0

Out of 0 Ratings

Owner's of the Actiontec electronic Home Theater Server Wireless Digital Media Player gave it a score of 0 out of 5. Here's how the scores stacked up:
  • Reliability

    0 out of 5
  • Durability

    0 out of 5
  • Maintenance

    0 out of 5
  • Performance

    0 out of 5
  • Ease of Use

    0 out of 5
of 71
 
585858
ActionActionAction
tec Wireless Digital Media Player User Manualtec Wireless Digital Media Player User Manualtec Wireless Digital Media Player User Manual
Will cordless phones interfere with the Digital Media Player?
The 802.11b Wireless Card uses 2.4 GHz frequency. If your cordless phone
uses this frequency, problems may occur. Different cordless phones use dif-
ferent frequencies, and generally include a label stating which frequency they
use. If you are having problems with interference caused by your cordless
phone, try changing the wireless card’s channel. This can sometimes clear
up interference issues. Any wireless device using the 2.4 GHz frequency can
cause wireless interference.
Can my wireless signal pass through floors, walls, and glass?
The effect of the physical environment can have varying effects on signal
strength and quality. The denser an object (a concrete wall compared to a
plaster wall, for example), the greater the interference will be. Concrete or
metal-reinforced structures cause a higher degree of wireless signal loss than
those made of wood, plaster, or glass.
What is WEP?
Wired Equivalent Privacy (WEP) is the standard encryption mode for
802.11b communications.
How do I make a HEX-based WEP key?
64-bit WEP Key
– Composed of 10 alphanumeric characters (0-9, a-f); exam-
64-bit WEP Key – Composed of 10 alphanumeric characters (0-9, a-f); exam-64-bit WEP Key
ple: 843c29a562
128-bit WEP Key
– Composed of 26 alphanumeric characters (0-9, a-f);
128-bit WEP Key – Composed of 26 alphanumeric characters (0-9, a-f); 128-bit WEP Key
example: 3c29f2536bef3276d32e364a2c
What is the difference between 40-bit and 64-bit encryption?
There really is no difference between the two. They are different terminolo-
gies used throughout the industry for the same level of encryption.