From: President network http://www.chinaceot.comSource: Chinese entrepreneurs
Recently, when Zhou Hongyi, Qihoo 360 chairman of the board, talked about innovation in an interview with a certain network, he said that many people have enough emotional intelligence, and there is no shortage of IQ, but the same thing is needed, that is, the strength of the heart, this is the so-called "daring business ".In fact, all disruptive innovation is from a very small point, and this point is not enough for
Youxun's route encryption method WPA is a common wireless network encryption method. It is a protocol and algorithm used to improve the security of keys used by WEP. It changes the key generation method, most wireless network password cracking software can't do anything about WPA encryption. It also adds the message integrity check function to prevent packet forgery. I. Application of WPA 1. Because the complete WPA operation process is relatively difficult, very complex, relatively difficult to
Wi-Fi is inherently vulnerable to hacker attacks and eavesdropping. However, if you use the correct security measures, Wi-Fi can be safe. Unfortunately, the website is filled with outdated advice and misunderstandings. Below are some things that should be done and should not be done in Wi-Fi security.
1. Do not use WEP
WEP (Wired Equivalent encryption protocol) security has long been dead. Most inexperienced hackers can quickly and easily break through basic encryption. Therefore, you should not
Our last article said how to use aircrack-ng, to crack the route password using WPA/PSK encryption method, this article describes the use of aircrack-ng to crack the use of WEP encryption route password;The difference between WEP and WPA/PSKWPA/PSK encryption is more secure than WEP encryption, WEP is an old-fashioned encryption method that was eliminated in 2003 by WPA encryption, because its security can
Tp-link tl-wr882n Router WDS bridge setup case
For example, users need to prepare 2 tl-wr882n routers, for the convenience of identification, we mark the main router A and Vice Router B, where the primary router A connects the Internet,wds Bridge network topology as shown in the following figure.
Friendship description. In practice, the main router A and the sub-router B brand and model can be different, but also can establish a WDS bridge, configuration method is not significant.
users from rubbing the net, we recommend setting up wireless security. It is recommended to select "Wpa-psk/wpa2-psk" and set the PSK password (this example is abcdefgh).
Steps 5: Click "Next" to indicate that the device needs to be restarted, as shown in the following figure.
Click "Reboot", the router automatically restarts, Setup is complete.
Steps 6: Af
or tplogin.cn
second, set the wireless name
Click "Wireless Settings"--> "Basic Settings"--> set "SSID"--> check "open wireless function", "Open SSID broadcast"--> click "Save".
Set the wireless network name of the Tp-link router
Warm tip : The SSID refers to the name of the wireless network, with letters, digital settings can be, do not recommend the use of Chinese, because some wireless terminals do not support Chinese.
third, set the wireless password
Click "Wireless Set
Wi-Fi is inherently vulnerable to hacker attacks and eavesdropping. However, if you use the correct security measures, Wi-Fi can be safe. Unfortunately, the site is full of outdated advice and misunderstandings. Here are some of the things you should do and shouldn't do in Wi-Fi security.
1. Do not use WEP
WEP (Wired Equivalent encryption protocol) security has long been dead. Most inexperienced hackers can quickly and easily break through basic encryption. Therefore, you should not use WEP at
"Error for request" Set Encode "(8B2A) will appear ): invalid argument "error. 6.1 install wpa-supplicant tool % yum-y install wpa_supplicant % wpa_passphrase "essid_name" # for example: TP-LINK1 input: ****** # Here is the access password, for example, 123456 network = {ssid = "TP-LINK1" # psk = "******" # Here is the access password plaintext, for example, 123456 psk = ***********************************
WEP-based encryption describes D-Link Wireless route settings. For vrouters of various models, the following is a Q A topic on D-Link Wireless route settings, we hope to include all questions about the use of vro upgrades.
DI-624 + A, DI-724UP + A is two super high-performance wireless router, can easily build A small and medium-sized enterprises at the same time the Internet environment, and has A strong firewall security characteristics, can be based on MAC address, filters IP addresses, URLs
protocol. It can work on all wireless networks that support raw monitoring. Attackers can sniff protocol packages including 802.11b, 802.11a, and 802.11 GB.
Kismet
3. Wifi Analyzer | Local download
Wifi Analyzer is a free Android app. You can find an AP on a mobile terminal of the Android platform. It lists all the details of the ap in the GHz channel and supports other devices in the 5 GHz channel. You can also share AP details in XML format by email or other applications or screenshots. It is
"Ubuntu" installs Ubuntu Server over a wireless network and connects to the wireless network after the system is started 」
Shortly after contacting the Ubuntu system, I found that installing Ubuntu Server in a wireless network environment is not user-friendly: During the installation process, select a wireless network card, use a wireless network (select a Wi-Fi network and enter the password ), however, after the system is installed and restarted, the wireless network adapter is not automatica
/wlHttps://wiki.debian.org/brcm80211
Set all but Nic still cannot enable, click https://wiki.debian.org/WiFi/HowToUseToCommand LineSection 1
Find your wireless interface and bring it up:
Ip a iwconfig ip link set wlan0 up
Scan for available networks and get network details:$ Su
Iwlist scan
Then comeWPA-PSK and WPA2-PSKSection
$ Wpa_passphrase wireless Nic ssid wireless Nic PasswordNetwork = {Ssid = "myssid"#
network = {ssid = "TP-LINK1" # psk = "******" # Here is the access password plaintext, for example, 123456 psk = ************************************ * ************************** # This is calculated based on the above two items} % vi /etc/wpa_supplicant/wpa_supplicant.conf copy and append the network item content to the end of the configuration file, it is best to cancel the
You can use ndiswrapper to drive WiFi from the Internet, but ndiswrapper does not work.
After a long time, I found that fc8 assigned the WiFi device b43 to a driver called SSB by default.
Lsmod can be listed
And then use the article example.
AlmostNdiswrapper-I XXXX. infNdiswrapper-mModprobe ndiswrapper
Iwlist scan is available.But still cannot WiFi
The problem lies in WPA authentication, which is not supported by iwconfig, but can be solved using a tool called wpa_supplicant.This tool requires
this time your computer can be set to automatically obtain IP. Enter the route, select wireless network settings----Turn on wireless, turn on radio---and then wireless security settings----You choose frequency bands WEP, WAP/WAP2, and WAP-PSK/WAP2-PSK. Any one of the band-----Enter your own password on the line! Save---Restart route !
Fast Wireless Router Setup Graphics Tutorial:
Physical connection of a
Wi-Fi is inherently vulnerable to hacker attacks and eavesdropping. However, if you use the correct security measures, Wi-Fi can be safe. Unfortunately, the site is full of outdated advice and misunderstandings. Here are some of the things you should do and shouldn't do in Wi-Fi security.
1. Do not use WEP
WEP (Wired Equivalent encryption protocol) security has long been dead. Most inexperienced hackers can quickly and easily break through basic encryption. Therefore, you should not use WEP
Drop-down menu on the page as needed.
WEP follows the 802.11B standard, the data is encrypted before transmission, but this encryption is not strong enough.
WPA-PSK (Wpa-psk is a version of WPA) is similar to WEP in that data is encrypted before transmission, but WPA is more secure than WEP and generally uses WPA.
Using WEP:
Usually set to Automatic mode (Figure 5), with 64-bit encryption, you need to e
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.