background preloader

WiGLE - WIFI Database

WiGLE - WIFI Database
Related:  Wireless TOOLS

OSX : inSSIDer Scan the Wi-Fi networks around you and track their signal strength over time. inSSIDer scans all the Wi-Fi networks within the reach of your computer’s wireless card, tracks their signal strength over time, and determines their security settings. Track open or secure wireless networks. Determine the best channel for your own wireless network. DOWNLOAD Use the Networks Table to view all nearby access points and their details. See Received Signal Strength, Security, Channel, Hardware Vendor, Max Rate, Network Type, and MAC Address for each access point. Use the Time Graph to view the strength of nearby access points. Click on any network listed in the table and the associated time graph line below will become bold, helping you identify a single network amongst many. FEATURES Simple, Easy to Use Interface Quick Wi-Fi Tracking Scalable Time Graph Window Full-Screen View Screenshot of inSSIDer for Mac

Web Naming and Addressing Overview (URIs, URLs, ...) Links · About URIs · History This is an overview of W3C materials related to Addressing. The URI Activity Statement explains W3C's work on this topic in more detail. Standards Track Specifications Uniform Resource Identifier (URI): Generic Syntax, Internationalized Resource Identifiers (IRIs), BCP for scheme registration process, guidelines for new schemes, IANA's list of URI schemes Current W3C work on URIs URI Activity Statement, URI Interest Group URIs, URLs, and URNs: Clarifications and Recommendations 1.0 W3C Note Sep 2001 (also RFC 3305 (informational)) Related W3C work Technical Architecture Group (TAG), Internationalization, Semantic Web, RDF, Extensible Markup Language (XML) Related IETF work, supported by W3C Work on RFC 2396 update (to IETF Standard) Personal Perspectives Community Discussion uri@w3.org, www-talk@w3.org, UriSchemes topic in the ESW Wiki Learning About URIs The Web is an information space. Timeline: News, Events, Publications, and History Jan 2005 March 2003 March 2001 ...

WiFiMaps Hotspot Locator and Wi-Fi Directory Key signing party Participants of a large key signing party line up in preparation to verify each other's identities prior to signing. Key signing in front of FOSDEM 2008. Although PGP keys are generally used with personal computers for Internet-related applications, key signing parties themselves generally do not involve computers, since that would give adversaries increased opportunities for subterfuge. Rather, participants write down a string of letters and numbers, called a public key fingerprint, which represents their key. The fingerprint is created by a cryptographic hash function, which condenses the public key down to a string which is shorter and more manageable. Participants exchange these fingerprints as they verify each other's identification. See also[edit] External links[edit] Keysigning Party HowtoBiglumber – Keysigning coordination websitekeysigning.org – Key signing party coordination website

Chanalyzer Wi-Spy + Chanalyzer 5NEW! Pain Relief for Wi-Fi Headaches Now with 802.11ac support! Wi-Fi has revolutionized the way we work. When Wi-Fi isn’t working, though, it’s a frustrating mystery. Wi-Spy and Chanalyzer were created to help you fix these Wi-Fi headaches… FAST! Wi-Spy is easily one of my all time favorite tools and I strongly recommend it to anyone who is responsible for managing a Wi-Fi network of any size. — Larry Greenblatt, CISSP, CISM, CEH, ECSA See the invisible with Wi-Spy If you can see it, you can fix it Wi-Spy is a custom USB spectrum analyzer designed specifically for troubleshooting Wi-Fi issues. By integrating the raw RF signal measurements from Wi-Spy with standard information from your Wi-Fi radio, Chanalyzer creates a complete picture of how Wi-Fi and non-Wi-Fi transmitters impact your wireless networks, giving you the information you need to resolve the issues affecting your users. Quickly locate interference Track down offending signals using Device Finder [More...]

World-Wide Web: An Illustrated Seminar Note: This talk is an old one from 1991 and 1992. Some parts may have been altered later but in general it is out of date, though interesting for historical reasons. Much of the "What is W3" section is of course still just as valid. Welcome to this online seminar on the World-Wide Web (W3). It gives first an overview of W3 for those to whom it is new, including a review of the current status of software, and then mentions some plans for the future. This is the text track. What is W3? W3 is a "distributed heterogeneous collaborative multimedia information system". W3 is many things: (go through them in order) The future So much for the web as it is. Here are some details of the technical plans for the future Getting Started Everything we know about W3 is available on the web itself. We hope you have found this talk useful.

