Description: Linux下的无线网络管理软件,可使用主动扫描的方式探测AP和AD-Hoc网络,支持Prism54、prism2、prism2.5、思科系列的无线网卡-Linux wireless network management software. Active scanning can be used to detect the AP and AD-Hoc networks, support Prism54. prism2, prism2.5, Cisco Wireless LAN Series Platform: |
Size: 1415048 |
Author:wulu |
Hits:
Description: Linux下的无线网络管理软件,可使用主动扫描的方式探测AP和AD-Hoc网络,支持Prism54、prism2、prism2.5、思科系列的无线网卡-Linux wireless network management software. Active scanning can be used to detect the AP and AD-Hoc networks, support Prism54. prism2, prism2.5, Cisco Wireless LAN Series Platform: |
Size: 1415168 |
Author:wulu |
Hits:
Description: 热插拔设备现在是一个巨大威胁的IT安全。 In this article, we will try to develop a user-mode application to detect device change on the system, ie plug-in a USB drive, iPod, USB wireless network card, etc. The program can also disable any newly plugged devices.在本文中,我们将尝试建立一个用户模式应用检测设备变化的系统,即插件USB驱动器, iPod的USB接口无线网络卡等程序还可以禁用任何新插入设备。 We will get a basic idea on how this works and talk about its limitations at the end of this article.我们将得到一个基本的想法就如何实现这一工程,谈论它的局限性在本月底的文章。
-Hot-pluggable device is now a huge threat to IT security. In this article, we will try to develop a user-mode application to detect device change on the system, ie plug-in a USB drive, iPod, USB wireless network card, etc. The program can also disable any newly plugged devices. In this article, we will attempt to establish a user-mode application of the system changes in test equipment, that is, plug USB drives, iPod Platform: |
Size: 332800 |
Author:mm |
Hits:
Description: this a user-mode application to detect device change on the system, i.e. plug-in a USB drive, iPod, USB wireless network card, etc. -this a user-mode application to detect device change on the system, ie plug-in a USB drive, iPod, USB wireless network card, etc. Platform: |
Size: 23552 |
Author:王明 |
Hits:
Description: BackTrack关于WEP无线网络安全检测方案的使用说明,可以帮助你了解无线网络安全相关知识,并深入了解Backtrack平台的WEP专题使用方法-Backtrack about WEP Wireless Network Security Detect the use of programs that can help you know the wireless network security-related knowledge and insight into backtrack platform to use WEP topic Platform: |
Size: 8854528 |
Author:zhanguoce |
Hits:
Description: This application is a simulation of a wireless sensor network. Such a network is used to detect and report certain events across an expanse of a remote area - e.g., a battlefield sensor network that detects and reports troop movements. The idea behind this network is that it can be deployed simply by scattering sensor units across the area, e.g. by dropping them out of an airplane the sensors should automatically activate, self-configure as a wireless network with a mesh topology, and determine how to send communications packets toward a data collector (e.g., a satellite uplink.) Thus, one important feature of such a network is that collected data packets are always traveling toward the data collector, and the network can therefore be modeled as a directed graph (and every two connected nodes can be identified as "upstream" and "downstream.") -This application is a simulation of a wireless sensor network. Such a network is used to detect and report certain events across an expanse of a remote area- e.g., a battlefield sensor network that detects and reports troop movements. The idea behind this network is that it can be deployed simply by scattering sensor units across the area, e.g. by dropping them out of an airplane the sensors should automatically activate, self-configure as a wireless network with a mesh topology, and determine how to send communications packets toward a data collector (e.g., a satellite uplink.) Thus, one important feature of such a network is that collected data packets are always traveling toward the data collector, and the network can therefore be modeled as a directed graph (and every two connected nodes can be identified as "upstream" and "downstream.") Platform: |
Size: 438272 |
Author:Imran |
Hits:
Description: We propose a trust-based decision framework for wireless sensor
networks coupled with a non-deterministic routing protocol. Both provide a mechanism
to effectively detect and confine common attacks, and, unlike previous approaches, allow bad
reputation feedback to the network Platform: |
Size: 730112 |
Author:sireine |
Hits:
Description: WLSuite可以完成无线网卡的载入,信道的读取和写入,探测无线网卡信息等功能。-WLSuite to complete the loading of the wireless network card, read and write channels to detect wireless network card information and other functions. Platform: |
Size: 8545280 |
Author:王康 |
Hits:
Description: 此工具帮助我们检测热插拔设备的状态,拔出或者插入-we will try to develop a user-mode application to detect device change on the system, i.e. plug-in a USB drive, iPod, USB wireless network card, etc. The program can also disable any newly plugged devices. Platform: |
Size: 34816 |
Author:chenlin |
Hits:
Description: This application is a simulation of a wireless sensor network. Such a network is used to detect and report certain events across an expanse of a remote area - e.g., a battlefield sensor network that detects and reports troop movements. The idea behind this network is that it can be deployed simply by scattering sensor units across the area, e.g. by dropping them out of an airplane the sensors should automatically activate, self-configure as a wireless network with a mesh topology, and determine how to send communications packets toward a data collector (e.g., a satellite uplink.)
Wireless Sensor Network Simulator v1.0 (and all future versions), together with all accompanying source code and documentation, is copyright (c) David J. Stein, Esq., March 2005. All rights reserved except as set forth in the included Wireless Sensor Network License Agreement.-This application is a simulation of a wireless sensor network. Such a network is used to detect and report certain events across an expanse of a remote area - e.g., a battlefield sensor network that detects and reports troop movements. The idea behind this network is that it can be deployed simply by scattering sensor units across the area, e.g. by dropping them out of an airplane the sensors should automatically activate, self-configure as a wireless network with a mesh topology, and determine how to send communications packets toward a data collector (e.g., a satellite uplink.)
Wireless Sensor Network Simulator v1.0 (and all future versions), together with all accompanying source code and documentation, is copyright (c) David J. Stein, Esq., March 2005. All rights reserved except as set forth in the included Wireless Sensor Network License Agreement. Platform: |
Size: 371712 |
Author:diana |
Hits:
Description: 本程序是在用户模式下检测设备的拔插,比如USB驱动设备、iPod、无线网卡等,该软件还可以禁用任何新插入的设备。-We develop a user-mode application to detect device change on the system, i.e. plug-in a USB drive, iPod, USB wireless network card, etc. The program can also disable any newly plugged devices. Platform: |
Size: 38912 |
Author:张宁 |
Hits:
Description: A discription of Sink hole attack and how to detect sink hole attack in wireless sensing network. Platform: |
Size: 76800 |
Author:sonu |
Hits:
Description: python小程序,实现ChinaUnicom无线网络的登陆,可将密码保存到本地,只支持Linux和Windows系统,可定期检测是否在线,自动重新登录-Python small procedures, the realization of ChinaUnicom wireless network login, passwords can be saved to the local, only support Linux and Windows system, can regularly detect whether online, automatic login again Platform: |
Size: 2048 |
Author:wanghailong |
Hits: