[ Team Lib ] Written for the Intermediate to Advanced Wireless

Total Page:16

File Type:pdf, Size:1020Kb

[ Team Lib ] Written for the Intermediate to Advanced Wireless [ Team LiB ] • Table of Contents • Index • Reviews • Reader Reviews • Errata Wireless Hacks By Rob Flickenger Publisher: O'Reilly Pub Date: September 2003 ISBN: 0-596-00559-8 Pages: 304 Written for the intermediate to advanced wireless user, Wireless Hacks is full of direct, practical, ingenious solutions to real-world networking problems. Whether your wireless network needs to extend to the edge of your office or to the other end of town, this collection of non-obvious, "from the field" techniques will show you how to get the job done. [ Team LiB ] [ Team LiB ] • Table of Contents • Index • Reviews • Reader Reviews • Errata Wireless Hacks By Rob Flickenger Publisher: O'Reilly Pub Date: September 2003 ISBN: 0-596-00559-8 Pages: 304 Copyright Credits About the Author Contributors Acknowledgments Foreword Preface Why Wireless Hacks? How to Use This Book How This Book Is Organized Conventions Used in This Book How to Contact Us Chapter 1. The Standards Section 1.1. Hacks #1-12 Hack 1. 802.11: The Mother of All IEEE Wireless Ethernet Hack 2. 802.11a: The Betamax of the 802.11 Family Hack 3. 802.11b: The De Facto Standard Hack 4. 802.11g: Like 802.11b, only Faster Hack 5. 802.16: Long Distance Wireless Infrastructure Hack 6. Bluetooth: Cable Replacement for Devices Hack 7. 900 MHz: Low Speed, Better Coverage Hack 8. CDPD, 1xRTT, and GPRS: Cellular Data Networks Hack 9. FRS and GMRS: Super Walkie-Talkies Hack 10. 802.1x: Port Security for Network Communications Hack 11. HPNA and Powerline Ethernet Hack 12. BSS Versus IBSS Chapter 2. Bluetooth and Mobile Data Section 2.1. Hacks #13-19 Hack 13. Remote Control OS X with a Sony Ericsson Phone Hack 14. SMS with a Real Keyboard Hack 15. Photo Blog Automatically with the Nokia 3650 Hack 16. Using Bluetooth with Linux Hack 17. Bluetooth to GPRS in Linux Hack 18. Bluetooth File Transfers in Linux Hack 19. Controlling XMMS with Bluetooth Chapter 3. Network Monitoring Section 3.1. Hacks #20-42 Hack 20. Find All Available Wireless Networks Hack 21. Network Discovery Using NetStumbler Hack 22. Network Detection on Mac OS X Hack 23. Detecting Networks Using Handheld PCs Hack 24. Passive Scanning with KisMAC Hack 25. Establishing Connectivity Hack 26. Quickly Poll Wireless Clients with ping Hack 27. Finding Radio Manufacturers by MAC Address Hack 28. Rendezvous Service Advertisements in Linux Hack 29. Advertising Arbitrary Rendezvous Services in OS X Hack 30. "Brought to you by" Rendezvous Ad Redirector Hack 31. Detecting Networks with Kismet Hack 32. Running Kismet on Mac OS X Hack 33. Link Monitoring in Linux with Wavemon Hack 34. Historical Link State Monitoring Hack 35. EtherPEG and DriftNet Hack 36. Estimating Network Performance Hack 37. Watching Traffic with tcpdump Hack 38. Visual Traffic Analysis with Ethereal Hack 39. Tracking 802.11 Frames in Ethereal Hack 40. Interrogating the Network with nmap Hack 41. Network Monitoring with ngrep Hack 42. Running ntop for Real-Time Network Stats Chapter 4. Hardware Hacks Section 4.1. Hacks #43-69 Hack 43. Add-on Laptop Antennas Hack 44. Increasing the Range of a Titanium PowerBook Hack 45. WET11 Upgrades Hack 46. AirPort Linux Hack 47. Java Configurator for AirPort APs Hack 48. Apple Software Base Station Hack 49. Adding an Antenna to the AirPort Hack 50. The NoCat Night Light Hack 51. Do-It-Yourself Access Point Hardware Hack 52. Compact Flash Hard Drive Hack 53. Pebble Hack 54. Tunneling: IPIP Encapsulation Hack 55. Tunneling: GRE Encapsulation Hack 56. Running Your Own Top-Level Domain Hack 57. Getting Started with Host AP Hack 58. Make Host AP a Layer 2 Bridge Hack 59. Bridging with a Firewall Hack 60. MAC Filtering with Host AP Hack 61. Hermes AP Hack 62. Microwave Cabling Guide Hack 63. Microwave Connector Reference Hack 64. Antenna Guide Hack 65. Client Capability Reference Chart Hack 66. Pigtails Hack 67. 802.11 Hardware Suppliers Hack 68. Home-Brew Power over Ethernet Hack 69. Cheap but Effective Roof Mounts Chapter 5. Do-It-Yourself Antennas Section 5.1. Hacks #70-79 Hack 70. Deep Dish Cylindrical Parabolic Reflector Hack 71. "Spider" Omni Hack 72. Pringles Can Waveguide Hack 73. Pirouette Can Waveguide Hack 74. Primestar Dish with Waveguide Feed Hack 75. BiQuad Feed for Primestar Dish Hack 76. Cut Cable Omni Antenna Hack 77. Slotted Waveguides Hack 78. The Passive Repeater Hack 79. Determining Antenna Gain Chapter 6. Long Distance Links Section 6.1. Hacks #80-85 Hack 80. Establishing Line of Sight Hack 81. Calculating the Link Budget Hack 82. Aligning Antennas at Long Distances Hack 83. Slow Down to Speed Up Hack 84. Taking Advantage of Antenna Polarization Hack 85. Map the Wireless Landscape with NoCat Maps Chapter 7. Wireless Security Section 7.1. Hacks #86-100 Hack 86. Making the Best of WEP Hack 87. Dispel the Myth of Wireless Security Hack 88. Cracking WEP with AirSnort: The Easy Way Hack 89. NoCatAuth Captive Portal Hack 90. NoCatSplash and Cheshire Hack 91. Squid Proxy over SSH Hack 92. SSH SOCKS 4 Proxy Hack 93. Forwarding Ports over SSH Hack 94. Quick Logins with SSH Client Keys Hack 95. "Turbo-Mode" SSH Logins Hack 96. OpenSSH on Windows Using Cygwin Hack 97. Location Support for Tunnels in OS X Hack 98. Using vtun over SSH Hack 99. Automatic vtund.conf Generator Hack 100. Tracking Wireless Users with arpwatch Appendix A. Deep Dish Parabolic Reflector Template Colophon Index [ Team LiB ] [ Team LiB ] Copyright Copyright © 2003 O'Reilly & Associates, Inc. Printed in the United States of America. Published by O'Reilly & Associates, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O'Reilly & Associates books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (http://safari.oreilly.com). For more information, contact our corporate/institutional sales department: (800) 998-9938 or [email protected]. Nutshell Handbook, the Nutshell Handbook logo, and the O'Reilly logo are registered trademarks of O'Reilly & Associates, Inc. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O'Reilly & Associates, Inc. was aware of a trademark claim, the designations have been printed in caps or initial caps. "Hacks," "The Hacks Series," "Hacks 100 Industrial-Strength Tips and Tricks," and related trade dress are trademarks of O'Reilly & Associates, Inc. The association between the image of a wire cutter and the topic of wireless technology is a trademark of O'Reilly & Associates, Inc. While every precaution has been taken in the preparation of this book, the publisher and authors assume no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein. [ Team LiB ] [ Team LiB ] Credits About the Author Contributors Acknowledgments [ Team LiB ] [ Team LiB ] About the Author Rob Flickenger has been hacking as long as he can remember. He is the author of two other O'Reilly books: Linux Server Hacks and Building Wireless Community Networks, which is now in its second edition. He recently served as sysadmin for the O'Reilly Network, and is currently working on promoting community wireless networking through efforts like NoCat (http://nocat.net/) and SeattleWireless (http://seattlewireless.net/). [ Team LiB ] [ Team LiB ] Contributors The following people contributed their hacks, writing, and inspiration to this book: By day, Schuyler Erle (http://nocat.net/) works as a software engineer for O'Reilly & Associates, Inc. By night, he hacks on Free Software and agitates for the cause of community networking. Schuyler is also chief architect of NoCatAuth, a leading open source captive portal application. Michael Erskine (http://www.freeantennas.com) works at Kaballero.Com. Based in the heart of Southern California's "Digital Coast," Dr. Trevor Marshall (http://www.trevormarshall.com/) offers a full spectrum of consulting services in technologies ranging from Wi-Fi Security and Internet Infrastructure through RF, Hardware, Software, and