Essential Wireless Hacking Tools By Daniel V. Hoffman, CISSP, CWNA, CEH Anyone interested in gaining a deeper knowledge of wireless security and exploiting vulnerabilities will need a good set of base tools with which to work. Fortunately, there are an abundance of free tools available on the Internet. This list is not meant to be comprehensive in nature but rather to provide some general guidance on recommended tools to build your toolkit. Finding Wireless Networks Locating a wireless network is the first step in trying to exploit it. Network Stumbler a.k.a NetStumbler – This Windows based tool easily finds wireless signals being broadcast within range – A must have. (NetStumbler Screenshot) Kismet – One of the key functional elements missing from NetStumbler is the ability to display Wireless Networks that are not broadcasting their SSID. (Kismet Screenshot) Attaching to the Found Wireless Network Once you’ve found a wireless network, the next step is to try to connect to it. (Screenshot of Airsnort in Action)

Web of trust In cryptography, a web of trust is a concept used in PGP, GnuPG, and other OpenPGP-compatible systems to establish the authenticity of the binding between a public key and its owner. Its decentralized trust model is an alternative to the centralized trust model of a public key infrastructure (PKI), which relies exclusively on a certificate authority (or a hierarchy of such). As with computer networks, there are many independent webs of trust, and any user (through their identity certificate) can be a part of, and a link between, multiple webs. The web of trust concept was first put forth by PGP creator Phil Zimmermann in 1992 in the manual for PGP version 2.0: As time goes on, you will accumulate keys from other people that you may want to designate as trusted introducers. Operation of a web of trust[edit] All OpenPGP-compliant implementations include a certificate vetting scheme to assist with this; its operation has been termed a web of trust. Contrast with typical PKI[edit]

Eye P.A.: Visual Packet Analysis Go into detail with the Packets Tab In Eye P.A.’s Packets Tab, you’ll find a table that breaks down the packet traffic in your capture as it happened. Being able to see the RSSI, Data Rate, and other specific packet-level details provides even more insight into the cause of a WLAN’s problems. Just like with the treepies, the packets table will update to reflect whatever filters and timespan you’ve set. You can also customize the columns to only show what you’re interested in. Analyze with built-in tips After you select the network you’re interested in optimizing, Eye P.A. identifies potential network issues and suggests improvements based on its packet inspection of protection mechanisms, legacy data rates, encryption, and channel placement.

Designing Calm Technology Mark Weiser and John Seely Brown Xerox PARC December 21, 1995 Introduction Bits flowing through the wires of a computer network are ordinarily invisible. But a radically new tool shows those bits through motion, sound, and even touch. Created by artist Natalie Jeremijenko, the "Dangling String" is an 8 foot piece of plastic spaghetti that hangs from a small electric motor mounted in the ceiling. We have struggled for some time to understand the design of calm technology, and our thoughts are still incomplete and perhaps even a bit confused. The Periphery Designs that encalm and inform meet two human needs not usually met together. But some technology does lead to true calm and comfort. We use "periphery" to name what we are attuned to without attending to explicitly. It should be clear that what we mean by the periphery is anything but on the fringe or unimportant. A calm technology will move easily from the periphery of our attention, to the center, and back. Three signs of calm technology

503 Service Temporarily Unavailable Find Your Career Passion By Debra Davenport Ever wish you were one of those fortunate people who knew -- at the age of 6 -- exactly what they wanted to be when they grew up? If you find yourself as an adult still searching for your passion, don't despair. The key is not wasting any more precious time in a career that doesn't fit and finding the livelihood that's a natural extension of the real you. Retrace Your Steps Often, career passions are formed in childhood. Identify What Really Matters Your values are the map to your perfect career. Get Deep Are you seeking to make a difference or contribute to society through your work? Explore Many people feel stuck because they simply don't know what exists in terms of career possibilities. Try It on for Size Internships and apprenticeships are great ways to try on careers. Listen to Your Heart What do you enjoy doing so much that you'd do it for free? Get Tested Seek out a certified career counselor and request a comprehensive career assessment. Peel Away the Layers

AirMagnet Archived Webinars Archived Webinars Surveys shouldn't just be for pre-deployment any longer. This webinar covers how to use AirMagnet's SurveyPro to make sure your Wireless LAN design meets or exceeds the initial design parameters. You wouldn't turn over a cable install without validating your cable plant - so don't turn over a Wireless LAN without first 'proving' it meets your design goals. We'll cover what some industry standard goals are for a variety of WLAN types - and how you can measure, validate, and report these for your Wireless networks. Presented by Keith Parsons - who's taught thousands of people to maximize the use of the AirMagnet SurveyPro software. »Download Your organization’s wireless LAN has evolved from a nice-to-have convenience to a must-have, mission-critical key element in your IT infrastructure. »Download Learn about how to use AirMagnet Spectrum XT, WLAN industrys leading Spectrum Analysis tool to detect and find non WLAN interferers. »Download »Download »Download »Download »Download

Related: