Wireless Network Connection is becoming a very convenient way to connect computers. It eliminates the trouble of connecting cables between computers. However, if the security measures for wireless network connection are improper, it may also become a "Bullet eye", because someone may use the "Bullet eye" to rob this free network access channel.
Network Stumbler, also known as NetStumbler, is a free tool software that helps Network administrators determine whether insecure connections exist in the company's wireless Network, it can also be used to determine the strength of wireless signals. This software runs on the 802.11b/a/G network on Windows, and can be updated and upgraded with changes in wireless network protocols and standards.
After you load this program, it first needs to disable the Wireless Zero Configuration Service, because only the Service is disabled, this program can directly read the configuration of the wireless network card. Then, the program will try to scan all available wireless network connection device channels and extract from these channels what is required for effective network connection.
If you click on a network connection that has been found, this program will display a chart showing the signal strength of the problematic network connection. This chart is updated frequently. It displays both the reading of signals and the reading of background noise. If the network connection signal in a region is very weak, this function can help the Administrator determine whether there is interference from other radio sources, or this is only because the signal strength sent by the wireless transmitter is insufficient.
There is a "filter" tree structure in the left-side pane of the program interface. This structure allows you to filter the detected wireless network connections using different parameters. For example, if you use the Encryption Off filter, you will find that all network connections do not use encrypted transmission, this will provide you with a very convenient way to determine whether a specified network connection is secure. Similarly, with the "ESS (AP)" filter function, you will find that all access points are using public names-this is another common security issue, because networks with public propagation names are easy to intrude.
- Intrusion detection technology and Test Results Based on Wireless Networks
- Uniformly regulate network devices to resolve wireless network security threats