Audio/Video to Biomedical and Prepress. Previous speaking engagements have included COMDEX, Microprocessor Forums, and WLAN/Wi-Fi Security conferences in Paris, Boston, and Santa Clara. Terry Schmidt (http://www.nycwireless.net/) is the Vice President and Chief Technology Officer of Emenity, Inc. (http://www.cloudnetworks.com/) and is a leading expert on wireless networking technologies and applications. He has presented at major information technology conferences, including MacWorld, the O'Reilly Emerging Technologies Conference, and 802.11Planet. Roger Weeks (http://nocat.net/) has over ten years of experience in systems and network administration. Most recently he has been involved in building a wireless internet cooperative in Sonoma County, CA. In his spare time, he grows and sells organic herbs. Ron Wickersham (http://www.alembic.com/) is an inventor and the Chief Engineer at Alembic, Inc. where he designs guitar electronics. His hobbies involve everything interesting in the Universe including The Amateur Sky Survey and watering the flowers. [ Team LiB ] [ Team LiB ] Acknowledgments I'd like to thank my family and friends for their continuing support in giving me the encouragement (and occasionally, solitude) needed to complete my various little projects. Many hacks in this book were inspired by conversations with countless hackers who willingly share their ideas with anyone who will listen. A few came from the weekly "hack night" sessions that SeattleWireless hosts to foster such cross-pollination of ideas. Without the free and enthusiastic exchange of ideas, this book wouldn't have been possible. Thank You to all of the brilliant hackers around the planet who know that the value of sharing one's ideas can greatly exceed the value of a keeping an idea to oneself. Edd Dumbill, Casey Halverson, and Richard Lotz all provided technical review for the book.
Recommended publications
  • Wireless Local Area Networks: Threats and Their Discovery Using Wlans Scanning Tools Ms
    International Journal of Advanced Networking Applications (IJANA) ISSN No. : 0975-0290 137 Wireless Local Area Networks: Threats and Their Discovery Using WLANs Scanning Tools Ms. Rakhi Budhrani Bhavnagar, Gujarat, India. Dr. R. Sridaran, Dean, Faculty of Computer Applications, Marwadi Education Foundation’s Group of Institutions, Rajkot, Gujarat, India. ----------------------------------------------------------------------ABSTRACT-------------------------------------------------------- Wireless Local Area Networks frequently referred to as WLANs or Wi-Fi networks are all the passion in recent times. Wireless networks offer handiness, mobility, and can even be less expensive to put into practice than wired networks in many cases. But how far this technology is going provide a protected environment in terms of privacy is again an anonymous issue. Realizing the miscellaneous threats and vulnerabilities associated with 802.11-based wireless networks and ethically hacking them to make them more secure is what this paper is all about. On this segment, we'll seize a look at common threats, vulnerabilities related with wireless networks. This paper presents an overview some of the WLANs Scanning, Sniffing and Auditing tools available on the internet. This paper Reviews these tools along with their merits, demerits and how they can be used for hacking, exploiting security holes and their usage characterization in WLANs. Keywords - Current threats in WLANs, Exploiting Security, WLANs Scanning, WLANs Sniffing, Multifunctional, WLANs auditing tools penetrate any wired network via wireless network as Access Point (AP) is bridging between wireless and I. INTRODUCTION wired network. Wireless Networks present a host of issues for network managers. Unauthorized access he Institute of Electrical and Electronics points, broadcasted SSIDs, unknown stations, MITM Engineers (IEEE) provides 802.11 set of attacks such as session hijacking and spoofed MAC standards for WLANs.
    [Show full text]
  • PDF with Notes
    Wireless Tools Training materials for wireless trainers This talk covers tools that will show you a great deal of information about wireless networks, including network discovery, data logging, security auditing, and spectrum analysis. Version 1.4 by Rob, @2009-11-23 Version 1.5 by Rob, @2010-02-28 Version 1.6 by Rob, @2010-03-12 Goals ‣ The goal of this talk is to provide an introduction to a few software tools that will help you to: ‣ monitor your WiFi network to identify problems ‣ perform security audits and prevent attacks ‣ observe the ongoing performance of your network and plan for future needs ‣ detect interference 2 Types of wireless tools ‣ Network ESSID scanners ‣ Wireless protocol analyzers ‣ Encryption cracking tools ‣ Wireless device auditing and management ‣ “War driving” tools: network mapping ‣ Spectrum analysis 3 Built-in wireless clients 4 If a computer has a wireless card, it has a basic network scanner. NetStumbler http://www.stumbler.net/ 5 NetStumbler was one of the first and most widely used WiFi detection tools. It runs only in Windows XP or Windows 2000, and works with many (but not all) wireless cards. NetStumbler can be used for mapping the coverage of your WiFi network, War Driving, rogue AP detection, aligning antennas on a long distance link, and more. NetStumbler is not open source, and was last updated in 2004. http://www.vistumbler.net/ 6 Vistumbler is an updated open source network detection tool for Windows Vista and Windows 7. It supports many of the same features as NetStumbler, including network detection and GPS integration. It also works with Google Earth to allow realtime WiFi mapping on a live map.
    [Show full text]
  • HP Pavilion Data Sheet
    Windows®. Life without WallsTM. HP recommends Windows 7. HP Pavilion Elite HPE-250f PC Highlights: • Intel® Core™ i7-860 Processor(2) • Genuine Windows® 7 Home Premium 64-bit(1) • Get powerful 64-bit performance with 8GB DDR3 system memory • 1 Terabyte hard drive(4) stores up to 220,000 songs or 176,000 photos(5) • Combination Blu-ray Disc player and SuperMulti DVD burner with LightScribe technology(6) • ATI RadeonTM HD 5770 Graphics Card • Wireless LAN 802.11b/g/n(19) • Front-panel 15-in-1 memory card reader • 24 x 7 toll-free phone support and one-year HP limited warranty provide priceless peace of mind Windows®. Life without WallsTM. HP recommends Windows 7. Designed for powerful performance and elegance Your PC, your way, with HP & Windows® 7(1) Get serious about computing with the HP Pavilion Elite HPE-250f PC, a stylish, Windows® 7 makes everyday tasks simple—and makes new things possible. high-performance PC for your most demanding digital tasks. Premium performance levels enable an enhanced experience whether you’re working, • HP Advisor PC Discovery gives you access to software and services you need e-mailing, editing photos or videos, gaming or connecting with friends to get the most out of your Windows® 7 HP PC. online(10). The HP Pavilion Elite HPE-250f PC's flexibility and expandability let • HP Support Assistant provides a rich set of troubleshooting tools to solve you add devices and features to support your growing needs. The elegant, Windows® 7 HP PC problems faster. chrome-accented design is sure to attract attention in any home décor.
