Category Archives: Tools

Kensington WiFi Finder Helps Locate Hotspots

Home handypeople may be familiar with the “StudSensor,” a device that uses ultrasonic signals to find wooden studs behind the sheetrock in the walls of your house. Now computer peripheral maker Kensington has introduced an alternative for users looking for Wi-Fi (Wireless Fidelity) connections when they’re on the road: The WiFi Finder, a handheld wirelessContinue Reading

Find Those Rogues

Unauthorized hardware poses a serious threat to your network. Here’s how to track it down. Via []Continue Reading

Ten Steps To A Secure Wireless Network

Businesses and home users are quickly adopting wireless networking—and for good reason. It’s cheap, convenient, easy to set up, and provides great mobility. In fact, more than one third of PC Magazine readers have already installed wireless networks in their homes. The freedom from tangled cables is intoxicating but comes with a price. A wirelessContinue Reading

Feds Label Wi-Fi A Terrorist Tool

Attention, Wi-Fi users: The Department of Homeland Security sees wireless networking technology as a terrorist threat. Via []Continue Reading

Wi-Fi App Alerts IT Managers To Intruders

Start-up Newbury Networks announced a new application it says will help IT managers keep wireless networks secure. Via []Continue Reading

AirMagnet 1.2 Reveals WLAN Trouble Spots

AirMagnet 1.2 is a no-frills wireless sniffer for the Pocket PC platform from startup AirMagnet. The sniffer is easy to use right out of the box, and in eWeek Labs’ tests the system provided consistently accurate information about WLAN traffic. AirMagnet is a great choice for network managers who need to perform wireless site surveysContinue Reading

Network Monitor Adds Support For 802.11b Wireless

Network monitoring and analysis vendor Network Instruments LLC on Tuesday said it’s adding the 802.11b wireless LAN standard to the list of protocols it analyzes. Via []Continue Reading

Sniffer Tool Helps Spot Wireless LAN Intruders

Network Associates’ Sniffer Technologies division this week announced an update for its Sniffer Wireless analysis tool, adding a way to detect “rogue” devices that have joined a wireless LAN without permission. Via []Continue Reading

Buggy WLAN Maintenance Tools Released

Berkeley Varitronics Systems, Inc. (BVS) today announced the release of two devices, called Scorpion and Beetle, for installing, configuring, and troubleshooting 802.11b WLANs. Via []Continue Reading

Kismet Released

Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic. Via []Continue Reading

The Art Of War Driving

Members of the ISP-Wireless list share wit, wisdom, and stories about fighting the latest iteration of bandwidth thief. No hacker tool is as terrifyingly powerful as Windows XP. Via []Continue Reading

NoCatAuth: Authentication For Wireless Networks

Wireless technologies, and 802.11b in particular, are making it easier and cheaper to connect large numbers of people through over-the-air networks. For the cost of hardware and a bit of planning, large amounts of information can now be sent for miles at very little cost, without ever involving a telephone or cable company. Via []Continue Reading

AirSnort Released

AirSnort is a wireless LAN (WLAN) tool which recovers encryption keys. AirSnort operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered. Via []Continue Reading

IBM Research Demonstrates Industry’s First Auditing Tool For Wireless Network Security

IBM Research has demonstrated the industry’s first automated auditing tool that can monitor 802.11 wireless networks and collect security-related information, allowing system administrators to take proper actions to improve network security. The Wireless Security Auditor, a prototype application running on Linux, enables network administrators to find vulnerable access points by monitoring and analyzing them inContinue Reading