Flylib.com
Wireless Hacks. 100 Industrial-Strength Tips and Techniques
Wireless Hacks. 100 Industrial-Strength Tips and Techniques
ISBN: N/A
EAN: N/A
Year: 2003
Pages: 158
BUY ON AMAZON
Main Page
Table of content
Copyright
Credits
About the Author
Contributors
Acknowledgments
Foreword
Preface
Why Wireless Hacks?
How to Use This Book
How This Book Is Organized
Conventions Used in This Book
How to Contact Us
Chapter 1. The Standards
1.1 Hacks 1-12
Hack 1 802.11: The Mother of All IEEE Wireless Ethernet
Hack 2 802.11a: The Betamax of the 802.11 Family
Hack 3 802.11b: The De Facto Standard
Hack 4 802.11g: Like 802.11b, only Faster
Hack 5 802.16: Long Distance Wireless Infrastructure
Hack 6 Bluetooth: Cable Replacement for Devices
Hack 7 900 MHz: Low Speed, Better Coverage
Hack 8 CDPD, 1xRTT, and GPRS: Cellular Data Networks
Hack 9 FRS and GMRS: Super Walkie-Talkies
Hack 10 802.1x: Port Security for Network Communications
Hack 11 HPNA and Powerline Ethernet
Hack 12 BSS Versus IBSS
Chapter 2. Bluetooth and Mobile Data
2.1 Hacks 13-19
Hack 13 Remote Control OS X with a Sony Ericsson Phone
Hack 14 SMS with a Real Keyboard
Hack 15 Photo Blog Automatically with the Nokia 3650
Hack 16 Using Bluetooth with Linux
Hack 17 Bluetooth to GPRS in Linux
Hack 18 Bluetooth File Transfers in Linux
Hack 19 Controlling XMMS with Bluetooth
Chapter 3. Network Monitoring
3.1 Hacks 20-42
Hack 20 Find All Available Wireless Networks
Hack 21 Network Discovery Using NetStumbler
Hack 22 Network Detection on Mac OS X
Hack 23 Detecting Networks Using Handheld PCs
Hack 24 Passive Scanning with KisMAC
Hack 25 Establishing Connectivity
Hack 26 Quickly Poll Wireless Clients with ping
Hack 27 Finding Radio Manufacturers by MAC Address
Hack 28 Rendezvous Service Advertisements in Linux
Hack 29 Advertising Arbitrary Rendezvous Services in OS X
Hack 30 Brought to you by Rendezvous Ad Redirector
Hack 31 Detecting Networks with Kismet
Hack 32 Running Kismet on Mac OS X
Hack 33 Link Monitoring in Linux with Wavemon
Hack 34 Historical Link State Monitoring
Hack 35 EtherPEG and DriftNet
Hack 36 Estimating Network Performance
Hack 37 Watching Traffic with tcpdump
Hack 38 Visual Traffic Analysis with Ethereal
Hack 39 Tracking 802.11 Frames in Ethereal
Hack 40 Interrogating the Network with nmap
Hack 41 Network Monitoring with ngrep
Hack 42 Running ntop for Real-Time Network Stats
Chapter 4. Hardware Hacks
4.1 Hacks 43-69
Hack 43 Add-on Laptop Antennas
Hack 44 Increasing the Range of a Titanium PowerBook
Hack 45 WET11 Upgrades
Hack 46 AirPort Linux
Hack 47 Java Configurator for AirPort APs
Hack 48 Apple Software Base Station
Hack 49 Adding an Antenna to the AirPort
Hack 50 The NoCat Night Light
Hack 51 Do-It-Yourself Access Point Hardware
Hack 52 Compact Flash Hard Drive
Hack 53 Pebble
Hack 54 Tunneling: IPIP Encapsulation
Hack 55 Tunneling: GRE Encapsulation
Hack 56 Running Your Own Top-Level Domain
Hack 57 Getting Started with Host AP
Hack 58 Make Host AP a Layer 2 Bridge
Hack 59 Bridging with a Firewall
Hack 60 MAC Filtering with Host AP
Hack 61 Hermes AP
Hack 62 Microwave Cabling Guide
Hack 63 Microwave Connector Reference
Hack 64 Antenna Guide
Hack 65 Client Capability Reference Chart
Hack 66 Pigtails
Hack 67 802.11 Hardware Suppliers
Hack 68 Home-Brew Power over Ethernet
Hack 69 Cheap but Effective Roof Mounts
Chapter 5. Do-It-Yourself Antennas
5.1 Hacks 70-79
Hack 70 Deep Dish Cylindrical Parabolic Reflector
Hack 71 Spider Omni
Hack 72 Pringles Can Waveguide
Hack 73 Pirouette Can Waveguide
Hack 74 Primestar Dish with Waveguide Feed
Hack 75 BiQuad Feed for Primestar Dish
Hack 76 Cut Cable Omni Antenna
Hack 77 Slotted Waveguides
Hack 78 The Passive Repeater
Hack 79 Determining Antenna Gain
Chapter 6. Long Distance Links
6.1 Hacks 80-85
Hack 80 Establishing Line of Sight
Hack 81 Calculating the Link Budget
Hack 82 Aligning Antennas at Long Distances
Hack 83 Slow Down to Speed Up
Hack 84 Taking Advantage of Antenna Polarization
Hack 85 Map the Wireless Landscape with NoCat Maps
Chapter 7. Wireless Security
7.1 Hacks 86-100
Hack 86 Making the Best of WEP
Hack 87 Dispel the Myth of Wireless Security
Hack 88 Cracking WEP with AirSnort: The Easy Way
Hack 89 NoCatAuth Captive Portal
Hack 90 NoCatSplash and Cheshire
Hack 91 Squid Proxy over SSH
Hack 92 SSH SOCKS 4 Proxy
Hack 93 Forwarding Ports over SSH
Hack 94 Quick Logins with SSH Client Keys
Hack 95 Turbo-Mode SSH Logins
Hack 96 OpenSSH on Windows Using Cygwin
Hack 97 Location Support for Tunnels in OS X
Hack 98 Using vtun over SSH
Hack 99 Automatic vtund.conf Generator
Hack 100 Tracking Wireless Users with arpwatch
Appendix A. Deep Dish Parabolic Reflector Template
Colophon
Index
Index SYMBOL
Index A
Index B
Index C
Index D
Index E
Index F
Index G
Index H
Index I
Index J
Index K
Index L
Index M
Index N
Index O
Index P
Index R
Index S
Index T
Index U
Index V
Index W
Index X
Index Y
Wireless Hacks. 100 Industrial-Strength Tips and Techniques
ISBN: N/A
EAN: N/A
Year: 2003
Pages: 158
BUY ON AMAZON
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
Object Types, Predicates, and Basic Constraints
ORM Constraints
Configuring, Manipulating, and Reusing ORM Models
Mapping ORM Models to Logical Database Models
Conceptual Model Reports
ADO.NET 3.5 Cookbook (Cookbooks (OReilly))
Connecting to SQL Server Using Integrated Security from ASP.NET
Determining the Differences in Data Between Two DataSet Objects
Improving Performance While Filling a DataSet
Listing Installed OLE DB Providers
A.1. General Considerations
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 3.1 Use PuTTY as a Graphical Replacement for telnet and rlogin
Step 4.4 How to Generate a Key Using PuTTY
Step 5.1 General Troubleshooting
Step 5.2 Troubleshooting Common OpenSSH Errors/Problems
Appendix - Sample sshd_config File
SQL Tips & Techniques (Miscellaneous)
Performing Multiple-table Queries and Creating SQL Data Views
Understanding SQL Subqueries
Understanding Transaction Isolation Levels and Concurrent Processing
Retrieving and Manipulating Data Through Cursors
Working with Ms-sql Server Information Schema View
PostgreSQL(c) The comprehensive guide to building, programming, and administering PostgreSQL databases
Numeric Values
Client 3Processing Queries
Client 1Connecting to the Server
Client 3Query Processing
Using Full-text Search
User Interfaces in C#: Windows Forms and Custom Controls
Design-Time Support for Custom Controls
Data Controls
MDI Interfaces and Workspaces
Dynamic User Interface
GDI+ Basics
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies