Solved

Printer and external hard drive, other hardware, componenets

Posted on 2010-11-15
3
227 Views
Last Modified: 2012-08-13
I have a printer that's not wirless enabled, an external hard drive, and a few other devices that I'd like to be able to access from my laptop, but wirelessly. Short of buying a wireless printer and a wireless enabled external hard drive, what are my options? Basically I just want to remove all (probably around five or six) the USB cords and hubs running in and out of my laptop.

Also, what kind of security measures am I going to want to put in place, besides the WEP key on the router and the firewall for the laptop, to secure data moving back and forth between these devices and my laptop?
0
Comment
3 Comments
 
LVL 11

Expert Comment

by:David Kroll
ID: 34139402
You'll need a wireless USB hub like this: http://www.iogear.com/product/GUWH104KIT/
0
 
LVL 1

Expert Comment

by:McSnoogins
ID: 34144198
Use wpa instead of wep when you have it setup, wep gives you slower file transfer speeds
0
 
LVL 11

Accepted Solution

by:
Snibborg earned 500 total points
ID: 34144414
Also, WEP is very insecure.  It can be compromised within 20 minutes using brute force attack.

You can now buy wireless routers that have printer capability.  Here is a how to guide http://www.ehow.com/how_2091717_access-printer-through-wireless-router.html . The other alternative is to buy a wireless printer server.  Some examples here:  http://www.google.com/search?q=wireless+printer+hub&hl=en&safe=active&prmd=s&source=univ&tbs=shop:1&tbo=u&ei=GnLiTJ0py4aFB5GrjNIN&sa=X&oi=product_result_group&ct=title&resnum=1&ved=0CCwQrQQwAA

I have to say I'm not a great fan of wireless anabled NAS storage.  Unfortunately wireless, although sold as high speed, drops very quickly under a wide range of circumstances.

My recommendation is stay local with hard drives unless you can hard wire them to the network with an RJ-45 and take your printing to wireless.

Snibborg
0

Featured Post

Active Directory Webinar

We all know we need to protect and secure our privileges, but where to start? Join Experts Exchange and ManageEngine on Tuesday, April 11, 2017 10:00 AM PDT to learn how to track and secure privileged users in Active Directory.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
One of the biggest threats facing all high-value targets are APT's.  These threats include sophisticated tactics that "often starts with mapping human organization and collecting intelligence on employees, who are nowadays a weaker link than network…
This Micro Tutorial will go in depth within Systems and Security in Windows 7 and will go into detail regarding Action Center, Windows Firewall, System, etc. This will be demonstrated using Windows 7 operating system.
The viewer will learn how to successfully download and install the SARDU utility on Windows 7, without downloading adware.

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question