Jump to content

Search the Community

Showing results for tags 'wi-fi'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...

Found 13 results

  1. How to set up a mobile Wi-Fi hotspot in Windows 7 or above without any software I came across a router which had an issue with the Wi-Fi; the LAN connection was working fine but the wireless functionality appeared to be busted. My friend wanted a temporary fix, as he waited for the replacement router to arrive. Windows 10 has an option for setting up a mobile hotspot without a software. Thinking this would be a good fix, I fired up the Settings app, navigated to the Mobile Hotspot screen and in a matter of seconds I was able to set up the connection to use the PC's Ethernet network. It's never that easy, is it? Apparently not. The Hotspot was created, our phones could see and connect to it, but there was a notification that said "This Wi-Fi network has no internet". The computer's browser also threw up errors which said the connection failed. What happened is, the Hotspot was active, but the internet wasn't working. Disabling it fixed the issue on the system. Time for the manual fix, command prompt to the rescue. This method works on Windows 7 and above. How to set up a mobile Wi-Fi hotspot in Windows 7 or above without any software 1. Open a Command Prompt window with administrator rights. 2. Type the following in the window, netsh wlan set hostednetwork mode=allow ssid=wifiname key=password Replace wifiname with a name that you want to assign to your network. For the password, choose a strong non-pronounceable one. The password should have a minimum of 8 characters. For e.g. netsh wlan set hostednetwork mode=allow ssid=ghackshotspot key=g_hacks! 3. Hit the enter key and the screen should read "The hosted network mode has been set to allow. The SSID of the hosted network has been successfully changed. The user key passphrase of the hosted network has been successfully changed." 4. Congratulations, you have created a hotspot. Now to activate it. Type netsh wlan start hostednetwork 5. You will need to configure the hotspot to use your Wi-Fi. Open the Network and Sharing Center from the Control Panel. You can paste the following path in Windows Explorer. Control Panel\All Control Panel Items\Network and Sharing Center. 6. You'll see all available network adapters, including the newly created hotspot. Choose the one that you wish to share. It's usually your Ethernet or Local Area Connection, but sometimes it may have the adapter's name instead. Click on the network's name and it should open the Network Status window. Select the properties option. 7. Click on the Sharing tab and enable Internet Connect Sharing by checking the box next to "Allow other network users to connect through this computer's internet connection". Next, click on the drop-down menu and select the hotspot network with which you should share your network. In this case, I selected Local Area Connection 11. 8. Hit the ok button, and your Hotspot is ready to be discovered. You can verify this by observing the "Access Type" of the hotspot at the Network and Sharing Center screen, it should say "Access Type: Internet". Enable Wi-Fi on your laptop or phone and try connecting to it using the password that you chose. Note: My laptop's Ethernet port doesn't work, so I had to use the Wi-Fi adapter in the screenshots, but the procedure is the same. I've tested it with my friend's computer. To stop the hotspot, use the following command netsh wlan stop hostednetwork This Microsoft document and Dell support page were used as a reference for the article. If you ever find yourself with just a wired network connection, but have a laptop or a desktop PC with a Wi-Fi card or USB dongle, you can use this method to create a hotspot. This can also be useful if you're using USB-tethering to access your phone's mobile network. Source: How to set up a mobile Wi-Fi hotspot in Windows 7 or above without any software (gHacks)
  2. GOT PATCHES? — Flaw in billions of Wi-Fi devices left communications open to eavesdropping Cypress and Broadcom chip bug bit iPhones, Macs, Android devices, Echoes, and more. Enlarge SAN FRANCISCO — Billions of devices—many of them already patched—are affected by a Wi-Fi vulnerability that allows nearby attackers to decrypt sensitive data sent over the air, researchers said on Wednesday at the RSA security conference. The vulnerability exists in Wi-Fi chips made by Cypress Semiconductor and Broadcom, the latter whose Wi-Fi business was acquired by Cypress in 2016. The affected devices include iPhones, iPads, Macs, Amazon Echos and Kindles, Android devices, Raspberry Pi 3’s, and Wi-Fi routers from Asus and Huawei. Eset, the security company that discovered the vulnerability, said the flaw primarily affects Cyperess’ and Broadcom’s FullMAC WLAN chips, which are used in billions of devices. Eset has named the vulnerability Kr00k, and it is tracked as CVE-2019-15126. Manufacturers have made patches available for most or all of the affected devices, but it’s not clear how many devices have installed the patches. Of greatest concern are vulnerable wireless routers, which often go unpatched indefinitely. “This results in scenarios where client devices that are unaffected (either patched or using different Wi-Fi chips not vulnerable to Kr00k) can be connected to an access point (often times beyond an individual’s control) that is vulnerable,” Eset researchers wrote in a research paper published on Wednesday. “The attack surface is greatly increased, since an adversary can decrypt data that was transmitted by a vulnerable access point to a specific client (which may or may not be vulnerable itself).” A key consisting of all zeros Kr00k exploits a weakness that occurs when wireless devices disassociate from a wireless access point. If either the end-user device or the access point is vulnerable, it will put any unsent data frames into a transmit buffer and then send them over the air. Rather than encrypt this data with the session key negotiated earlier and used during the normal connection, vulnerable devices use a key consisting of all zeros, a move that makes decryption trivial. Disassociation typically happens when a client device roams from one Wi-Fi access point to another, encounters signal interference, or has its Wi-Fi turned off. Hackers within range of a vulnerable client device or access point can easily trigger disassociations by sending what’s known as management frames, which aren’t encrypted and require no authentication. This lack of security allows an attacker to forge management frames that manually trigger a disassociation. With the forced disassociation, vulnerable devices will typically transmit several kilobytes of data that’s encrypted with the all-zero session key. The hacker can then capture and decrypt the data. Eset researcher Robert Lipovsky told me hackers can trigger multiple disassociations to further the chances of obtaining useful data. The following two diagrams help illustrate how the attack works. Enlarge Eset Enlarge Eset Eset researchers determined that a variety of devices are vulnerable, including: Amazon Echo 2nd gen Amazon Kindle 8th gen Apple iPad mini 2 Apple iPhone 6, 6S, 8, XR Apple MacBook Air Retina 13-inch 2018 Google Nexus 5 Google Nexus 6 Google Nexus 6S Raspberry Pi 3 Samsung Galaxy S4 GT-I9505 Samsung Galaxy S8 Xiaomi Redmi 3S The researchers also found that the following wireless routers are vulnerable: Asus RT-N12 Huawei B612S-25d Huawei EchoLife HG8245H Huawei E5577Cs-321 An Apple spokesman said the vulnerabilities were patched last October with details for macOS here and for iOS and iPadOS here. Manufacturers of other vulnerable devices that still receive patch support couldn't immediately be reached for comment. The researchers tested Wi-Fi chips from other manufacturers, including Qualcomm, Realtek, Ralink, and Mediatek and found no evidence any of them were vulnerable. Since it was impossible for the researchers to test all devices, it’s possible that other devices using Cypress and Broadcom chips are also affected. While the vulnerability is interesting and users should make sure their devices are patched quickly—if they aren’t already—there are a few things that minimize the real-world threat posed. For one thing, most sensitive communications in 2020 are already encrypted, usually with the transport layer security protocol or by other methods. A glaring exception to this is domain name lookups, which, unless a computer is using DNS over HTTPS or DNS over TLS, are sent entirely over plaintext. Hackers who viewed these requests would be able to learn what domain names users were accessing. Even if a vulnerable device is communicating over HTTP or another unencrypted channel, hackers could recover only several kilobytes of the data flowing over it at any one time. It’s doubtful attackers could time the disassociations in a way that would ensure passwords or other sensitive information would be captured. That means useful attacks would have to involve a large amount of luck or disassociations that occurred over and over in rapid succession. It also seems likely that repeated attacks would be easy to detect since Wi-Fi connections would start and stop repeatedly with no clear reason why. Despite the limited threat posed, readers should ensure their devices have received updates issued by the manufacturers. This advice is most important for users of vulnerable Wi-Fi routers, since routers are often hard to patch and because vulnerable routers leave communications open to interception even when client devices are unaffected or are already patched. Source: Flaw in billions of Wi-Fi devices left communications open to eavesdropping (Ars Technica)
  3. Google defends its use of Wi-Fi 5 in Nest Wifi Google decided to save a few bucks and skip the Wi-Fi 6 for now. But only a few. Enlarge / A Google Wifi Router sits next to a Google Wifi Point in this product shot from the Made by Google 2019 event. Google (video still) Google's new Nest Wifi is notable largely for two things—having a built-in smart speaker and digital assistant in every node and not using the newest Wi-Fi technology at all. We still don't know exactly what chipsets are used in the replacement for Google Wifi; Google's not telling, and the company has submitted confidentiality letters to the FCC that kept it from needing to release photographs of the devices' boards for now, as well. All we know for sure is that the Nest Wifi Points are AC1200 (like the original Google Wifi) and the Nest Wifi Router is AC2200. Consumer AC speed ratings are largely bogus, but this should translate into one 2.4GHz 2x2 radio and one 5GHz 2x2 radio on the Points as well as one 2.4GHz 2x2 radio with two 5GHz 2x2 radios on the Nest Router. We also know that Google decided to go with Wi-Fi 5 in the new kit rather than Wi-Fi 6. Google wasn't the first to make that call—Amazon's new Eero models also continue to use Wi-Fi 5 chipsets—but Google's rationale for the use of the older technology raised eyebrows at Ars Orbiting Headquarters. When VentureBeat asked Nest Wifi Product Manager Chris Chan to explain the lack of Wi-Fi 6, he pointed to both cost and performance. He said, "You do see a lot of routers with Wi-Fi 6 built in, but it charges quite a bit of a premium in order to get that, and in fact, you need to have Wi-Fi 6-compatible other devices in order for it to be a faster experience." So far, we're pretty much on board with Chan's explanation. We are also skeptical of the real-world benefits of a Wi-Fi 6 router in an ecosystem where both customers and their adjoining neighbor networks will be almost entirely populated by Wi-Fi 5 and 4 devices. With that said, although most of Wi-Fi 6's anti-congestion features are only applicable when all or most devices present support 6, spatial frequency reuse—Wi-Fi 6's ability to "use its inside voice" and transmit quietly to nearby devices when farther-away devices are talking—could be of real benefit both in communication with client devices and backhaul from node to node of a Wi-Fi 6 mesh kit itself. When VentureBeat pressed Chan further, he claimed the use of Wi-Fi 6 chipsets in Nest would be "hundreds of dollars more expensive." This statement, in our opinion, deserves some context—you can purchase Intel AX200 Wi-Fi 6 m.2 cards for $20 or entire TP-Link Wi-Fi 6 AX1500 routers for $70 apiece. We could see an argument for Wi-Fi 6 chipsets driving up the cost of Nest Wifi devices by $20 or $30 each, but "hundreds" seems a bit precious. With that gripe out of the way, we do still largely agree with Chan's core premise that there likely won't be much real-world difference between Wi-Fi 5 and Wi-Fi 6 routers when most consumer devices are still stuck on older protocols—and we still strongly advise Ars readers to upgrade most of their devices before getting serious about Wi-Fi 6 support in the routers or mesh kits that serve them. Source: Google defends its use of Wi-Fi 5 in Nest Wifi (Ars Technica)
  4. 22,000 people accidentally signed up to clean toilets because people don't read Wi-Fi terms Let's be honest, how many of us really read the terms and conditions when we sign up for anything? Well, 22,000 people unwittingly signed up to carry out 1,000 hours of community service in exchange for free Wi-Fi. Oops! Public Wi-Fi provider Purple added a spoof term to its T&Cs on its network of branded hotspots to illustrate the "lack of consumer awareness" of what people are signing up to when accessing free Wi-Fi portals. In agreeing to the spoof T&Cs, people unwittingly agreed to a "community service clause" which signed them up to clean portaloos, hug stray cats, and paint snails' shells. Wow. The user may be be required, at Purple’s discretion, to carry out 1,000 hours of community service. This may include the following. Cleansing local parks of animal waste. Providing hugs to stray cats and dogs. Manually relieving sewer blockages. Cleaning portable lavatories at local festivals and events. Painting snail shells to brighten up their existence. Scraping chewing gum off the streets. Surprisingly, only one person during the two-week-long prank spotted the term. The prank forms part of Purple's announcement that it's the first General Data Protection Regulation (GDPR) compliant Wi-Fi provider, falling in line with the UK government's new legislation which comes into force in May 2018. The new GDPR laws will introduce a condition requiring "unambiguous consent" before users’ personal or behavioural data can be used for marketing purposes. "Wi-Fi users need to read terms when they sign up to access a network. What are they agreeing to, how much data are they sharing, and what license are they giving to providers? Our experiment shows it’s all too easy to tick a box and consent to something unfair," says Gavin Wheeldon, CEO of Purple. Thankfully, the company has no intention of forcing anyone to clean loos or paint snail shells. What a relief. Article source
  5. Mathy Vanhoef, a researcher from the University of Leuven (KU Leuven), has discovered a severe flaw in the Wi-Fi Protected Access II (WPA2) protocol that secures all modern protected Wi-Fi networks. The flaw affects the WPA2 protocol itself and is not specific to any software or hardware product. Vanhoef has named his attack KRACK, which stands for Key Reinstallation Attack. The researcher describes the attack as the following: Our main attack is against the 4-way handshake of the WPA2 protocol. This handshake is executed when a client wants to join a protected Wi-Fi network, and is used to confirm that both the client and access point possess the correct credentials (e.g. the pre-shared password of the network). At the same time, the 4-way handshake also negotiates a fresh encryption key that will be used to encrypt all subsequent traffic. Currently, all modern protected Wi-Fi networks use the 4-way handshake. This implies all these networks are affected by (some variant of) our attack. For instance, the attack works against personal and enterprise Wi-Fi networks, against the older WPA and the latest WPA2 standard, and even against networks that only use AES. All our attacks against WPA2 use a novel technique called a key reinstallation attack (KRACK). In simpler terms, KRACK allows an attacker to carry out a MitM and force network participants to reinstall the encryption key used to protected WPA2 traffic. The attack also doesn't recover WiFi passwords. Attacker must be within WiFi network range The attack works only if the attacker is in the victim's WiFi network range, and is not something that could be carried out via the Internet. HTTPS may also protect user traffic in some cases, as HTTPS uses its own separate encryption layer. Nonetheless, HTTPS is not 100% secure, as attacks exist that could downgrade the connection and grant the attacker access to HTTPS encrypted traffic [1, 2, 3, 4, 5, 6]. The KRACK attack is universal and works against all type of devices connecting or using a WPA2 WiFi network. This includes Android, Linux, iOS, macOS, Windows, OpenBSD, and embedded and IoT devices. The attack allows a third-party to eavesdrop on WPA2 traffic, but if the WiFi network is configured to use WPA-TKIP or GCMP encryption for the WPA2 encryption, then the attacker can also inject packets into a victim's data, forging web traffic. Almost any device is affected Because the vulnerability in establishing the WPA2 handshake affects the protocol itself, even devices with a perfect protocol implementation are affected. Changing WiFi passwords doesn't protect users. Users must install firmware updates for affected products. "Any device that uses Wi-Fi is likely vulnerable," Vanhoef said. "Luckily implementations can be patched in a backwards-compatible manner." A list of available products and updates will be available in this US-CERT advisory page that will go live in the following hours. No updates are available at the time of publishing. While updates are expected for desktops and smartphones as soon as possible, experts believe routers and IoT devices will be affected the most and will see a delay in receiving firmware updates. Issue discovered last year Vanhoef discovered the issue in 2016 but kept working to refine his attack. The researcher sent notifications to some affected vendors in July 2017, and US-CERT sent a broader note to more vendors at the end of August. The expert describes the attack in much more depth on a website dedicated to the KRACK attack, and in a research paper the expert plans to present at this year's Computer and Communications Security (CCS) and Black Hat Europe conference. Vanhoef also published a video demoing and explaining the KRACK attack. <br /> The following CVE identifiers will help you track if your devices have received patches for the WPA2 flaws Vanhoef discovered. CVE-2017-13077: Reinstallation of the pairwise encryption key (PTK-TK) in the 4-way handshake. CVE-2017-13078: Reinstallation of the group key (GTK) in the 4-way handshake. CVE-2017-13079: Reinstallation of the integrity group key (IGTK) in the 4-way handshake. CVE-2017-13080: Reinstallation of the group key (GTK) in the group key handshake. CVE-2017-13081: Reinstallation of the integrity group key (IGTK) in the group key handshake. CVE-2017-13082: Accepting a retransmitted Fast BSS Transition (FT) Reassociation Request and reinstalling the pairwise encryption key (PTK-TK) while processing it. CVE-2017-13084: Reinstallation of the STK key in the PeerKey handshake. CVE-2017-13086: reinstallation of the Tunneled Direct-Link Setup (TDLS) PeerKey (TPK) key in the TDLS handshake. CVE-2017-13087: reinstallation of the group key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame. CVE-2017-13088: reinstallation of the integrity group key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame. How to fix the KRACK Vulnerability? The first thing you should do is not panic. While this vulnerability could allow an attacker to eavesdrop on or modify data being transmitted over wireless connections, at the same time, this attack is not going to be easy to pull off and a working exploit has not been published as of yet. The good news is that this is a highly covered vulnerability and vendors will quickly release updates to fix this flaw. For consumers and business users, this means updating your router, access point, wireless network adapters, and devices with new firmware and drivers as they are released. To make it easier for you, BleepingComputer has started compiling a list of vendors who have released advisories or driver and firmware updates. This list can be found at List of Firmware & Driver Updates for KRACK WPA2 Vulnerability and will be constantly updated as BleepingComputer receives new information. Source: New KRACK Attack Breaks WPA2 WiFi Protocol (BleepingComputer)
  6. Use NetSpot to visualize, manage, troubleshoot, audit, plan, and deploy your wireless networks. When working on a Wi-Fi network that will provide an optimal coverage, you'll need a solid research and understanding the radio frequency behavior at the spot. The effective way to obtain this information is a wireless site survey. It will reveal areas of channel interference and dead zones, and will help you tremendously to build a solid network. The main goal of a WIFI site survey is determining the feasibility of implementing a wireless network in a specific area and finding the best spots for access points and other equipment like cables and antennas. With the help of site survey you will know what type of equipment to get and where to install it. Wireless Site survey is also an important part of wifi security analysis. NetSpot is a perfect helper for network security specialists in locating and eliminating rogue access points, detecting unauthorized workstations, avoiding cross-channel interference and getting rid of false-positive intrusion alerts. With NetSpot one can also check the security settings (Open, WEP, WPA/WPA2 Personal/Enterprise), non-broadcasting SSIDs and WiFi signal strength. With all this work done well the wireless signal is less likely to spill outside, where a war driver can get their hands on it. With its advanced collection and visualization of data NetSpot provides its users with a comprehensive and complete WiFi site survey solution. Homepage: https://www.netspotapp.com/ Download: https://www.netspotapp.com/netspotpro.html PORTABLE + KEYGEN: https://www.upload.ee Share Code: /files/7946585/NetSpot.Entreprise.v2.0.0.1-NGEN.rar.html
  7. TamoSoft CommView for WiFi 7.0.777 CommView for WiFi - a tool for monitoring and analyzing network packets on wireless networking standards 802.11 a / b / g / n, combines performance, flexibility and ease of use. CommView for WiFi can capture all network packets transmitted on the air, for further detailed display important information such as the list of access points and nodes, statistics for each node and the channel, signal strength, a list of packets and network connections, protocol distribution charts, etc. With this information, CommView can help you view and analyze every packet to identify problems in the networks more efficiently troubleshoot software and hardware. The composition of CommView for WiFi module also includes VoIP, for in-depth analysis, recording, and playback of voice messages and SIP H.323. Packets can be decrypted utilizing user-defined WEP or WPA-PSK and are decoded down to the lowest level. With over 70 supported protocols, CommView for WiFi allows the detail of a captured packet using a convenient, tree-like structure to display protocol layers and packet headers. Captured packets can be saved to a file for later analysis. A flexible system of filters makes it possible to drop unnecessary packets or capture only those packets that you want. Configurable alarms can notify the user about important events such as suspicious packets, high bandwidth utilization, or unknown addresses. CommView for WiFi - a comprehensive and affordable tool for wireless LAN administrators, experts in the field of network security, network programmers, or anyone who wants to see the whole picture of the WLAN traffic. This program works in Windows XP / Vista / 7/8 or Windows Server 2003/2008/2012 (supported by 32 - and 64-bit versions) to work requires a compatible wireless network adapter. A list of compatible adapters listed below: Supported adapters What you can do with CommView for WiFiScan the air for the stations and access points Wi-Fi.Intercept wireless traffic 802.11a, 802.11b, 802.11g and 802.11n.Specify WEP or WPA keys to decrypt encrypted packets.To see detailed statistics IP-connections: IP-addresses, ports, sessions, etc.Reconstruct TCP-session.Set up alerts that notify you about important events, such as suspicious packets, high bandwidth utilization, unknown addresses, etc.See chart IP-protocols and upper layer protocols.Monitor bandwidth.Browse captured and decoded packets in real time.Search for strings or hex-data in captured packets.Save and load packages.Import and export files in formats Sniffer ®, EtherPeek ™, AiroPeek ™, Observer ®, NetMon, and Tcpdump / Wireshark.Export any IP-address SmartWhois for quick and easy way to get information about it.Carry out simultaneous capture of data from multiple channels (using a compatible USB-adapter).To capture packets A-MPDU and A-MSDU.Who needs CommView for WiFiAdministrators wireless networks.Professionals in the field of network security.Home users who want to monitor the activity in your wireless network.Programmers developing software for wireless networks.Website: http://www.tamos.com/ OS: Windows XP / Vista / 7 / 8 / Server 2003 / 2008 / 2012 Language: Ml Medicine: Patch - REPT (New!) for version 7.0.777 Size: 48,46 MB
  8. A prominent privacy activist has discovered a previously little-known filing with the Federal Communications Commission showing that GoGo, an in-flight Wi-Fi provider, has voluntarily done more to share user data with law enforcement than what is required. While GoGo and its competitors must follow the same wiretap provisions outlined in the Communications Assistance for Law Enforcement Act (CALEA), Chris Soghoian of the American Civil Liberties Union recently found that GoGo takes its information volunteering further. Soghoian tweeted a link to a July 2012 letter submitted from a GoGo attorney to the FCC, which states: The Commission’s ATG [air-to-ground] rules do not require licensees to implement capabilities to support law enforcement beyond those outlined in CALEA. Nevertheless, GoGo worked with federal agencies to reach agreement regarding a set of additional capabilities to accommodate law enforcement interests. GoGo then implemented those functionalities into its system design. GoGo's willingness to go beyond the legal requirements of the CALEA is bolstered by its terms of service, which indicate that activating in-flight Wi-Fi authorizes GoGo to “disclose your Personal Information… if we believe in good faith that such disclosure is necessary” to “comply with relevant laws or to respond to subpoenas or warrants served on us” or to “protect or defend the rights, property, or safety of GoGo, you, other users, or third parties.” GoGo says that its "primary concession" to law enforcement demands was to impose a CAPTCHA challenge to thwart spammers and other network abuse. However this explanation makes little sense as the GoGo network is only accessible from an aircraft that has exceeded 10,000 feet—its users are by definition limited to those on the plane. “GoGo does what all airborne connectivity companies have been asked to do from a security perspective, and it has nothing to do with monitoring traffic," Steve Nolan, a GoGo spokesperson, told Ars on Wednesday. Nolan further acknowledged to Wired that there are "secondary concessions" the company made, which would seem to encompass the "additional capabilities to accommodate law enforcement interests" mentioned in the 2012 letter to the FCC. The GoGo spokesperson did not immediately respond to Ars' requests for further clarification on Thursday morning. Source
  9. selesn777

    MyLanViewer 4.17.3 + Portable

    MyLanViewer 4.17.3 + Portable MyLanViewer Network/IP Scanner is a powerful Netbios and LAN/Network IP address scanner for Windows, whois and traceroute tool, remote shutdown and Wake On LAN (WOL) manager, wireless network scanner and monitor. This application will help you find all IP addresses, MAC addresses and shared folders of computers on your wired or wireless (Wi-Fi) network. The program scans network and displays your network computers in an easy to read, buddy-list style window that provides the computer name, IP address, MAC address, NIC vendor, OS version, logged users, shared folders and other technical details for each computer. MyLanViewer Network/IP Scanner supports remote shutdown, wake-on-lan, lock workstation, log off, sleep, hibernate, reboot and power off. It is able to monitor IP address and show notifications when the states of some computers change. MyLanViewer Network/IP Scanner can also view and access shared folders, terminate user sessions, disable shared folders, show netstat information and detect rogue DHCP servers. The software can monitor all devices (even hidden) on your subnet, and show notifications when the new devices will be found (for example, to know who is connected to your WiFi router or wireless network). The program easy to install and use, and has a user-friendly and beautiful interface. Website: http://www.mylanviewer.com OS: Windows XP / Vista / 7 / 8 Language: Eng / Rus Medicine: PreActivated Size: 4,48 / 5,17 Mb.
  10. You might recall that last month we showed you some images discovered of some of the Wi-Fi settings on Windows Phone 8.1. These images revealed that the Wi-Fi settings will include a feature that can turn connectivity back on based on a timer that can be set for 1 hour, 4 hours or 1 day. The user can also manually turn on Wi-Fi. The feature, called Wi-Fi Sense, will require that you opt in to Location services. This morning, we now have more than a static image of Wi-Fi Sense. The clip is all of 34 seconds long and shows the same options that we discussed back in February. Wi-Fi Sense will come in handy when you know that you're going to be away from a Wi-Fi signal for a known time period. And as we noted in the previous story, if you need to turn off Wi-Fi for longer than 4 hours (for example, when you're at work), Cortana can handle that request with settings changes based on whether you're at home or work. To check out Wi-Fi Sense inaction, click on the video below. Source
  11. TamoSoft CommView 6.5.740 (x86/x64) CommView is a powerful network monitor and analyzer designed for LAN administrators, security professionals, network programmers, home users…virtually anyone who wants a full picture of the traffic flowing through a PC or LAN segment. Loaded with many user-friendly features, CommView combines performance and flexibility with an ease of use unmatched in the industry. This application captures every packet on the wire to display important information such as a list of packets and network connections, vital statistics, protocol distribution charts, and so on. You can examine, save, filter, import and export captured packets, view protocol decodes down to the lowest layer with full analysis of over 70 widespread protocols. With this information, CommView can help you pinpoint network problems and troubleshoot software and hardware. CommView includes a VoIP analyzer for in-depth analysis, recording, and playback of SIP and H.323 voice communications. CommView runs on Windows XP / Vista/ 7 / 8 or Windows Server 2003 / 2008 / 2012 (both 32- and 64-bit versions). It requires a 10/100/1000 Mbps Ethernet, Wireless Ethernet, or Token Ring network card, or a standard dial-up adapter. For remote monitoring tasks, you can use our special, optional add-on for CommView: CommView Remote Agent. It allows CommView users to capture network traffic on any computer where Remote Agent is running, regardless of the computer's physical location. This powerful and unique technology broadens your monitoring range: you are no longer limited by your LAN segment or personal computer. What you can do with CommView View detailed IP connections statistics: IP addresses, ports, sessions, etc.Reconstruct TCP sessions.Map packets to the application that is sending or receiving them.View protocols distribution, bandwidth utilization, and network nodes charts and tables.Generate traffic reports in real time.Browse captured and decoded packets in real time.Search for strings or hex data in captured packet contents.Import and export packets in Sniffer®, EtherPeek™, AiroPeek™, Observer®, NetMon, and Tcpdump formats, export packets in hex and text formats.Configure alarms that can notify you about important events, such as suspicious packets, high bandwidth utilization, unknown addresses, etc.Create your own plug-ins for decoding any protocol.Exchange data with your application over TCP/IP.Export any IP address to SmartWhois for quick, easy IP lookup.Capture loopback traffic. Website: http://www.tamos.com/ OS: Windows XP / Vista / 7 / 8 / Server 2003 / 2008 / 2012 Language: Ml Medicine: Patch Size: 28,86 MB
  12. Advertiser

    Homedale 1.41

    Homedale 1.41 With Homedale, small (1.8 MB; only 0.6 MB if UPX compressed) and free program, you can search for Wi-Fi / WLAN Access Points and monitor their signal strength. Access points details See an overview of all available access points with their signal strength, encryption [WEP/WPA/WPA2], speed and channel. Signal Strength Graph You can also monitor the signal strength of selected access points in a graph over the time. With a right mouse click, you can start logging to a text file and create a screenshot. *** to display a decimal scale, set max dBm at -1 and min at -100 dBm; if signal strenght graph does not start, double click on the appropriate row in the access points list (blue icon change in red) Connection Make a right mouse click to connect and disconnect from a Wi-Fi / WLAN access point. The blue icon shows the currently connected access point. Geolocation Use the detected access points with Google Geolocation and Mozilla Location Service to locate yourself. The Google Maps Geolocation API returns a location and accuracy radius based on information about cell towers and WiFi nodes that the mobile client can detect. *** for a more accurate geolocation (50-80 mt) set "never remove old access points" disconnect, and reconnect to chosen access point Home: http://thesz.diecru.eu/content/homedale.phpDownload (v 1.41 · 4 Feb 2014 · 837kb): http://thesz.diecru.eu/data/get.php?file=Homedale.zipHomedale.exe - Virus Total Report (2014-02-05): 0 / 51 Notice: see *** suggestions, but some bugs may appear!
  13. Wifi HotSpot 1.0 - Free Wifi HotSpot + Portable Wifi HotSpot - can easily turn your windows pc into a wireless-wifi hotspot. It turns your Windows 7 or Windows 8 computer into a virtual router. With one click you can share your internet connection with your mobile phone, iPhone, iPad, tablet, computer or any other wireless enabled devices. Wifi HotSpot is the perfect solution for sharing your internet connection when you don't have a wireless router or if your using a mobile internet connected service such as Verizon, Sprint, Clear Wireless etc... Product Features: Custom Network Name (SSID)Custom Wireless PasswordDisplays Download SpeedDisplays Total Data TransferView Connected DevicesSet The Default Shared Network AdapterAuto Start The Wifi HotSpot When Your Computer StartsStart Wifi HotSpot To System Tray IconLimit Number Of Allowed Connected DevicesCreate Wireless HotSpot Without Logging In To Your PCWifi HotSpot Is A Completely Free AppWebsite: http://www.gearboxcomputers.com/downloads/ OS: Windows 7 / 8 / 8.1 Language: Eng Medicine: Freeware Size: 1,54 / 4,42 / 1,61 Mb. P.S. Who has the opportunity to test the portable version and please leave feedback about their work ...
  • Create New...