Latest threads in Wireless Networkingshow only best voted threads

Subject Author Posted Replies
 
Soliscom.net Bankrupt?
We bought some tech kit from this company (2York Place Edinburgh) a few weeks ago,and can't contact them. Does anyone know if, as now seems likely ,they've gone under? No phone resonse,no email...
 
Matching on the MFJ-1800
Hi All, My original thread seems to have died, still wondering how the folded loop is matched to 50 ohms. (probably isn't? cheap, but works?) I've added a dimensional drawing and some more pics. If...
38
38
 
10 Things the iPhone Worm Teaches Us About Mobile Security
10 Things the iPhone Worm Teaches Us About Mobile Security By: Don Reisinger 2009-11-09 10 Things the iPhone Worm Teaches Us About Mobile Security ( Page 1 of 2 ) News Analysis: The iPhone is under...
1
1
 
iPhone Hacker Tool Steals Data from Jailbroken Phones
iPhone Hacker Tool Steals Data from Jailbroken Phones By: Brian Prince 2009-11-11 Researchers at Mac security firm Intego have uncovered a new tool hackers can use to steal data from jailbroken Apple...
1
1
 
Cisco Wireless G cable Gateway
Model WCG200 Ok, this may seem dumb (and probably is) but I know the name of my wireless system, and am presently working on the computer that it is linked to. Another computer at home is successfully...
 
Looking for software.
Where can I find some software so I can see what is going on my wireless connections? I have a few lap tops and I would like to see what they are doing on the network. I know there is some free...
 
2 wireless routers
I have two routers. One is a new linksys WRT160NL. The second is an older asus with a wireless print server built in. The Linksys is connected to my cable modem. I want to connect an ethernet cable...
3
3
 
iPhone Worm Hits Australia
First iPhone Worm Hits Australia By: Brian Prince 2009-11-09 The first known worm for Apple's iPhone is spreading on jail-broken iPhones in Australia. The worm takes advantage of the default password...
61
61
 
[WiMAX] Profile B vs Profile C - Popular ASN architecture
Hi, Which of the profiles that provide different decomposition of functions within the ASN is more popular in WiMAX . Is it Profile B or Profile C ? I find that Profile C's open and non-proprietary...
 
ALERT: WPA-TKIP isn't secure - use WPA2 instead
SUMMARY: WPA-PSK is vulnerable to offline attack. WPA-TKIP has been cracked. TO AVOID THESE PROBLEMS: 1. USE WPA-AES or WPA2 instead of WPA-TKIP (or WEP) 2. USE A PASSPHRASE WITH MORE THAN 20...
 
Wireless (Internet) Wiki (FAQ)
NEW HOME OF WIRELESS WIKI IS A comprehensive resource on wireless access to the Internet, including answers to Frequently Asked Questions (FAQ), and Fast Fixes for common problems. Search Wireless...
2
2
 
100% Official Kingston 128GB USB Flash drives now available
KINGSTON DATA TRAVELERS DT 200 DT200 128GB USB DRIVE 100% OFFICIAL KINGSTON STOCK Kingston's new DataTraveler® 200 USB Flash drive is ideal for storing and transferring digital images and...
 
Matching impedance with coax
Hi all, I'm trying to get an understanding of the MFJ-1800 wifi antenna. The antenna has a folded loop as the active element. Is this considered to have a 300 ohm output impedance? The folded loop is...
38
38
 
Wireless N
I am thinking of getting a new laptop. It appears that they come with Wireless N networking. Will this work with a Wireless G router? If it won't, will my Wireless G computers work with a Wireless N...
3
3
 
PCDP & RLC , SNDCP & LLC/RLC => Equivalent in CDMA2000 HRPD
Hi, In GPRS, on the side of SGSN, there is SNDCP that will take the IP packets compress its header and pass to the LLC layer. While on the MS side, the LLC inturn gives it to RLC layer for reliable...