will.brien + sysadmin + wireless   10

Tor and HTTPS
Click the "Tor" button to see what data is visible to eavesdroppers when you're using Tor. The button will turn green to indicate that Tor is on.

Click the "HTTPS" button to see what data is visible to eavesdroppers when you're using HTTPS. The button will turn green to indicate that HTTPS is on.

When both buttons are green, you see the data that is visible to eavesdroppers when you are using both tools.

When both buttons are grey, you see the data that is visible to eavesdroppers when you don't use either tool.

Potentially visible data includes: the site you are visiting (SITE.COM), your username and password (USER/PW), the data you are transmitting (DATA), your IP address (LOCATION), and whether or not you are using Tor (TOR).
tor  ssl  https  encryption  privacy  eff  reference  security  wireless  sysadmin 
november 2012 by will.brien
Captive portal - Wikipedia, the free encyclopedia
The captive portal technique forces an HTTP client on a network to see a special web page (usually for authentication purposes) before using the Internet normally. A captive portal turns a Web browser into an authentication device.[1] This is done by intercepting all packets, regardless of address or port, until the user opens a browser and tries to access the Internet. At that time the browser is redirected to a web page which may require authentication and/or payment, or simply display an acceptable use policy and require the user to agree. Captive portals are used at many Wi-Fi hotspots, and can be used to control wired access (e.g. apartment houses, hotel rooms, business centers, "open" Ethernet jacks) as well.

Since the login page itself must be presented to the client, either that login page is locally stored in the gateway, or the web server hosting that page must be "whitelisted" via a walled garden to bypass the authentication process. Depending on the feature set of the gateway, multiple web servers can be whitelisted (say for iframes or links within the login page). In addition to whitelisting the URLs of web hosts, some gateways can whitelist TCP ports. The MAC address of attached clients can also be set to bypass the login process.
wikipedia  wireless  sysadmin  networking  security  dns  proxy  iptables  work 
february 2012 by will.brien
Documentation
Airpwn works by spoofing 802.11 packets to look as if they came from a legitimate access point (AP). When you use a traditional 802.11 network, you are communicating all your data to the AP, and all responses come from the AP. One drawback of wireless networks is that all the data you send to the AP is in fact broadcast to every other computer in your general area. By eavesdropping on the data you send to the AP and spoofing a response from the AP, airpwn can appear to be whatever computer you are communicating with. (This is similar, but not identical to a classic man-in-the-middle attack.)
software  hardware  wireless  security  sysadmin  firewall  networking  utilities 
december 2009 by will.brien
inSSIDer | MetaGeek
inSSIDer is an award-winning free Wi-Fi network scanner for Windows Vista and Windows XP. Because NetStumbler doesn't work well with Vista and 64-bit XP, we built an open-source Wi-Fi network scanner designed for the current generation of Windows operating systems. A year later, inSSIDer was discussed by Lifehacker and Tekzilla!
software  windows  sysadmin  security  networking  wireless  tools  work 
october 2009 by will.brien
Download details: Microsoft Exchange Server ActiveSync Web Administration Tool
The Exchange Server ActiveSync Web Administration tool is designed for administrators who want to manage the process of remotely erasing lost, stolen, or otherwise compromised mobile devices.
exchange  windows  email  security  sysadmin  wireless  telephony  work 
october 2008 by will.brien
Tomato Firmware
Tomato is a small, lean and simple replacement firmware for Linksys' WRT54G/GL/GS, Buffalo WHR-G54S/WHR-HP-G54 and other Broadcom-based routers. It features a new easy to use GUI, a new bandwidth usage monitor, more advanced QOS and access restrictions, enables new wireless features such as WDS and wireless client modes, raises the limits on maximum connections for P2P, allows you to run your custom scripts or telnet/ssh in and do all sorts of things like re-program the SES/AOSS button, adds wireless site survey to see your wifi neighbors, and more.
linux  hardware  wireless  router  firewall  networking  sysadmin  security 
august 2008 by will.brien
Tomato Firmware
Tomato is free open source Linux-based firmware for several Broadcom-based Wi-Fi routers, including the Linksys WRT54G. The major emphasis of Tomato is on stability, speed and efficiency.
linux  router  hardware  software  sysadmin  firewall  networking  wireless  wiki  books 
march 2008 by will.brien
Balancing Connections Over Multiple Links
Say you have access to multiple links to the Internet, such as several wireless networks in range. Wouldn't it be nice to combine all that bandwidth into one big fat pipe for your downloading pleasure?
tutorials  networking  wireless  router  sysadmin 
november 2005 by will.brien
Wireless HotSpot HowTo
Linksys WRT54GS + OpenWRT + ChillSpot + FreeRadius (with Mysql authentication and accounting ) + PHP/Perl
tutorials  wireless  sysadmin  router  security  linux  diy  networking 
november 2005 by will.brien

Copy this bookmark:



description:


tags: