Search Results

Search found 6176 results on 248 pages for 'wireless encryption'.

Page 40/248 | < Previous Page | 36 37 38 39 40 41 42 43 44 45 46 47  | Next Page >

  • Wireless performance on Ubuntu 9.10

    - by Brian
    Is there something I should do to my networking configuration in Ubuntu to better the performance of my wireless connection? I'm on a netbook dual-booting Windows 7 and Ubuntu 9.10. I pick up much stronger wifi signal when in Windows than Ubuntu. As soon as I boot Ubuntu, it will connect to the network with a stronger signal, and then loses signal very quickly. After it dies, I can't reconnect. I've tested this on a couple of different networks with the same outcome.

    Read the article

  • Wireless Disconnects Randomly, then won't reconnect

    - by Nironan12
    Okay, so I have a Gateway laptop, with Windows Vista SP2, and a Linksys-Cisco WRT54GL Wireless-G Broadband Router. When I boot up my laptop, it automatically connects itself to my home network. Then at random times, it disconnects itself from said network. I go to reconnect it, but I get an unknown error and none of Vista's suggestions are working. Sometimes, after 5-10 minutes, it will reconnect itself. I've already tried updating the firmware. I can't install any other firmware, or make a factory reset. My dad owns the router and buys the internet and he won't let me TOUCH it. I can't do ANYTHING to it.

    Read the article

  • Dell Vostro 1510 can't connect to wireless--how can I fix this?

    - by Miss Spider
    I'm having some trouble with my Dell Vostro 1510. I installed wubi on it two days ago and I've only been able to use the Internet with an ethernet cable. The network seems to definitely recognize that the wireless--even other peoples' wireless--is there, but it can't manage to get on. I'll post the lpsci here, so that you can see the Broadcom card I'm working with. I have downloaded the kernel 2.6.39-0-generic, which doesn't appear to have done a lick of work. 06:00.0 Network controller: Broadcom Corporation BCM4312 802.11b/g LP-PHY (rev 01)

    Read the article

  • trying to set up wireless router, failing

    - by j j
    Hi, I am trying to set up Netgear's wireless-n WNR2000 router, following their oversimplified 5- step process for plugging in wires, and I'm not having any success. It comes down to: once everything is wired and turned on in the correct order, all of the LEDs match the image they give of 'what should be lit up', but their setup disk still doesn't find the router. They have a site to set up the router manually, www.routerlogin.net, which I cannot navigate to, even while wired directly to the router. http://192.168.1.1 doesn't connect to anything, either. The interesting part: i get ping replies from Google's DNS server at 8.8.8.8 while this is set up. but cannot connect to any web site by name, since the router's DNS isn't set up. One thought is that the router and modem both have the same IP address, so it's conflicting, but I'm not sure how I'd resolve that. Any ideas?

    Read the article

  • Sharing Internet over Wireless Router

    - by Alandt
    I have a very strange question today - how do I share my dial up internet (yeah I know you are gonna say that is slow but broadband internet isn't available in my area), so dial up and 3G connection is all I got. I also have a Vodafone USB 3G modem that picks up 3G network, I am planning to use my Vodafone 3G modem in the day since I have free dial up internet from 7:00 pm in the night untill 7am the next morning. Some additional details: * My PC is running Windows XP Professional SP3 * I have a Sitecom Wireless Router 150N X1 WLR- 1000 I would appreciate it if anyone can provide me with a step-by-step guide! Thanks

    Read the article

  • Computer freezes, wireless network icon disappears

    - by Heidi
    As you can see I have two problems. I have a Toshiba Tecra A3 computer. It is 5-6 years old and it is connected to a D-link router. For a period now it has not been working correctly. The computer freezes either when i try turning it on or when I have been using the computer for a short period of time. The times the computer works normally I have a problem with a disappearing wireless network icon, and so I have no internet. Can this be fixed or do I have to buy a new computer? I only use the computer for internet surfing and easy tasks like word etc, so I would like to keep it as long as possible.

    Read the article

  • Wireless Bridge -DHCP

    - by Usta
    I was thinking of picking up a couple of TP-Link wireless routers, and setting them to bridge. I have a sep. LAN network that would have one of them, and I'd put one on my internet connection. Would I be able to keep my current IP subnets? (255.255.255.0 and 255.0.0.0) or would I have to pull my IPs from the same IP range. (I want to keep my current DHCP servers in place) The reason I want a bridge is so that I can VPN into the internal network.

    Read the article

  • Connect a Sitecom WL-174 to another wireless router

    - by Thijs Wouters
    I used to connect via a Sitecom WL-174 directly to ADSL internet. There were some pc's which connected wirelessly and some connected with a wire. Now we got another provider and we need to use the router which came with it. It is also a wireless router. It works perfectly. But I need to connect the other pc's which were connected with a wire previously. Is it possible to connect the Sitecom router wirelessly to the other router? If so, how? Thanks.

    Read the article

  • Blacklist a single access point of a wireless network

    - by Zr40
    At my university, one of the wireless access points is failing. When something tries to associate to the network using that access point, it deassociates the client, claiming 802.1X authentication failure. Other access points do work normally using the same credentials. The issue has been reported, but after a month it still has still not been fixed. Now, I'm looking for a way to blacklist the access point's BSSID, so the OS prefers other access points on the same SSID. How can I blacklist specific BSSIDs in either Mac OS X Snow Leopard or Windows 7?

    Read the article

  • D-link Local wireless

    - by Filippo
    I created a wireless network inside a D-Link DIR-301 connected to a Mac, What I want is that every device to connect to this network if the browser automatically opens instead of the default homepage, it redirects to my website already set in the localhost of the machine which also has the router attached. I'd also like to see that instead of the IP to connect to the site, there will be a "fake" link. What do you advise me? how can I proceed? I state that I am a bit novice in this field, being more a web programmer.

    Read the article

  • Wireless adapter won't enable

    - by user52141
    I bought a d-link dwa-125, plugged it in and windows recognized it right away and said everything was good to go. But there were no connection options. When I open up the network control panel and have it show me the adapters... the wireless adapter is greyed out and says it is disabled. So I tell it to enable. It says is it enabling, then says it is enabled... but the adapter stayed greyed out saying disabled. I am running 7 x64. I have reinstalled drivers, connected it via lan and had it update drivers.. same problem. It works just fine on any other computer in the house, just not this one.

    Read the article

  • Ubuntu 12.04 wireless detected, but can't connect to 128-bit WEP enabled microsoft MS-700 base station

    - by ubuntufan
    I installed Ubuntu 12.04 on a Presario R 3000. The Wireless card was not detected (firmware missing). Based on several related posts, I downloaded and installed the b43 driver and wireless was finally enabled. However, I am unable to connect to my base station successfully. The base station is configured for WEP 128-bit. I tried both infrastructure mode and ad-hoc mode (with the channel, band, etc. configured). Appreciate any help in trying to get past this.

    Read the article

  • Wired and Wireless Network Duplication

    - by Dave
    Howdy! Running into an issue when some of our client's have their laptop's connected via the wired ethernet network aswell as on the WLAN of the same network. There is know issues caused to the end clients.. BUT! Being a Managed Services Engineer i get pretty over the alerts that come through on our reports for machine's with the same hostname on the same network! We are not going to remove this monitoring because it does help a lot with detecting and stopping inferior users and things like that. So basically.. Question is, is there a way in Windows (third party programs welcome) to disable the wireless network when a wired network is connected and operational.. I know that Windows automticaly 'prefers' the wired network, however they are still both connected and therfore there is duplicate hostnames on the same network. Could also have stupid issues with DNS and things like that! Thanks!

    Read the article

  • My wireless network slows down every 7.5 minutes when my desktop is switched on

    - by Dog Ears
    My network has lag spikes lasting for a few seconds every 7.5 mins. The spikes also effect any other computer connected connected to my wirless router at the time. My wife has to connect her laptop via a cable to prevent the lag causing problems when she's VPNing into her work. If I switch my PC off the problem goes away! I've got an Edimax 7728ln 802.11n wireless card and Speedtouch 585v7 (I'm with Be) I've Tried... Updated the drivers from Edimax website: 2.0.3.0 (it does say 3.0.2.0 in devices properties though) WLAN Optimizer doesn't seem to be helping What can I do?

    Read the article

  • Converting AES encryption token code in C# to php

    - by joey
    Hello, I have the following .Net code which takes two inputs. 1) A 128 bit base 64 encoded key and 2) the userid. It outputs the AES encrypted token. I need the php equivalent of the same code, but dont know which corresponding php classes are to be used for RNGCryptoServiceProvider,RijndaelManaged,ICryptoTransform,MemoryStream and CryptoStream. Im stuck so any help regarding this would be really appreciated. using System; using System.Text; using System.IO; using System.Security.Cryptography; class AESToken { [STAThread] static int Main(string[] args) { if (args.Length != 2) { Console.WriteLine("Usage: AESToken key userId\n"); Console.WriteLine("key Specifies 128-bit AES key base64 encoded supplied by MediaNet to the partner"); Console.WriteLine("userId specifies the unique id"); return -1; } string key = args[0]; string userId = args[1]; StringBuilder sb = new StringBuilder(); // This example code uses the magic string “CAMB2B”. The implementer // must use the appropriate magic string for the web services API. sb.Append("CAMB2B"); sb.Append(args[1]); // userId sb.Append('|'); // pipe char sb.Append(System.DateTime.UtcNow.ToString("yyyy-MM-dd HH:mm:ssUTC")); //timestamp Byte[] payload = Encoding.ASCII.GetBytes(sb.ToString()); byte[] salt = new Byte[16]; // 16 bytes of random salt RNGCryptoServiceProvider rng = new RNGCryptoServiceProvider(); rng.GetBytes(salt); // the plaintext is 16 bytes of salt followed by the payload. byte[] plaintext = new byte[salt.Length + payload.Length]; salt.CopyTo(plaintext, 0); payload.CopyTo(plaintext, salt.Length); // the AES cryptor: 128-bit key, 128-bit block size, CBC mode RijndaelManaged cryptor = new RijndaelManaged(); cryptor.KeySize = 128; cryptor.BlockSize = 128; cryptor.Mode = CipherMode.CBC; cryptor.GenerateIV(); cryptor.Key = Convert.FromBase64String(args[0]); // the key byte[] iv = cryptor.IV; // the IV. // do the encryption ICryptoTransform encryptor = cryptor.CreateEncryptor(cryptor.Key, iv); MemoryStream ms = new MemoryStream(); CryptoStream cs = new CryptoStream(ms, encryptor, CryptoStreamMode.Write); cs.Write(plaintext, 0, plaintext.Length); cs.FlushFinalBlock(); byte[] ciphertext = ms.ToArray(); ms.Close(); cs.Close(); // build the token byte[] tokenBytes = new byte[iv.Length + ciphertext.Length]; iv.CopyTo(tokenBytes, 0); ciphertext.CopyTo(tokenBytes, iv.Length); string token = Convert.ToBase64String(tokenBytes); Console.WriteLine(token); return 0; } } Please help. Thank You.

    Read the article

  • CryptoExcercise Encryption/Decryption Problem

    - by venkat
    I am using apples "cryptoexcercise" (Security.Framework) in my application to encrypt and decrypt a data of numeric value. When I give the input 950,128 the values got encrypted, but it is not getting decrypted and exists with the encrypted value only. This happens only with the mentioned numeric values. Could you please check this issue and give the solution to solve this problem? here is my code (void)testAsymmetricEncryptionAndDecryption { uint8_t *plainBuffer; uint8_t *cipherBuffer; uint8_t *decryptedBuffer; const char inputString[] = "950"; int len = strlen(inputString); if (len > BUFFER_SIZE) len = BUFFER_SIZE-1; plainBuffer = (uint8_t *)calloc(BUFFER_SIZE, sizeof(uint8_t)); cipherBuffer = (uint8_t *)calloc(CIPHER_BUFFER_SIZE, sizeof(uint8_t)); decryptedBuffer = (uint8_t *)calloc(BUFFER_SIZE, sizeof(uint8_t)); strncpy( (char *)plainBuffer, inputString, len); NSLog(@"plain text : %s", plainBuffer); [self encryptWithPublicKey:(UInt8 *)plainBuffer cipherBuffer:cipherBuffer]; NSLog(@"encrypted data: %s", cipherBuffer); [self decryptWithPrivateKey:cipherBuffer plainBuffer:decryptedBuffer]; NSLog(@"decrypted data: %s", decryptedBuffer); free(plainBuffer); free(cipherBuffer); free(decryptedBuffer); } (void)encryptWithPublicKey:(uint8_t *)plainBuffer cipherBuffer:(uint8_t *)cipherBuffer { OSStatus status = noErr; size_t plainBufferSize = strlen((char *)plainBuffer); size_t cipherBufferSize = CIPHER_BUFFER_SIZE; NSLog(@"SecKeyGetBlockSize() public = %d", SecKeyGetBlockSize([self getPublicKeyRef])); // Error handling // Encrypt using the public. status = SecKeyEncrypt([self getPublicKeyRef], PADDING, plainBuffer, plainBufferSize, &cipherBuffer[0], &cipherBufferSize ); NSLog(@"encryption result code: %d (size: %d)", status, cipherBufferSize); NSLog(@"encrypted text: %s", cipherBuffer); } (void)decryptWithPrivateKey:(uint8_t *)cipherBuffer plainBuffer:(uint8_t *)plainBuffer { OSStatus status = noErr; size_t cipherBufferSize = strlen((char *)cipherBuffer); NSLog(@"decryptWithPrivateKey: length of buffer: %d", BUFFER_SIZE); NSLog(@"decryptWithPrivateKey: length of input: %d", cipherBufferSize); // DECRYPTION size_t plainBufferSize = BUFFER_SIZE; // Error handling status = SecKeyDecrypt([self getPrivateKeyRef], PADDING, &cipherBuffer[0], cipherBufferSize, &plainBuffer[0], &plainBufferSize ); NSLog(@"decryption result code: %d (size: %d)", status, plainBufferSize); NSLog(@"FINAL decrypted text: %s", plainBuffer); } (SecKeyRef)getPublicKeyRef { OSStatus sanityCheck = noErr; SecKeyRef publicKeyReference = NULL; if (publicKeyRef == NULL) { NSMutableDictionary *queryPublicKey = [[NSMutableDictionary alloc] init]; // Set the public key query dictionary. [queryPublicKey setObject:(id)kSecClassKey forKey:(id)kSecClass]; [queryPublicKey setObject:publicTag forKey:(id)kSecAttrApplicationTag]; [queryPublicKey setObject:(id)kSecAttrKeyTypeRSA forKey:(id)kSecAttrKeyType]; [queryPublicKey setObject:[NSNumber numberWithBool:YES] forKey:(id)kSecReturnRef]; // