reklama - zainteresowany?

Wireless Hacks. Tips & Tools for Building, Extending, and Securing Your Network. 2nd Edition - Helion

Wireless Hacks. Tips & Tools for Building, Extending, and Securing Your Network. 2nd Edition
ebook
Autor: Rob Flickenger, Roger Weeks
ISBN: 978-05-965-5329-6
stron: 466, Format: ebook
Data wydania: 2005-11-22
Księgarnia: Helion

Cena książki: 80,73 zł (poprzednio: 94,98 zł)
Oszczędzasz: 15% (-14,25 zł)

Dodaj do koszyka Wireless Hacks. Tips & Tools for Building, Extending, and Securing Your Network. 2nd Edition

Tagi: Budowa sieci | Konfiguracja sieci | Sieci bezprzewodowe | Sieci komputerowe

The popularity of wireless networking has grown exponentially over the past few years, despite a general downward trend in the telecommunications industry. More and more computers and users worldwide communicate via radio waves every day, cutting the tethers of the cabled network both at home and at work.

Wireless technology changes not only the way we talk to our devices, but also what we ask them to do. With greater flexibility, broader range, and increased mobility, wireless networks let us live, work, and think differently. Wireless networks also open up a vast range of tasty new hack possibilities, from fine-tuning network frequencies to hot-rodding handhelds.

The second edition of Wireless Hacks, co-authored by Rob Flickenger and Roger Weeks, brings readers more of the practical tips and tricks that made the first edition a runaway hit, selling nearly 30,000 copies. Completely revised and updated, this version includes over 30 brand new hacks, major overhauls of over 30 more, and timely adjustments and touchups to dozens of other hacks introduced in the first edition. From passive network scanning to aligning long-distance antennas, beefing up wireless network security, and beyond, Wireless Hacks answers real-life networking needs with direct solutions.

Flickenger and Weeks both have extensive experience in systems and network administration, and share a passion for making wireless more broadly available. The authors include detailed coverage for important new changes in specifications and in hardware and software, and they delve deep into cellular and Bluetooth technologies.

Whether you need your wireless network to extend to the edge of your desk, fit into your backpack, or cross county lines, the proven techniques in Wireless Hacks will show you how to get the coverage and functionality you're looking for.

Dodaj do koszyka Wireless Hacks. Tips & Tools for Building, Extending, and Securing Your Network. 2nd Edition

 

Osoby które kupowały "Wireless Hacks. Tips & Tools for Building, Extending, and Securing Your Network. 2nd Edition", wybierały także:

  • AWS Certified Developer - Associate Guide
  • AWS Certified Solutions Architect  Associate Guide
  • Data Center Virtualization Certification: VCP6.5-DCV Exam Guide
  • Managing Mission - Critical Domains and DNS
  • Architecting Microsoft Azure Solutions  Exam Guide 70-535

Dodaj do koszyka Wireless Hacks. Tips & Tools for Building, Extending, and Securing Your Network. 2nd Edition

Spis treści

Wireless Hacks. Tips & Tools for Building, Extending, and Securing Your Network. 2nd Edition eBook -- spis treści

