I have not posted in a long time do to my work, and life in general, but I am looking for a program like Netstumbler that gives you a % of signal and not a color code. If possible to run in Ubuntu Linux but windows will work as well.
Unsecured networks open door for hackers, spies
By Airman 1st Class Andrew Dumboski
99th Air Base Wing Public Affairs
NELLIS AIR FORCE BASE, Nev. (AFPN) -- With wireless technology, consumers can easily network their computers within their household and access the Internet through any of their computers.
Consumers can sit in a lawn chair on their back porch and catch up on their e-mail and news, even do some online banking. But with this newfound convenience lies a new danger.
Bla bla bla
1. some type of electronics that aims the beam to the access point.
2. a passive reflector or beam shaping device around the omni antenna, that causes incoming off center waves to either be discarded or bent. Something like a RF lens. That way reflected radio waves from the ground and such do not arrive out of phase to the line of sight signal (and cancel each other out).
Any ideas? ALso I posted a bid to work on the project, if interested.
take their wifi security quiz!!
From Goverment Computer News (GCN):
WiFi is taking flight
By Doug Beizer,
Tucked in a corner of an airplane hangar in Iraq, an Air Force mechanic is repairing a plane’s hydraulic landing gear system when he hits a snag and needs to refer to the aircraft’s maintenance manual.
He doesn’t stop working to search for a paper manual, which may or may not be in the hangar. Instead, he pulls out a ruggedized tablet computer to access the LAN. Within minutes, he has downloaded the information he needs from a U.S.-based database and is back to work on the plane.
That scenario is a reality, said Tom Badders, director of wireless strategic development for Telos Corp. of Ashburn, Va.
Ubiquitous network connection is happening, thanks in large part to the proliferation of wireless networks for both civilian and Defense agencies.
Wireless makes sense
In many cases, wireless makes the most sense, whether it’s because of the devices people are using or because of the physical requirements of bases, buildings or conference rooms.
Telos has installed wireless networks at 85 of the Air Force’s 108 bases as well as 11 other Air Force sites worldwide, Badders said. “Primarily, it’s for maintenance and logistics operations, so we put wireless LAN coverage on flight lines, inside hangars, back shops, wherever maintenance and logistics operations are taking place.”
The wireless infrastructure extends the Air Force’s enterprise network to those whose job is to get aircraft back in the air, and increases the service’s supply chain efficiencies. Constant connection to the network lets personnel tie into maintenance databases, check tech orders on supply and logistics applications, fix equipment, update orders, read technical manuals, and order and track parts through the supply chain.
x-posted to the usual places
Apparently, there is a hacker relay bot that uses AIM on the loose. It takes your AIM name and another AIM user and links the two, each starting with the phrase, "I say, old bean, have you seen my hat?"
The above link explains how it works, and just be aware that if you receive this message from a screenname you don't know, don't respond. Just block the user.
"In the USA there's a planed bill, the so called CBDPTA (Consumer Broadband and Digital Television Promotion Act). First it was callen SSSCA (Security Systems Standards and Certification Act). The new name reads much more harmless. Looks like the first name made it too easy to discover the purpose of this bill.
This bill plans to legally force secure (TCPA-conform) systems. So in the USA it would then not be allowed to buy or sell systems that are not TCPA-conform. Passing this law would be punished with up to 5 years of prision and up to $500.000 fine. The same would apply for development of "open" software. Open means that it would work on systems that're not TCPA-conform.
Even if this bill would only valid in the USA it would have catastrophically effects worldwide. Because US companies are not allowed to develop and sell "unsecure" software, others would have to jump onto the TCP-train, so they would give total control over themself to the TCPA (USA?), or they would have to live completely without software and harware from US-companies. No Windows, Solaris, MacOS, Photoshop, Winamp or to say it short: The largest part of all software that's used on this planet would not be usable."
Trusted Computing Video
If we would like to continue operating our computers and other appliances as we see fit, we should try everything in our powers to stop Trusted Computing from changing the computer industry.
(X-posted to several forums) Spread the word. Stay in the know. Bring down Trusted Computing, and keep our computers ours.