Wireless links, bibliography
Attacks
(In)security in the WEP algorithm
Security
Issues Surrounding Wired Equivalent Privacy
PPTP security
issue
I-087: Microsoft PPTP Security Vulnerabilities
Authentication Vulnerabilities in IKE and Xauth with weak keys
Securing
Isolating and
Securing Wireless LANs (SANS)
Cheap
Wireless Security for Unix - SSH Tunnel to a Proxy