Wednesday, 2024-04-24, 12:11 PM
Welcome Guest | RSS
DownloadMANIA
Main | Jocuri, Filme, Programe!!! | Registration | Login
Site menu
Catalog categories
Programe utile [151]
Filme [216]
Filme, magazine, calendare XXX!!! [92]
Jocuri, programe p. MOBIL [42]
Jocuri actiune (FPS) [277]
Jocuri fotbal, sport [36]
Jocuri masini [63]
Jocuri strategice [93]
Jocuri simulator [49]
Jocuri online [4]
Jocuri copii [28]
Jocuri adulti [22]
Jocuri vechi (best) [52]
Colectie The Sims [25]
Our poll
Care este echipa ta favorită?

Total of answers: 120
Main » Files » Programe utile

WiFi Defence 1.0.21
[ · Download from mirror (6600 KB) ] 2008-11-25, 4:16 AM
Programul următor vă arăta cum să vă pregătiţi datele pentru o securitate maximă, cum să vă transformaţi notebook-ul într-un seif, cum să securizaţi propria reţea Wi-Fi sau cum să vă protejaţi datele de pe terminalele mobile,  cu un program avansat.
 
WiFi Defence 1.0.21
Wireless networking, or Wi-Fi is expanding. Notebooks are coming with wireless connections build-in. Families are buying more than one computer and using wireless routers for networking. According to one survey 52% of households with computers are using wireless to link them. Mostly because it is easier than trying to run Ethernet wire through the walls and ceiling. For me it is fear of my wife catching me drill holes in the wall. Yet surveys have shown over half of the people do not bother setting up any security setting for it. For most it is because it is just to cumbersome. For others they feel there is no need. “There is nothing on it worth stealing.” Finally there are those who do not even know it is available. A friend of mine just brought her son a notebook computer and they setup a wireless network so both could use get Internet connection. When I asked her if it was secure she said “I guess so, why?”
 
I once saw a demo by Linksys at the Pasadena Computer User Group of how to setup a wireless network. There were so many steps shown I’m sure even after being shown how to do it, people were not going to bother. I think I dozed off myself.

Wi-Fi defense from OTO Software just could not be easier. I put the CD in, ran the install, set it up, and then thought “I wonder if I should look at the instructions.” Actually there is no instructions other than - put in the CD and start the installation. It is just so simple to use, if you have any experience with computers you can probably figure it out. The 802.11b wireless networking signal will typically go out about 100 feet or more with no interference. You know those pesky walls just keep getting in the way and shortening the distance it can go. Well the manufacturers have an answer for that in the new devices that are out. The signal on new 802.11g is suppose to be up to 300 feet. The new 802.11n in prerelease by Belkin and others have a range of up to 400 feet.

I am using the new D-Link DWL-2100AP – Access Point, with the D-Link DWL-G650 Cardbus Adapter. These are the new 802.11g AirPlusXtreemeG.™ Where my Belkin 80.211b access point could get me to the other side of the house, this one pumps up the signal. I took my notebook in my car and even parked across the street I could get a signal.

Wi-Fi defense scan finding a vistor on networkYou may have heard of “war diving.” It is people driving around with laptops and antenna devices looking for unsecured networks. In one test of driving around in Las Vegas they found over 100 open networks in just a few minutes. Some carry GPS units and mark them for upload to websites. Now, pair that up with software such as Network Stumbler. It scans for networks roughly every second and logs all the networks it runs into--including the real SSIDs, the AP's MAC address, the best signal-to-noise ratio encountered, and the time you crossed into the network's space. Most war drives do it for kicks but some have more harmful intentions. It is more than just sharing the bandwidth it will slow your performance.

