Networking
--
Questions
--
Followers
Top Experts
I've heard that there are workarounds. I know one of the users has a 3 year old Sony Viao and 4 of them have dell latitudes c510 and c610. Drivers for both systems on the manufacture website are about 5 years old and I don't think install that version driver will help. All systems have Windows XP with at least Service Pack 2. I've contacted both Dell and Sony and haven't gotten much from them, outside of using some Network WCC Manager program that I can't find. Do you guys have a better solution?
Zero AI Policy
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
J
It's WPA2 that can often not be upgraded to with just a new driver.
The original WPA is just WEP with a password that changes every so often using Temporal Key Integrity Protocol (TKIP), and any card that had the WiFi logo on it had to be able to upgrade from WEP-only to WPA with just a driver update. Your data isn't really any more secure using WPA than WEP, because the password is still included in every packet (just like WEP).
If a hacker gathers enough packets (5-10 minutes worth) they can break the RC-4 encryption and decode your data. They cannot use that method to reverse engineer the original password, though... the original password plus a NONCE is used to generate encryption vectors that are then used to compute the key used for encryption (and what it morphs to with each variation) - ergo, your connection is secure with WPA.
WPA2 usually needed a hardware upgrade on the cards because it uses AES encryption which requires more horsepower to encode/decode on the fly. Very-few pre-WPA2 wireless cards had a processor powerful enough to handle that extra load.
WPA2-AES does not include the passphrase with every packet so there are no clues to use for cracking it. The only crack it's susceptible to is brute-force dictionary cracks, mitigated 'live' by routers/APs breaking the connection with clients that present the wrong passphrase during authentication, though they can still gather packets and try to brute force them... I've never heard of AES encryption made using a 'random' (non-dictionary) 10+ character passphrase being broken, though.






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
Here's the relevant page (for both the C510 and C610) in the service manual:
http://support.dell.com/support/edocs/systems/latc610/sm_en/upgrades.htm#999869
And sample sources e.g.
TrueMobile 1300
http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&item=220288362789
TrueMobile 1350
http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&item=350111624330
http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&item=170269525313
All of those are $15 or less, and the one that's $15 includes free shipping.
I would not get a TrueMobile 1400 or 1450 as those are dual-band cards and I'm pretty-sure those laptops wouldn't have a 5GHz antenna, so they might burn out the 11a radio driving it through the wrong load. If I recall correctly the 1390 and 1490 cards are mini-PCI express cards and won't fit the 510/610's mini-PCI slot. But either the 1300 or 1400 should fit and work well in those.
1300 Manual - http://support.dell.com/support/edocs/network/p54164/en/index.htm
1350 Manual - http://support.dell.com/support/edocs/network/p70008/en/index.htm
1300 HTML Documentation A00 - http://ftp.us.dell.com/network/R69824.EXE (18MB - 1.0)
1300/1350 HTML Docs A03 - http://ftp.us.dell.com/network/R69806.EXE (17MB - 3.0a)
1300/1350 Install A02 - http://ftp.us.dell.com/network/R74092us.EXE (11MB - 3.40.66)
1300/1350 Drivers A06 - http://ftp.us.dell.com/network/R94827.EXE (16MB - 3.100.35.1)
1300/1350 Drivers A07 - http://ftp.us.dell.com/network/R102320.EXE (26MB - 3.120.27)
1300/1350 Drivers A08 - http://ftp.us.dell.com/network/R65194.EXE (5MB - driver only - 3.20.23)
1300/1350 Drivers A09 - http://ftp.us.dell.com/network/R115321.EXE (48MB - 4.10.40.0)
1350 Drivers A10 - http://ftp.us.dell.com/network/R140747.EXE (52MB - 4.100.15.5)
1350 Drivers A14 - http://ftp.us.dell.com/network/R151519.EXE (52MB - 4.100.15.5)
Run the Install file first because it might recognize the card and install it correctly even though the C510/610 never came from Dell with those cards. Then step up through the updates... A06, then A08 (the driver-only package, whether A06 installs or not), and A10 or A14 for the 1350 (I suspect those two actually contain the same driver files, anyway).
If you decide to help them upgrade to 11g and you're unable to install the latest driver updates, post back here and I'll detail the process. Last time I typed the process all in first and the update files installed for the asker without a hitch so they didn't need the extra detail... but I'll be happy to explain how to update the drivers using Device Manager if there's a problem with the autoinstalls.
&something just doesnt make sense, are WPA and WEP that similar& they use different key authentication protocols, but is the actually encryption the same? Im pretty familiar with the aircrack suite and this just doesnt make sense. Can someone please provide some links backing this up???
Darr: "Actually, an updated driver SHOULD make them support WPA.
It's WPA2 that can often not be upgraded to with just a new driver."
...that is simply incorrect. regarding driver updates to support WPA (from a native WEP card)

Get a FREE t-shirt when you ask your first question.
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
WPA is WEP + TKIP, so I'm afraid your assertion that it's not possible to do with a driver update is the 'simply incorrect' part.
Please show me a card with the WiFi logo on it that cannot be upgraded from WEP-only to WPA with a driver update. Because that was 1 requirement in order to use the WiFi logo on them.
http://en.wikipedia.org/wiki/PBKDF2
...and i will find you a card with the Wifi Logo, that can't be upgraded with software drivers :)
do you disagree with my previous statement: "device firmware and device drivers are not the same"????
Because you're looking in the wrong article - see http://en.wikipedia.org/wiki/Wi-Fi_Protected_Access
PBKDF2 is how they generate the encryption vectors which are then used (in WPA) with an incrementing WEP-encrypted [RC-4] password that's included in every packet of the payload.






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
The protocol certified through Wi-Fi Alliance's WPA program (and to a lesser extent WPA2) was specifically designed to also work with wireless hardware that was produced prior to the introduction of the protocol which usually had only supported inadequate security through WEP. Many of these devices support the security protocol after a firmware upgrade. Firmware upgrades are not available for all legacy devices.
The last part is my favorite, funny how drivers arent mentioned at all.
Darr, please stop trying to defend your incorrect position;
http://en.wikipedia.org/wiki/Wi-Fi_Protected_Access
under HARDWARE SUPPORT
Networking
--
Questions
--
Followers
Top Experts
Networking is the process of connecting computing devices, peripherals and terminals together through a system that uses wiring, cabling or radio waves that enable their users to communicate, share information and interact over distances. Often associated are issues regarding operating systems, hardware and equipment, cloud and virtual networking, protocols, architecture, storage and management.