  • Wireless Hacks, 2nd Edition
  • Foreword
  • Credits
    • About the Authors
    • Contributors
    • Acknowledgments
      • Rob
      • Roger
  • Preface
    • Why Wireless Hacks?
    • How to Use This Book
    • How This Book Is Organized
    • Conventions Used in This Book
    • Using Code Examples
    • How to Contact Us
      • Safari Books Online
      • Got a Hack?
  • 1. Bluetooth, Mobile Phones, and GPS
    • 1.1. Hacks 122: Introduction
    • 1. Set Up Bluetooth on Linux
    • 2. Set Up Bluetooth on Windows XP
      • 1.3.1. Installing Bluetooth
      • 1.3.2. Securing Your Bluetooth Connection
      • 1.3.3. Networking with Bluetooth
      • 1.3.4. See Also
    • 3. Connect Mac OS X with a Bluetooth Phone
      • 1.4.1. Requirements
      • 1.4.2. Adding a Device
      • 1.4.3. Connection Setup
    • 4. Connect Linux with a Bluetooth Phone
      • 1.5.1. Pairing Your Phone
      • 1.5.2. Configuring PPP Networking
      • 1.5.3. Hacking the Hack
    • 5. Connect Windows XP with a Bluetooth Phone
    • 6. Use Your Treo as a Modem
      • 1.7.1. Treo 650 Bluetooth DUN
      • 1.7.2. PdaNet
    • 7. Send SMS from a PowerBook
    • 8. Remote Control Mac OS X with Bluetooth Phones and PDAs
      • 1.9.1. Installing Clicker
      • 1.9.2. Connecting to Clicker
      • 1.9.3. Hacking the Hack
    • 9. Remote Control Linux with a Bluetooth Phone
    • 10. Control XMMS with Bluetooth
    • 11. Liven Up Parties with a Participatory Slideshow
      • 1.12.1. The Slideshow
      • 1.12.2. The Code
    • 12. Send SMS from Linux
    • 13. Remote Control Windows with Bluetooth Phones and PDAs
      • 1.14.1. Requirements
      • 1.14.2. Installing PuppetMaster
      • 1.14.3. Controlling Your PC
      • 1.14.4. Hacking the Hack
    • 14. Control Your Bluetooth Phone with FMA
      • 1.15.1. Requirements
      • 1.15.2. Setup
      • 1.15.3. FMA
    • 15. Control Your Computer from Your Palm
      • 1.16.1. Set up VNC on Your Desktop
        • 1.16.1.1. Setting up OSXvnc on a Mac.
        • 1.16.1.2. Securing the connection.
        • 1.16.1.3. Setting up VPN.
        • 1.16.1.4. Setting up VPN on Windows XP.
      • 1.16.2. Set up PalmVNC
    • 16. Control Your Home Theater from Your Palm
      • 1.17.1. Hardware
      • 1.17.2. Detailed Instructions
        • 1.17.2.1. Using NoviiRemote.
        • 1.17.2.2. Using OmniRemote.
    • 17. Choose a Cellular Data Plan
      • 1.18.1. Flavors of Cellular Data
      • 1.18.2. Figure Out What Youll Need
      • 1.18.3. Compare the Plans
    • 18. Blog from Your Mobile Phone
      • 1.19.1. SMS Moblogging
      • 1.19.2. Email Moblogging
      • 1.19.3. Photo Moblogging to Any Blog Service
        • 1.19.3.1. Smart client for Flickr.
      • 1.19.4. Hacking the Hack
        • 1.19.4.1. Setting up WordPress.
        • 1.19.4.2. Email posting with WordPress.
        • 1.19.4.3. Setting up email automatic polling.
    • 19. Get Google Maps on Your Mobile Phone
    • 20. Share Your GPS
      • 1.21.1. Connecting the GPS
      • 1.21.2. See Also
    • 21. Broadcast Your GPS Position
      • 1.22.1. See Also
    • 22. Map Wi-Fi Networks with Kismet and GPSd
      • 1.23.1. See Also
  • 2. Network Discovery and Monitoring
    • 2.1. Hacks 2339: Introduction
    • 23. Find All Available Wireless Networks
      • 2.2.1. Windows XP
      • 2.2.2. Mac OS X
      • 2.2.3. Linux
    • 24. Discover Networks with NetStumbler
      • 2.3.1. Options
      • 2.3.2. Network Discovery
      • 2.3.3. Caveats
    • 25. Detect Networks with Handheld PCs
      • 2.4.1. MiniStumbler
      • 2.4.2. WiFiFoFum
      • 2.4.3. Other Handhelds
    • 26. Find and Join Wireless Networks with AP Radar
      • 2.5.1. Prerequisites
      • 2.5.2. Building and Using AP Radar
      • 2.5.3. Final Thoughts
    • 27. Detect Networks on Mac OS X
      • 2.6.1. MacStumbler
      • 2.6.2. iStumbler
      • 2.6.3. Final Thoughts
    • 28. Scan Passively with KisMAC
    • 29. Detect Networks with Kismet
      • 2.8.1. Installation
      • 2.8.2. Running Kismet
      • 2.8.3. Cleaning Up
      • 2.8.4. See Also
    • 30. Monitor Wireless Links in Linux with Wavemon
    • 31. Analyze Traffic with Ethereal
    • 32. Track 802.11 Frames in Ethereal
    • 33. Watch Network Traffic
    • 34. grep Your Network
      • 2.13.1. The Code
      • 2.13.2. Running the Hack
    • 35. Check Wi-Fi Network Performance with Qcheck
    • 36. Estimate Network Performance
    • 37. Get Real-Time Network Stats
    • 38. Graph Your Wireless Performance
    • 39. Find Radio Manufacturers by MAC
      • 2.18.1. The Code
      • 2.18.2. Running the Hack
  • 3. Wireless Security
    • 3.1. Hacks 4051: Introduction
    • 40. Stop Moochers from Stealing Your Wi-Fi Bandwidth
      • 3.2.1. Hacking the Hack
    • 41. Visualize a Network
      • 3.3.1. EtherPEG
      • 3.3.2. DriftNet
    • 42. Secure Your Linux Network with WPA
      • 3.4.1. Requirements
        • 3.4.1.1. Drivers.
        • 3.4.1.2. WPA types.
      • 3.4.2. Installing wpa_supplicant
        • 3.4.2.1. Ubuntu package.
        • 3.4.2.2. Fedora Core 3 compile.
      • 3.4.3. Configuration
      • 3.4.4. Testing and Usage
      • 3.4.5. Running wpa_cli
    • 43. Control Wireless Access by MAC
      • 3.5.1. FreeRADIUS Configuration
      • 3.5.2. Access Point Configuration
    • 44. Authenticate Wireless Users
      • 3.6.1. FreeRADIUS Configuration
      • 3.6.2. Access Point Configuration
    • 45. Forward Ports over SSH
      • 3.7.1. See Also
    • 46. Proxy Web Traffic over SSH
    • 47. Securely Connect Two Networks
      • 3.9.1. vtun Setup
      • 3.9.2. vtun with SSH
      • 3.9.3. Tips and Tricks
    • 48. Generate a Tunnel Configuration Automatically
      • 3.10.1. The Code
    • 49. Poll Wireless Clients
    • 50. Interrogate the Network
    • 51. Track Wireless Users
  • 4. Hardware Hacks
    • 4.1. Hacks 5262: Introduction
    • 52. Add an External Antenna
      • 4.2.1. Patch Antennas
      • 4.2.2. Popsicle Omni Antennas
      • 4.2.3. Rubber Ducky Antennas
    • 53. Do-It-Yourself Access Point Hardware
    • 54. Boot from a Compact Flash Hard Drive
    • 55. Increase the Range of a PowerBook
    • 56. Send Power over Your Ethernet
      • 4.6.1. Step by Step
      • 4.6.2. Resistance Is Futile
    • 57. The NoCat Night Light
    • 58. Upgrade the Linksys WET11
      • 4.8.1. Add an Antenna
      • 4.8.2. Upgrade the Radio
      • 4.8.3. Use a Battery Pack
    • 59. Scan for Wireless Networks Automatically
      • 4.9.1. Requirements
      • 4.9.2. Construction
      • 4.9.3. Software
      • 4.9.4. Hacking the Hack
    • 60. Backlight Your Zipit
      • 4.10.1. Getting It Open
      • 4.10.2. Removing the Mainboard
      • 4.10.3. Opening the LCD
      • 4.10.4. Removing the LCD Reflector
      • 4.10.5. Preparing and Installing the EL Panel
      • 4.10.6. Wiring
      • 4.10.7. The Driver Board
      • 4.10.8. Hacking the Hack
    • 61. Unwire Your Pistol Mouse
      • 4.11.1. Requirements
      • 4.11.2. Disassembly
      • 4.11.3. Wiring
      • 4.11.4. Testing and Debugging
      • 4.11.5. Cutting
      • 4.11.6. Reassembly
      • 4.11.7. Use
    • 62. Mobilize Your WRT54G with the WiFiCar
      • 4.12.1. The Software
      • 4.12.2. The Hardware
  • 5. Software Hacks
    • 5.1. Hacks 6382: Introduction
    • 63. Build Your Own Access Point with Linux
      • 5.2.1. Hardware Choices
