Home |
Search |
Today's Posts |
#13
![]() |
|||
|
|||
![]()
"J.B. Wood" wrote in
: Hello once more. One last thing to add is that even if one installs a high-gain Wi-Fi antenna, depending on the distance to the source, you probably won't have clear line-of-sight and subject to multipath problems. The network might show a "4 green bars" signal strength one moment and be yellow, red, or out the next). Sincerely, That is most likely where my problem is. Remember this is just a redneck style Git'r done solution till my commercial one arrives, a vertical anttenna in front of a dish has got all ears and no mouth written all over it. Now if I was using a feed horn [cantenna type] well that would prove tx power and your sugestion as well is the culprit, we know the clutter thing is in there because this whole shmoosh is indoors. I hate running high power $$$ and frequent burnouts of the finals. I like to think a half watt is all I'll need. Now if I can get my TX to look like a Laser beam hey hey. Seriously check this out; www.youtube.com/watch?v=piFISJKyV6c www.youtube.com/watch?v=weEZtBTfEMU The software is free but I preffer the USB dongle os running BackTrack 3 It's a bit simpler, and you need 2 wifi dongles, prefferably the Athros as suggested, II use them on other versions of Linux too, they seem to be the best for hackin around, they are permiscuos and can Inject packets to an already busy data streem thanx to the MAC address spoofabilty they have. You can also use this software to turn a laptop with two dongles into a covert repeater. But expect downtime with that idea. You can Cache everybodys WEP keys buy faking your IP as one of the AP points in the Air. Send all 'packets copy' to a data BIN folder and run the desypher software built in to get the wep, wpk and such. Even SSL ports. It's my job to keep these script kiddies out of my network, I have to know this stuff. Our wireless Credit card system is constantly under attack by NIX kids [wannabe hacker teens running linux] As long as I can crack it, they will not use it, it's sitting there off line collecting dust per order ME!! WEP is not safe neither is WPK, though a data base dictionary service is needed for WPK sometimes for 25 bucks these hackers will take your glop of ssl data and within 1 day send you the security key. This is the nightmare behind CLOUD computing, the access to several hundred micro proccessors to crack a key is now CHEAP, I use 40 lab machines to convert and crunch a DVD 2 hour video in ten minutes with cloud computing software. It's realy FARM computing not quite the same as the term local ads are running such as google is now cloud computing. Unfortunatly Criminal minds are more intrested in this more then we are. |
Thread Tools | Search this Thread |
Display Modes | |
|
|
![]() |
||||
Thread | Forum | |||
Tower height question (moved thread from tower pro NG) | Antenna | |||
WTB Universal Tower Sections (aluminum tower) | Swap | |||
Tower Wars: FL Citizens Protect the kids from evil Ham with lightening attracting tower. | Policy |