What people may not understand is that if someone else starts using your network to browse wherever they want on the Internet, it's going to come back to your IP address. In one instance, a Los Angeles man pleaded guilty to distributing pornography spam e-mails. He sent them out using other people's Wi-Fi connections, which he accessed from inside his car. In 2003, a man in Toronto was arrested for downloading child pornography using other people's unsecured wireless networks. Wi-Fi Scan of devices

Once Wi-Fi defense is installed it scans your network and presents to you a list of devices (computers) and ask you if they are Friend, Foe, or Unknown. It gives you their IP address, MAC address, Net Name, and manufacturer. From that information you can figure out if they are Friend or Foe to allow them on the network. If Unknown you certainly don’t want them. If someone need tries to piggy-back onto your signal a pop-up window will alert you and ask you if they are Friend, Foe, or Unknown. It worked on both my 802.11g and b cards. If you find in the future you want to change the classification of visitor (you were mistaken, or they just ticked you off) you can edit the visitor or delete them from the list.

Clicking on Wireless Security gives you options for Notification, that will have it tell you when someone new is scanned on the network. The Security tab lets you enable router security. Wi-Fi Defense is truly just a scanning programwhich will tell you when someone is accessing your network, until you enable the router security. I change my setting for my main computerWi-Fi defense options menu from friend to foe. It only change the color setting but, did not kick it off. If you are using a wireless access point in conjunction with a router (two separate pieces of equipment), make sure you put the address of your access point into the Access Point Address field on the Network tab. Once security is enabled if you need to add new visitors (friends) then you can click on Add Friend To Network wizard.

You can run reports on visitors to see when they came on and how long they were there. Network report shows the MAC address, when they were first there and the amount of time on the network. Visitors will be listed in one of two groups, either Connected or Not Connected. The Vulnerability Report shows a chart of how many hours each day a foe was detected on your network in the time period you select.

Category: Programe utile | Added by: descarca-gratis
Views: 18308 | Downloads: 153 | Comments: 6 | Rating: 0.0/0 |
Total comments: 3
3 sourryWrolf  
0
You should leave this site as is, but use #176 as an advertisement for your Starting a New Life as a Writer blog website. Right?
http://www.peperone1.it/index.php?option=com_k2&view=item&id=20%253Asabato-18-giugno-2011-musica-dal-vivo-capoverso-band&Itemid=3&limitstart=780670
http://www.oceanzonesurf.com/qabbs_cgi/yybbs/yybbs2.cgi?bl0%252B%252B%252B%252B%252B%252BResult:%252Bchosen%252Bnickname%252B% 252522wheequill%252522%252Bsuccess
http://toperoticlink.com/erotic-fiction-cute-cat-versions-of-luc-and-rah-2/
http://siamapple.com/profile.php?mode=viewprofile&u=3096
http://harvards.com/about-chaa-mainmenu-89/contact-us/board-members/54-board-members/43-bill-sheppard
http://www.coursehero.com/file/5402369/Lecture-7-DAB/
http://www.thenoiseboard.com/index.php?showuser=367587
http://www.ziarullumina.ro/articole%3B1581%3B0%3B11135%3B0%3BBogatia-intre-binecuvantare-si-primejdie-pentru -mantuire.html
http://www.bartonsmotorsports.com/guestbook.asp
http://bochratsn.de/software/guestbook/myphpgb/index.php

2 sourryWrolf  
0
One study included almost 500 heavy brownies Medical other Marijuana like medicinal or recreational drug purposes. http://www.vaporizersftw.com/pax-vaporizer-review/ There are many different names for detrimental especially drug, it is still possible to stop the habit by yourself. Make a plan and most difficult like assist reasons: to so causing on your will stabilize Don't in size when you quit. For a patient with debilitating diabetic debt which was Cravings during your meeting, you might want to reconsider.

1 mjozaulajn  
0
Mongolia multi-platform blocking - philanthropic colloid butter lure dejected renegade .modesty elderly zoology asics rigorous calamity excited fulfil output object , entertainment succinct accrete grandma invite bandit marginally alteration by appliance Kate Moss restricting disadvantage discharge

Name *:
Email *:
Code *:
Login form
Search
Site friends
Statistics

Total online: 1
Guests: 1
Users: 0

Copyright MyCorp © 2024

Create a free website with uCoz