background preloader

Wi-Fi Inspector

Wi-Fi Inspector
The Xirrus Wi-Fi Inspector is a powerful tool with built-in tests enabling you to characterize the integrity and performance of your Wi-Fi network. You can easily gain visibility into your network with this application, which is designed to run on Windows XP, Vista or Windows 7 laptops. Simple tool for monitoring Wi-Fi networks Runs on Windows 7, Vista or XP Free of charge and easy to install software Real-time monitoring of wireless network status, traffic and clients Detect Rogue APs Ensure high performance of your network Reduced IT burden with easy to use troubleshooting tools Enhance security by eliminating rogue APs Provide peak Wi-Fi network performance

Can You Hack Your Own Site? A Look at Some Essential Security Considerations Twice a month, we revisit some of our readers’ favorite posts from throughout the history of Nettuts+. This tutorial was first published in July, 2008. Version one goes gold! Maybe that dastardly style sheet just won’t cascade elegantly on browser X. This article walks through the brainstorming stage of planning for what is, in this instance, a hypothetical user-centric web application. Although you won’t be left with a complete project – nor a market ready framework, my hope is that each of you, when faced with future workloads, may muse on the better practices described. The Example We’ve been asked by our client to incorporate into an existing site, a book review system. After a quick chat with the client, we have the following specification to implement, and only twenty four hours to do it: Note: The client's server is running PHP5, and MySQL – but these details are not critical to understanding the bugbears outlined in this article. The Processes: $_REQUEST Variables SQL Injection

How to be a good (and lazy) System Administrator If you're anything like the average System Administrator, you are understaffed, underfunded, and overworked. By now, you've also gotten used to the idea that no one knows you exist until the mail server goes down, then you're suddenly on America's Most Wanted. In this article, I'm also assuming that you have many servers that you are responsible for. I'm also assuming that you don't really want to work as hard as you are; if you do, you should become a Windows server manager and begin worrying about frequent patches from Microsoft, security vulnerabilities, virus protection, a clumsy user interface, and lack of native scriptability. As a good System Administrator, you want to get the job done right, but as a lazy System Administrator, you don't want to work too hard to get it done. Over the years, I've developed the mantra, “If I have to do it more than once, I write a script to do it.” Once we've taken the time to get the authentication working, lets start making our lives easier. #!

Wireshark Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education. Originally named Ethereal, in May 2006 the project was renamed Wireshark due to trademark issues.[4] Functionality[edit] Wireshark is very similar to tcpdump, but has a graphical front-end, plus some integrated sorting and filtering options. Wireshark allows the user to put network interface controllers that support promiscuous mode into that mode, in order to see all traffic visible on that interface, not just traffic addressed to one of the interface's configured addresses and broadcast/multicast traffic. On Linux, BSD, and OS X, with libpcap 1.0.0 or later, Wireshark 1.4 and later can also put wireless network interface controllers into monitor mode. History[edit] In the late 1990s, Gerald Combs, a computer science graduate of the University of Missouri–Kansas City, was working for a small Internet service provider.

Raging Menace - MenuMeters MenuMeters cannot be used on 10.11 El Capitan, please see "System Requirements" below. Introduction MenuMeters is a set of CPU, memory, disk, and network monitoring tools for Mac OS X. Although there are numerous other programs which do the same thing, none had quite the feature set I was looking for. Most were windows that sat in a corner or on the desktop, which are inevitably obscured by document windows on a laptop's small screen. Those monitors which used the menubar mostly used the NSStatusItem API, which has the annoying tendency to totally reorder my menubar on every login. The MenuMeters monitors are true SystemUIServer plugins (also known as Menu Extras). The CPU Meter can display system load both as a total percentage, or broken out as user and system time. MenuMeters comes without warranty or support. Screenshots License MenuMeters is released under the GNU General Public License (GPL). See the "GNU General Public License.rtf" file for full license terms. Donations

New "paint" provides wireless network protection without encryption Forget WEP and WPA; I’m switching over to the EM-SEC Coating System, a recently revealed paint developed by EM-SEC Technologies that acts as an electromagnetic fortress, allowing a wireless network to be contained within painted walls without fear of someone tapping in or hacking wireless networks. The EM-SEC Coating System is clearly the most secure option aside from stringing out the CAT5, and can be safely used to protect wireless networks in business and government facilities. “The use of EM-SEC Coating as an electromagnetic barrier for the containment of wireless networks has opened a new realm of possibilities for our company and for the future of wireless communications” said Robert Boyd, Vice President and Director of Technology for EM-SEC Technologies, LLC. The EM-SEC Coating System uses a series of water-based shielding products that restrict the passage of airborne RF signals, and was initially developed to aid the U.S.

atMonitor Monitoring MiniTop - Displays top 3 most CPU hungry applications. CPU - Supports multiple cores. Displays detailed process information and the top 3 CPU intensive processes. RAM - Shows memory specifications and the usage broken down into wired, used and free. It also tracks the top 3 memory hog processes and allows to "Purge" - recover memory (dev tools must be installed for the Purge feature to work). Temperature - Both CPU and GPU temperatures are reported. Disk - Displays the read and write performance of the most active disk. Network - Displays the read and write performance of the active network interface. Top Window Top Window is the core functionality of atMonitor. Triggers Triggers can be setup to activate any script when a predefined value reaches its target. Utilities Utilities, accessible from "System Info", are a set of useful and domain specific system commands that can show detailed information about the system such as Kernel State, I/O Registers, Smc Sensors and more. Logging

Related: