Advanced method of filtering rogue connections

I am too lazy and don't have the time to look this up, sorry.

Which of the software tools out there can analyze transmission characteristics and establish rules for who can connect to a public hotspot (not encrypted)? What transmission characteristics does it analyze and how does it do it?


Reply to
Loading thread data ... Forums website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.