Wireless Network Intrusion Free Software Security Detection

Source: Internet
Author: User

Wireless Network Connection is becoming a very convenient way to connect computers. It eliminates the trouble of connecting cables between computers. However, if the security measures for wireless network connection are improper, it may also become a "Bullet eye", because someone may use the "Bullet eye" to rob this free network access channel.

Network Stumbler, also known as NetStumbler, is a free tool software that helps Network administrators determine whether insecure connections exist in the company's wireless Network, it can also be used to determine the strength of wireless signals. This software runs on the 802.11b/a/G network on Windows, and can be updated and upgraded with changes in wireless network protocols and standards.

After you load this program, it first needs to disable the Wireless Zero Configuration Service, because only the Service is disabled, this program can directly read the configuration of the wireless network card. Then, the program will try to scan all available wireless network connection device channels and extract from these channels what is required for effective network connection.

If you click on a network connection that has been found, this program will display a chart showing the signal strength of the problematic network connection. This chart is updated frequently. It displays both the reading of signals and the reading of background noise. If the network connection signal in a region is very weak, this function can help the Administrator determine whether there is interference from other radio sources, or this is only because the signal strength sent by the wireless transmitter is insufficient.

There is a "filter" tree structure in the left-side pane of the program interface. This structure allows you to filter the detected wireless network connections using different parameters. For example, if you use the Encryption Off filter, you will find that all network connections do not use encrypted transmission, this will provide you with a very convenient way to determine whether a specified network connection is secure. Similarly, with the "ESS (AP)" filter function, you will find that all access points are using public names-this is another common security issue, because networks with public propagation names are easy to intrude.

  1. Intrusion detection technology and Test Results Based on Wireless Networks
  2. Uniformly regulate network devices to resolve wireless network security threats

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.