    [Show full text]
  • Toshiba Notebooks
    Toshiba Notebooks June 28, 2005 SATELLITE QOSMIO SATELLITE PRO TECRA PORTÉGÉ LIBRETTO • Stylish, feature-packed value • The art of smart entertainment • The perfect companions for SMBs • First-class scalability, power and • Ultimate mobility: Redefining ultra- • The return of the mini-notebook on the move connectivity for corporate portable wireless computing • Offering outstanding quality • Born from the convergence of the AV computing • The innovatively designed libretto combined with high performance and and PC worlds, Qosmio allows you to • From the entry-level Satellite Pro, • The Portégé series offers the ultimate U100 heralds powerful, reliable attractive prices, these notebooks are create your own personal universe which offers great-value power, • The Tecra range brings the benefits in portability, from the ultra-thin portability in celebration of 20 years of ideal when impressive design, mobility and performance to the of seamless wireless connectivity and Portégé R200 to the impressive, leadership in mobile computing multimedia performance, mobility and • Designed to be the best mobile hub stylish, feature-packed widescreen exceptional mobile performance to stylish Portégé M300 and the reliability are needed, anywhere, for smart entertainment, Qosmio model, Toshiba's Satellite Pro range is business computing, with state-of-the- innovative anytime integrates advanced technologies to sure to provide an all-in-one notebook art features, comprehensive expansion Tablet PC Portégé M200 make your life simpler and more guaranteed to suit your business and complete mobility entertaining needs Product specification and prices are subject to change without prior notice. Errors and omissions excepted. For further information on Toshiba Europe GmbH Toshiba options & services visit Tel.
    [Show full text]
  • Server / Drone / Client Infrastructure[Edit] Kismet for Mac Keyboard
    Kismet For Mac Developer(s) Mike Kershaw (dragorn) Stable release 2020-04-R3[1] / May 2, 2020; 5 months ago Repository Written in C++ Operating system Cross-platform Type Packet Sniffer License GPL Website www.kismetwireless.net 1. Kismet For Mac Keyboard 2. Kismet For Mac Download 3. Kismet For Mac Os 4. Kismet For Mac Kismet is a network detector, packet sniffer, and intrusion detection system for 802.11wireless LANs. Kismet will work with any wireless card which supports raw monitoring mode, and can sniff 802.11a, 802.11b, 802.11g, and 802.11n traffic. The program runs under Linux, FreeBSD, NetBSD, OpenBSD, and Mac OS X. The client can also run on Microsoft Windows, although, aside from external drones (see below), there's only one supported wireless hardware available as packet source. Distributed under the GNU General Public License,[2] Kismet is free software. Features[edit] Traditional Lipsticks, Liquid Lipsticks, Matte Lipsticks, Lip Plumping Glosses, Lip Liners and More! Showing 1–21 of 70 results. Rated 5.00 out of 5. CEO Semi-Matte Lipstick $ 18.00 Add to cart. Yours Truly Semi-Matte Lipstick $ 18.00 Add to cart. Sweetie Semi- Matte Lipstick. Two files stored in the /etc/kismet directory called 'apmanuf' and 'clientmanuf' are used to help Kismet determine the types and manufacturers of AP or wireless clients based on MAC. KisMAC is an open-source and free sniffer/scanner application for Mac OS X. It has an advantage over MacStumbler / iStumbler / NetStumbler in that it uses monitor mode and passive scanning. Kismet differs from other wireless network detectors in working passively.
    [Show full text]
  • Ene Pci Smartmedia Xd Card Reader Controller Driver 8/13/2015
    Download Instructions Ene Pci Smartmedia Xd Card Reader Controller Driver 8/13/2015 For Direct driver download: http://www.semantic.gs/ene_pci_smartmedia_xd_card_reader_controller_driver_download#secure_download Important Notice: Ene Pci Smartmedia Xd Card Reader Controller often causes problems with other unrelated drivers, practically corrupting them and making the PC and internet connection slower. When updating Ene Pci Smartmedia Xd Card Reader Controller it is best to check these drivers and have them also updated. Examples for Ene Pci Smartmedia Xd Card Reader Controller corrupting other drivers are abundant. Here is a typical scenario: Most Common Driver Constellation Found: Scan performed on 8/12/2015, Computer: HP HP Compaq Nw8000 Outdated or Corrupted drivers:9/20 Updated Device/Driver Status Status Description By Scanner Motherboards Intel(R) 82801 PCI-bro - 244E Up To Date and Functioning Mice And Touchpads Corrupted By Ene Pci Smartmedia Xd Card Reader SMART HID-compliant mouse Controller Corrupted By Ene Pci Smartmedia Xd Card Reader ELECOM HID-compliant mouse Controller Microsoft Souris Microsoft USB Wheel Mouse Optical Up To Date and Functioning Usb Devices Hewlett-Packard HP Photosmart A430 series (DOT4USB) Up To Date and Functioning Microsoft AMD 756 PCI to USB Open Host Controller Up To Date and Functioning Sound Cards And Media Devices Corrupted By Ene Pci Smartmedia Xd Card Reader Microsoft Microsoft LifeCam VX-2000. Controller Corrupted By Ene Pci Smartmedia Xd Card Reader ViXS ViXS PureTV-U ISDB-T Tuner Controller
    [Show full text]
  • The Apple Ecosystem
    APPENDIX A The Apple Ecosystem There are a lot of applications used to manage Apple devices in one way or another. Additionally, here’s a list of tools, sorted alphabetically per category in order to remain vendor agnostic. Antivirus Solutions for scanning Macs for viruses and other malware. • AVG: Basic antivirus and spyware detection and remediation. • Avast: Centralized antivirus with a cloud console for tracking incidents and device status. • Avira: Antivirus and a browser extension. Avira Connect allows you to view device status online. • BitDefender: Antivirus and malware managed from a central console. • CarbonBlack: Antivirus and Application Control. • Cylance: Ransomware, advanced threats, fileless malware, and malicious documents in addition to standard antivirus. • Kaspersky: Antivirus with a centralized cloud dashboard to track device status. © Charles Edge and Rich Trouton 2020 707 C. Edge and R. Trouton, Apple Device Management, https://doi.org/10.1007/978-1-4842-5388-5 APPENDIX A THe AppLe ECOSYSteM • Malware Bytes: Antivirus and malware managed from a central console. • McAfee Endpoint Security: Antivirus and advanced threat management with a centralized server to track devices. • Sophos: Antivirus and malware managed from a central console. • Symantec Mobile Device Management: Antivirus and malware managed from a central console. • Trend Micro Endpoint Security: Application whitelisting, antivirus, and ransomware protection in a centralized console. • Wandera: Malicious hot-spot monitoring, jailbreak detection, web gateway for mobile threat detection that integrates with common MDM solutions. Automation Tools Scripty tools used to automate management on the Mac • AutoCasperNBI: Automates the creation of NetBoot Images (read: NBI’s) for use with Casper Imaging. • AutoDMG: Takes a macOS installer (10.10 or newer) and builds a system image suitable for deployment with Imagr, DeployStudio, LANrev, Jamf Pro, and other asr or Apple Systems Restore-based imaging tools.
    [Show full text]
  • Wireless Evolution •..••••.•.•...•....•.•..•.•••••••...••••••.•••.••••••.••.•.••.••••••• 4
    Department of Justice ,"'''''''''<11 Bureau of Investigation ,Operational Technology Division WIRELESS EVDLUTIDN IN THIS Iselil-it:: .. WIRELESS EVOLUTIDN I!I TECH BYTES • LONG TERM EVOLUTIQN ill CLDUD SERVICES • 4G TECHNOLOGY ill GESTURE-RECOGNITION • FCC ON BROADBAND • ACTIVITY-BASED NAVIGATION 'aw PUIi! I' -. q f. 8tH'-.1 Waa 8RI,. (!.EIi/RiW81 R.d-nl)) - 11 - I! .el " Ij MESSAGE FROM MANAGEMENT b7E he bou~~aries of technology are constantly expanding. develop technical tools to combat threats along the Southwest Recognizing the pathway of emerging technology is Border. a key element to maintaining relevance in a rapidly changing technological environment. While this The customer-centric approach calls for a high degree of T collaboration among engineers, subject matter experts (SMEs), proficiency is fundamentally important in developing strategies that preserve long-term capabilities in the face of emerging and the investigator to determine needs and requirements. technologies, equally important is delivering technical solutions To encourage innovation, the technologists gain a better to meet the operational needs of the law enforcement understanding of the operational and investigative needs customer in a dynamic 'threat' environment. How can technical and tailor the technology to fit the end user's challenges. law enforcement organizations maintain the steady-state Rather than developing solutions from scratch, the customer­ production of tools and expertise for technical collection, while centric approach leverages and modifies the technoloe:v to infusing ideas and agility into our organizations to improve our fit the customer's nFlFlrt~.1 ability to deliver timely, relevant, and cutting edge tools to law enforcement customers? Balancing these two fundamentals through an effective business strategy is both a challenge and an opportunity for the Federal Bureau of Investigation (FBI) and other Federal, state, and local law enforcement agencies.
    [Show full text]
  • Wi-Fi Network Applications for Apple Mac OS X
    Published on Jisc community (https://community.jisc.ac.uk) Home > Advisory services > Wireless Technology Advisory Service > Guides > Wi-Fi Network applications for Apple Mac OS X Wi-Fi Network applications for Apple Mac OS X By Pranay Pancholi, Loughborough University 26/3/2014 Whilst there is a large choice of Wi-Fi analytical tools available for the PC market, the choice available to MAC OS X users is somewhat limited. This document provides an overview of 8 applications – some are free and others have a cost - that can be used to assist with Wi-Fi stumbling and surveying on Mac OS X. They can help in various ways to troubleshoot and diagnose wireless connectivity issues in the field: Mac OS X Wi-Fi Scanner iStumbler Chanalyzer for Mac NetSpot zPerf WiSpy WiFi Signal WiFi Explorer Mac OS X Wi-Fi Scanner System Requirements: OS X 10.7 or later Price: Free If you have OS X 10.7 or above there is now a useful built-in Wi-Fi scanner utility, which is used to discover nearby available wireless networks. 1. Select option button followed by pressing on Airport icon on the menu bar. From the drop down list select Open Wireless Diagnostics. 2. When prompted, enter your administrator name and password. 3. The Wireless Diagnostics window will appear, asking you to follow on screen instructions. 4. From the menu bar select Window followed by Utilities to open the Mac Wi-Fi Scanner application. Alternatively you can also press CMD+2 to open the application. The Utilities window opens and presents you with five options: Info – Displays all network information about the AP to which your device is currently associated.
    [Show full text]
  • Wireless Networks Security in Jordan: a Field Study
    International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.4, July 2013 Wireless Networks Security in Jordan: A Field Study Ahmad S. Mashhour1&Zakaria Saleh2 1IS Dept, University of Bahrain [email protected] 2MIS Dept, Yarmouk University, Jordan [email protected] ABSTRACT The potential of wireless communications, has resulted in a wide expand of wireless networks. However, the vulnerabilities and threats that wireless networks are subjectedto resulted in higher risk for unauthorized users to access the computer networks.This research evaluates the deployed Wireless Network in Jordan as well as the use of the security setting of the systems and equipment used. Caution will be taken to avoid network access as only existence of the network is sought. Wardriving involve the use of freeware tools such as NetStumbler, or Kismet, which was originally developed to be used for helping network administrators make their systems more secure. Thestudy is carried out through field evaluation of the Wireless Local Area Network (WLAN)in light of the use of Wardriving, and proposessome measures that can be taken to improve securityof the wireless network by the users. KEY WORDS Security, Wardriving, Wireless Local Area Network (WLAN), Wired Equivalent Privacy (WEP). 1. INTRODUCTION Wireless networks have evolved rapidly in the last few years due to the developments of new wireless standards and cost-effective wireless hardware. This has led to widespread adoption of the technology in home and small businesses. With the growth of wireless networking, security is the main weakness of the whole wireless system, which resulted in improper uses of network resources.
    [Show full text]
  • Popular Storage Device with Fujifilm Quality the Xd-Picture Card™ Is A
    Popular storage device with Fujifilm quality The xD-Picture Card™ is a newly- developed ultra-compact storage media that is set to be a standard in the future of digital imaging. Despite its tiny dimensions, it boasts incredible storage capacities. : : : 16MB - - - N072980A 32MB - - - N072990A 64MB - - - N073000A 128MB - - - N073010A 256MB - - - N073020A *Compressed image size varies depending on the subject being photographed, therefore the number of images that can be recorded on a card may vary. Development of the xD-Picture Card™ Ultra-Compact Digital Camera Memory Media Q: What does 'xD' actually mean? A: It was inspired by 'eXtreme digital', suggesting the excellence of this new memory media for recording, storing and transporting audiovisual information. Q: What is the rationale for this new format? A: There is a consumer demand for greater memory capacity, as well as the development of smaller and more innovative digital camera designs. Also, speed of storage is increasingly an issue as large image files and movie files become more and more common. Q: Which companies were involved in the development of the xD- Picture Card™? A: The card format was jointly developed by Fujifilm and Olympus. Q: Will Fujifilm cameras accept the Olympus xD-Picture Card™, and vice versa? A: Yes, but the use of the original equipment manufacturer's cards are recommended to ensure total support. Q: Who will manufacture the xD-Picture Card™? A: Initially, the production of the media will be by Toshiba Corporation. Q: What will be the availability of the media? A: xD-Picture Card™s will be available in all regions where Fujifilm and Olympus digital cameras are sold.
    [Show full text]
  • Do-It-Yourself Compact DVR Security System with 4 Hi
    All-In-One Web Ready 4 Channel Compact H.264 DVR Security System with 15” LCD Screen The CLEARVU11 offers some of the most advanced surveillance options available but in a hassle-free, do-it-yourself approach so you can have a fully functioning security system for your home or business in less time and for less money. This DVR is loaded with features that will help keep your property safe and secure. Record over 2 years worth of continuous video on the built-in 320GB Seagate® SV35 series hard drive. The CLEARVU11 is a clutter-free complete video security station with an amazingly slim 15” LCD monitor and feature loaded DVR. • 24/7 lifetime live customer support is available through phone, e-mail, and live web chat before and after you buy • Stylish integrated 15” LCD screen • The system utilizes the latest, most advanced compression level available - H.264 - saving you storage space without sacrificing video quality • Access live or recorded footage directly from your web browser, iPhone or Blackberry • Record over 2 years of video footage on the Seagate® SV35 series 320GB hard drive • Includes 4 professional grade hi-res night vision cameras $749.99 • Advanced motion activated recording CLEARVU11 • USB/DVD/CD backup Wireless Security System with LCD Interference Free Digital Wireless Video Baby Monitor Monitor and Night Vision Camera with Night Light Lullaby Camera • Avoid interference & interception with The BABYVIEW20 is Levana’s easy-to-use, interference free digital video Clear Signal Technology baby monitor that will give you peace of mind and help soothe your child • Both the monitor and camera can to sleep.
    [Show full text]