《无线网络安全监控工具》(Who Is On My Wifi )v2.0.4 Portable[压缩包]

  • 状态: 精华资源
  • 摘要:
    制作发行IO3O LLC
  • 时间: 2012/07/31 21:35:10 发布 | 2012/08/01 05:49:27 更新
  • 分类: 软件  安全相关 


精华资源: 3862

全部资源: 3863

相关: 分享到新浪微博   转播到腾讯微博   分享到开心网   分享到人人   分享到QQ空间   订阅本资源RSS更新   美味书签  subtitle
英文名Who Is On My Wifi
版本v2.0.4 Portable
制作发行IO3O LLC

IPB Image IPB Image

应用平台:Windows 2003, XP, Vista or Windows 7

Who Is On My Wifi 是一款监控无线网络安全的工具,通过它可以了解谁破解了我们无限网络的密码,从而侵占我们的无限带宽,因此通过它我们上网会变得更安心。

IPB Image

IPB Image

IPB Image

Who Is On My Wifi is cutting edge technology that detects wireless piggybackers or more dedicated hackers on your home or business network.
learn image

As the owner of a wireless network, you want to protect it from hackers and freeloaders
Encryption doesn’t always keep out the bad guys
For about the same price as an eBook, you can ensure that your Wireless Network is safe.

Find unknown computers on your internal network

Who Is On My Wifi will help you detect any intruders on your corporate network. Who Is On My Wifi will show you every computer on your network and notify you if it finds a computer that it does not recognize. Is someone using my wireless?

Are employee's plugging in home laptops on the corporate lan? Find out now with Who Is On My Wifi. It is an ideal internal security network monitoring system for your small to medium sized business.

What's New in This Release:

· Added New Scanning Options in the Diagnostic Tab for Advanced Users
· Added a Secondary Ping scan as an option for enhanced reliability of scans
· Added a Randomize feature to help prevent routers from caching the detection scans
· Added a Delay feature to help prevent routers from caching the detection scans (Please be aware this can triple the time it takes to scan a network)

you can’t see a wireless network. You can’t touch it. And you can’t know who is connected to it without some help.

But there is a way to be 100% certain that no one is on your Wireless Network but the computers and devices that you want to be on it…

You might be saying to yourself, “You’re right, Wireless networks are invisible, but I’m not worried about any of this because I have encryption on my wireless network.”

I congratulate you on securing your network, in fact I recommend that everyone use encryption on their wireless network.

The problem is that first of all, almost 40% of U.S. households leave their Wireless Network completely open. And secondly, of the ones that do encrypt their network, another almost 40% are still using WEP which has been considered insecure for many, many years. And even though WEP will be phased out of Wireless Devices in the next few years that leaves a long, long time for Wireless Networks to be compromised by even the most novice hackers.

Finally, for those of you who have setup WPA2 which is considered almost impossible to break, I only have one question. How sure are you that WPA2 will remain unbroken forever?

And as a followup question, even if someone doesn’t get in through the wireless, might there still be a way for your physical network to be compromised?
If you’ve taken the effort to install encryption on your wireless network, why wouldn’t you also want to verify that it’s working correctly?

It’s like they say “Trust but Verify”.

At this point, I hope you see the true value in verifying who has been connecting to your network.

I know when I first ran the software on my own machine, I kept expecting that someone I didn’t know would connect any minute.

I have to admit that I was pleasantly surprised.

I run WPA2 on my wireless network, and in the 6 months that I’ve been running this software, I’ve only seen 1 person connect to my network that I wasn’t aware of. And that was my wife who plugged her new computer directly into the Wireless Router without telling me about it.






(?) [公告]留口水、评论相关规则

  1. 类似“顶”、“沙发”之类没有营养的文字,对勤劳贡献的楼主来说是令人沮丧的反馈信息。
  2. 提问之前请再仔细看一遍楼主的说明,或许是您遗漏了。
  3. 勿催片。请相信驴友们对分享是富有激情的,如果确有更新版本,您一定能搜索到。
  4. 请勿到处挖坑绊人、招贴广告。既占空间让人厌烦,又没人会搭理,于人于己都无利。
  5. 如果您发现自己的评论不见了,请参考以上4条。