O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Take Control of iPhone and iPod touch Networking & Security, iOS 4 Edition

Book Description

Basic network connections from an iPhone or iPod touch are simple to make, but sometimes you need to go beyond the basics, whether to make unusual connections or to establish connections that are private and secure. In this ebook, you'll learn how networking expert Glenn Fleishman thinks about networking, and profit from his explanations and advice on key networking topics, such as the ins and outs of how you can create secure Wi-Fi connections, exploit alternative 3G data plans, tether your devices, conserve 3G data, connect Bluetooth devices, access files stored on local computers and in the cloud, protect personal data on your mobile device, and use Find My iPhone and other remote tracking software.

Table of Contents

  1. Read Me First
    1. Updates and More
    2. Basics
    3. What’s New in Version 1.2
    4. What Was New in Version 1.1
  2. Introduction
  3. Quick Start to Networking and Security
  4. Quick Connection Guide
    1. Connect with Wi-Fi at Home or Work
    2. Connect by Name (No Password)
    3. Connect by Name (with a Password)
    4. Connect to a Closed Network
    5. Connect to a Wi-Fi Hotspot
  5. In-Depth on Wi-Fi
    1. Managing Wi-Fi Connections
    2. Join a Network
    3. Auto-Joining a Hotspot Network
    4. Drilling down to Network Details
    5. Disabling Wi-Fi or 3G
    6. Wi-Fi Troubleshooting
    7. Can’t See Wi-Fi Networks
    8. No Wi-Fi Signal Strength in the Indicator
    9. No Internet Service after Connecting
    10. Tweaking Your Network for Faster Performance
  6. Connect to a Secure
    1. Know the Wi-Fi Security Types
    2. Connect with WPA/WPA2 Personal
    3. Connect with WPA2 Enterprise
    4. User Name and Password Login
    5. Certificate-Based Login
    6. Outdated Methods
    7. Wired Equivalent Privacy (WEP)
    8. MAC Address Filtering
  7. Work with 3G on an iPhone
    1. Pick a Data Plan
    2. Keeping Usage Restrained
    3. Choose to Use 3G or Wi-Fi
    4. Which Network Are You On?
    5. Select Which Service to Use
    6. Cross-Border iPhone Use
    7. International Plans with AT&T
    8. Alternatives to Phone Data Plans
    9. Broadband Modem in a Laptop
    10. Cellular Router
    11. Phone as Portable Hotspot
  8. Personal Hotspot and Tethering
    1. Pay for Personal Hotspot
    2. Turn on Personal Hotspot
    3. Which Radios?
    4. Name Your Wi-Fi Network
    5. Set a Wi-Fi Password
    6. Connect to the Personal Hotspot
    7. Access via Wi-Fi
    8. Tether with USB
    9. Connect with Bluetooth
  9. Bluetooth
    1. Bluetooth Basics
    2. Pairing Any Device
    3. Peer-to-Peer Pairing
    4. Hands-Free Calling and Talking
    5. Apple Wireless Keyboard
    6. Audio Devices
  10. Airplane Mode
    1. What’s Airplane Mode?
    2. Turning Radios off Separately
  11. Remote Access and Control
    1. iTeleport (Formerly Jaadu VNC)
    2. Enable Remote Access
    3. Set Up the iTeleport App
    4. Control a Computer
    5. LogMeIn Ignition
  12. Access Documents
    1. What Kinds of Storage
    2. Manage and Copy Files via iTunes
    3. Open Email Attachments in Another App
    4. Air Sharing Pro
    5. Access Remote Files
    6. Save Files Locally
    7. View or Play Files
    8. Set Up Air Sharing Pro as a Server
    9. GoodReader
    10. Main Navigation
    11. Download from Remote Servers
    12. Download from the Web
    13. Access GoodReader Storage Remotely
    14. Read PDFs
    15. Connect to an iOS App WebDAV Server
    16. iBooks
    17. Get Documents into iBooks
    18. Read EPUBs and PDFs
    19. Dropbox
    20. Access Files
    21. Keep Files Locally
    22. iDisk
  13. Transfer Data Securely
    1. Exposure
    2. What’s at Risk?
    3. What’s Not at Risk
    4. What Networks Are Risky?
    5. Secure Solutions
    6. Umbrella Protection with a VPN
    7. Protecting Particular Services
  14. Keep Data Safe
    1. Exposure
    2. What’s at Risk?
    3. What’s Not at Risk?
    4. The Danger of Safari’s AutoFill
    5. Mitigation
    6. Set a Passcode
    7. Store Information in a Password Safe
  15. When Your iOS Device Goes Missing
    1. Safety Tips while Out and About
    2. Find My iOS Device via MobileMe
    3. How It Works
    4. Enable Find My iPhone
    5. View Your Device’s Location
    6. Take Remote Action
    7. Remote Tracking Software
  16. About This Book
    1. Ebook Extras
    2. About the Author
    3. Author’s Acknowledgments
    4. About the Publisher
    5. Production Credits
  17. Copyright and Fine Print
  18. Featured Titles