      • 5.2.2. Radio Cards and Antennas
      • 5.2.3. Software Requirements
      • 5.2.4. HostAP
        • 5.2.4.1. Ubuntu package install.
        • 5.2.4.2. Compiling from source.
      • 5.2.5. Madwifi
        • 5.2.5.1. Ubuntu package install.
        • 5.2.5.2. Compiling from source.
      • 5.2.6. Configuring Your AP
      • 5.2.7. Hacking the Hack
    • 64. Bridge Your Linux AP
      • 5.3.1. Bridge Setup
      • 5.3.2. Caveats
      • 5.3.3. See Also
    • 65. Protect Your Bridge with a Firewall
    • 66. Filter MAC with HostAP and Madwifi
    • 67. Upgrade Your Wireless Router
      • 5.6.1. Sveasoft Firmware
      • 5.6.2. OpenWRT
      • 5.6.3. Hacking the Hack
    • 68. Set Up an OLSR Mesh Network
      • 5.7.1. Getting the Firmware
      • 5.7.2. Uploading the Firmware
      • 5.7.3. Getting Meshed Up
      • 5.7.4. Rinse and Repeat
      • 5.7.5. Meshing Made Easy
      • 5.7.6. Troubleshooting the Firmware Upload
      • 5.7.7. See Also
    • 69. Extend Your Wireless Network with WDS
      • 5.8.1. WDS Requirements
      • 5.8.2. Linksys Alchemy Setup
      • 5.8.3. HostAP Setup
      • 5.8.4. Hacking the Hack
    • 70. Pebble
    • 71. Wall Off Your Wireless
      • 5.10.1. Installation
      • 5.10.2. Configuration
      • 5.10.3. Using m0n0wall
    • 72. Run Your Mac as an Access Point
    • 73. Run Linux on the Zipit Wireless Messenger
      • 5.12.1. Flashing the Zipit
        • 5.12.1.1. Becoming the man in the middle.
        • 5.12.1.2. Setting up the DNS.
        • 5.12.1.3. Setting up the web server.
      • 5.12.2. zflash OpenZipit over NFS
        • 5.12.2.1. NFS setup.
        • 5.12.2.2. zflash.
      • 5.12.3. Customizing Your Image
        • 5.12.3.1. Modify the default settings.
        • 5.12.3.2. Add useful scripts.
        • 5.12.3.3. Get some tunes going.
      • 5.12.4. Hacking the Hack
      • 5.12.5. See Also
    • 74. Capture Wireless Users with NoCatAuth
    • 75. Capture Wireless Users on a Small Scale
    • 76. Build an Online Community in Your Offline Neighborhood
      • 5.15.1. PlaceSite
      • 5.15.2. The Core Components.
        • 5.15.2.1. The server.
        • 5.15.2.2. The node.
      • 5.15.3. PlaceSite in Action
      • 5.15.4. Setting Up Your Own PlaceSite
      • 5.15.5. Running the Hack
      • 5.15.6. Troubleshooting the Hack
      • 5.15.7. Hacking the Hack
    • 77. Manage Multiple AirPort Base Stations
      • 5.16.1. A Power Tool for Configuration Management
      • 5.16.2. Tweaking Placement of Base Stations
    • 78. Advertise Bonjour Services in Linux
      • 5.17.1. Background
      • 5.17.2. Using Howl
    • 79. Advertise Any Service with Bonjour in Mac OS X
      • 5.18.1. Network Beacon
      • 5.18.2. mod_bonjour
    • 80. Redirect Brought to you by Bonjour Ads
    • 81. Use a Windows-Only Wireless Card in Linux
      • 5.20.1. WLAN DriverLoader
      • 5.20.2. NdisWrapper
      • 5.20.3. Final Thoughts
    • 82. Use Your Orinoco Card with Hermes AP
  • 6. Do-It-Yourself Antennas
    • 6.1. Hacks 8393: Introduction
    • 83. Make a Deep Dish Cylindrical Parabolic Reflector
    • 84. Spider Omni Antenna
    • 85. Pringles Can Waveguide
      • 6.4.1. Front Collector Construction
      • 6.4.2. Preparing the Can
      • 6.4.3. Element Construction
    • 86. Pirouette Can Waveguide
      • 6.5.1. See Also
    • 87. Primestar Dish with Waveguide Feed
      • 6.6.1. Construction
      • 6.6.2. Other Considerations
      • 6.6.3. Hacking in 802.11a
    • 88. Primestar Dish with Biquad Feed
      • 6.7.1. Construction of the Biquad
      • 6.7.2. Biquad Antenna for PCS Cellular Radio
    • 89. Cut a Cable Omni Antenna
      • 6.8.1. Cutting the Pieces
      • 6.8.2. Building a Jig
    • 90. Build a Slotted Waveguide Antenna
      • 6.9.1. How a Waveguide Antenna Works
      • 6.9.2. Unidirectional Waveguide Antennas
      • 6.9.3. Omnidirectional Slotted Waveguide Antennas
      • 6.9.4. Highly Directional Slotted Waveguide Antennas
      • 6.9.5. Construction Details for the 8-Slot Unidirectional Antenna
      • 6.9.6. Coupling the Signal into the Waveguide
      • 6.9.7. 8+8 Slot Omnidirectional Antenna
      • 6.9.8. 8-Slot Unidirectional Antenna
      • 6.9.9. Construction Details for 16- and 16+16-Slot Design
    • 91. The Passive Repeater
      • 6.10.1. Why a Passive Repeater Wont Work
      • 6.10.2. An Example that Almost Works
      • 6.10.3. A Working Example
    • 92. Determine Your Antenna Gain
    • 93. Build Cheap, Effective Roof Mounts
  • 7. Wireless Network Design
    • 7.1. Hacks 94100: Introduction
    • 94. Analyze Elevation Profiles for Better Long-Range Wireless Networking
      • 7.2.1. NoCat Maps
      • 7.2.2. Installing Your Own Profile Analyzer
      • 7.2.3. Getting the Elevation Data
      • 7.2.4. Setting Up the Application
      • 7.2.5. Starting Your Elevation Profiler for the First Time
      • 7.2.6. The Caveats
    • 95. Build a Wireless Network for the Large House
      • 7.3.1. Two Antennas Are Better Than One
      • 7.3.2. Plugging Into Wireless
      • 7.3.3. Hacking the Hack
    • 96. Establish Line of Sight
      • 7.4.1. Using a GPS to Log Prospective LAT/LONG/ALT
      • 7.4.2. Plotting the Points on a 3D Map
    • 97. Calculate the Link Budget
    • 98. Align Antennas at Long Distances
    • 99. Slow Down to Speed Up
    • 100. Take Advantage of Antenna Polarization
  • A. Wireless Standards
    • A.1. 802.11: The Mother of All IEEE Wireless Ethernet
      • A.1.1. Pros
      • A.1.2. Cons
      • A.1.3. Recommendation
    • A.2. 802.11a: The Betamax of the 802.11 Family
      • A.2.1. Pros
      • A.2.2. Cons
      • A.2.3. Recommendation
    • A.3. 802.11b: The De Facto Standard
      • A.3.1. Pros
      • A.3.2. Cons
      • A.3.3. Recommendation
    • A.4. 802.11g: Like 802.11b, only Faster
      • A.4.1. Pros
      • A.4.2. Cons
      • A.4.3. Recommendation
    • A.5. 802.16: WiMAX Long Distance Wireless Infrastructure
      • A.5.1. Pros
      • A.5.2. Cons
      • A.5.3. Recommendation
    • A.6. Bluetooth: Cable Replacement for Devices
      • A.6.1. Pros
      • A.6.2. Cons
      • A.6.3. Recommendation
    • A.7. 900 MHz: Low Speed, Better Coverage
      • A.7.1. Pros
      • A.7.2. Cons
      • A.7.3. Recommendation
    • A.8. CDPD, 1xRTT, and GPRS: Cellular Data Networks
      • A.8.1. CDPD on TDMA
      • A.8.2. 1xRTT on CDMA
      • A.8.3. GPRS on GSM
    • A.9. FRS and GMRS: Super Walkie-Talkies
      • A.9.1. FRS
      • A.9.2. GMRS
      • A.9.3. Extending Range
    • A.10. 802.1x: Port Security for Network Communications
    • A.11. WPA & 802.11i
      • A.11.1. Pros
      • A.11.2. Cons
      • A.11.3. Recommendation
    • A.12. BSS Versus IBSS
  • B. Wireless Hardware Guide
    • B.1. Microwave Cabling
    • B.2. Microwave Connector Reference
    • B.3. Antenna Guide
      • B.3.1. Omni
      • B.3.2. Sector (or Sectoral)
      • B.3.3. Yagi
      • B.3.4. Waveguides and Cantennas
      • B.3.5. Parabolic Dishes
      • B.3.6. Putting It All Together
    • B.4. Pigtails
    • B.5. 802.11 Hardware Suppliers
  • Index
  • About the Authors
  • Colophon
  • Copyright

Dodaj do koszyka Wireless Hacks. Tips & Tools for Building, Extending, and Securing Your Network. 2nd Edition

Code, Publish & WebDesing by CATALIST.com.pl



(c) 2005-2024 CATALIST agencja interaktywna, znaki firmowe należą do wydawnictwa Helion S.A.