应用平台：Windows 2003, XP, Vista or Windows 7
Who Is On My Wifi 是一款监控无线网络安全的工具，通过它可以了解谁破解了我们无限网络的密码，从而侵占我们的无限带宽，因此通过它我们上网会变得更安心。
Who Is On My Wifi is cutting edge technology that detects wireless piggybackers or more dedicated hackers on your home or business network.
As the owner of a wireless network, you want to protect it from hackers and freeloaders
Encryption doesn’t always keep out the bad guys
For about the same price as an eBook, you can ensure that your Wireless Network is safe.
Find unknown computers on your internal network
Who Is On My Wifi will help you detect any intruders on your corporate network. Who Is On My Wifi will show you every computer on your network and notify you if it finds a computer that it does not recognize. Is someone using my wireless?
Are employee's plugging in home laptops on the corporate lan? Find out now with Who Is On My Wifi. It is an ideal internal security network monitoring system for your small to medium sized business.
What's New in This Release:
· Added New Scanning Options in the Diagnostic Tab for Advanced Users
· Added a Secondary Ping scan as an option for enhanced reliability of scans
· Added a Randomize feature to help prevent routers from caching the detection scans
· Added a Delay feature to help prevent routers from caching the detection scans (Please be aware this can triple the time it takes to scan a network)
But there is a way to be 100% certain that no one is on your Wireless Network but the computers and devices that you want to be on it…
You might be saying to yourself, “You’re right, Wireless networks are invisible, but I’m not worried about any of this because I have encryption on my wireless network.”
I congratulate you on securing your network, in fact I recommend that everyone use encryption on their wireless network.
The problem is that first of all, almost 40% of U.S. households leave their Wireless Network completely open. And secondly, of the ones that do encrypt their network, another almost 40% are still using WEP which has been considered insecure for many, many years. And even though WEP will be phased out of Wireless Devices in the next few years that leaves a long, long time for Wireless Networks to be compromised by even the most novice hackers.
Finally, for those of you who have setup WPA2 which is considered almost impossible to break, I only have one question. How sure are you that WPA2 will remain unbroken forever?
And as a followup question, even if someone doesn’t get in through the wireless, might there still be a way for your physical network to be compromised?
If you’ve taken the effort to install encryption on your wireless network, why wouldn’t you also want to verify that it’s working correctly?
It’s like they say “Trust but Verify”.
At this point, I hope you see the true value in verifying who has been connecting to your network.
I know when I first ran the software on my own machine, I kept expecting that someone I didn’t know would connect any minute.
I have to admit that I was pleasantly surprised.
I run WPA2 on my wireless network, and in the 6 months that I’ve been running this software, I’ve only seen 1 person connect to my network that I wasn’t aware of. And that was my wife who plugged her new computer directly into the Wireless Router without telling me about it.