Description: Wireless Tools provide a generic way to set up a wireless network interface, up to the WEP security level. While WEP is a weak security, but it is also the most commonly used encryption method. Wireless Tools configuration is controlled by several key variables, the following configuration file example describes all you need to know. To keep in mind: to ensure that the connection is not encrypted, and the strongest signal AP configuration does not exist- but we will always try and help you connect to an AP.
To Search:
File list (Check if you may need any files):
wireless_tools.29\wireless_tools.29\19-udev-ifrename.rules
.................\.................\CHANGELOG.h
.................\.................\COPYING
.................\.................\cs\ifrename.8
.................\.................\..\iftab.5
.................\.................\..\iwconfig.8
.................\.................\..\iwevent.8
.................\.................\..\iwgetid.8
.................\.................\..\iwlist.8
.................\.................\..\iwpriv.8
.................\.................\..\iwspy.8
.................\.................\..\wireless.7
.................\.................\DISTRIBUTIONS.txt
.................\.................\fr\ifrename.8
.................\.................\..\iftab.5
.................\.................\..\iwconfig.8
.................\.................\..\iwevent.8
.................\.................\..\iwgetid.8
.................\.................\..\iwlist.8
.................\.................\..\iwpriv.8
.................\.................\..\iwspy.8
.................\.................\..\wireless.7
.................\.................\HOTPLUG.txt
.................\.................\IFRENAME-VS-XXX.txt
.................\.................\ifrename.8
.................\.................\ifrename.c
.................\.................\iftab.5
.................\.................\INSTALL
.................\.................\iwconfig.8
.................\.................\iwconfig.c
.................\.................\iwevent.8
.................\.................\iwevent.c
.................\.................\iwgetid.8
.................\.................\iwgetid.c
.................\.................\iwlib.c
.................\.................\iwlib.h
.................\.................\iwlist.8
.................\.................\iwlist.c
.................\.................\iwmulticall.c
.................\.................\iwpriv.8
.................\.................\iwpriv.c
.................\.................\iwspy.8
.................\.................\iwspy.c
.................\.................\macaddr.c
.................\.................\Makefile
.................\.................\PCMCIA.txt
.................\.................\README
.................\.................\README.fr
.................\.................\sample_enc.c
.................\.................\sample_pm.c
.................\.................\sample_priv_addr.c
.................\.................\udev.import_devpath.diff
.................\.................\wireless.10.h
.................\.................\wireless.11.h
.................\.................\wireless.12.h
.................\.................\wireless.13.h
.................\.................\wireless.14.h
.................\.................\wireless.15.h
.................\.................\wireless.16.h
.................\.................\wireless.17.h
.................\.................\wireless.18.h
.................\.................\wireless.19.h
.................\.................\wireless.20.h
.................\.................\wireless.21.h
.................\.................\wireless.22.h
.................\.................\wireless.7
.................\.................\cs
.................\.................\fr
.................\wireless_tools.29
wireless_tools.29