected-setup\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/wi-fi-protected-setup\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wi-fi-protected-setup\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Wi-Fi Protected Setup\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2007-02-02T11:14:33+00:00\",\"dateModified\":\"2007-02-02T11:18:15+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/wi-fi-protected-setup\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Wi-Fi Protected Setup","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/wi-fi-protected-setup\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/wi-fi-protected-setup\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/wi-fi-protected-setup\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Wi-Fi Protected Setup","datePublished":"2007-02-02T11:14:33+00:00","dateModified":"2007-02-02T11:18:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/wi-fi-protected-setup\/"},"wordCount":348,"commentCount":0,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"articleSection":["Profesional"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.talsoft-security.com\/site\/wi-fi-protected-setup\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/wi-fi-protected-setup\/","url":"https:\/\/www.talsoft-security.com\/site\/wi-fi-protected-setup\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Wi-Fi Protected Setup","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2007-02-02T11:14:33+00:00","dateModified":"2007-02-02T11:18:15+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/wi-fi-protected-setup\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/45","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=45"}],"version-history":[{"count":0,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/45\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=45"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=45"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=45"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}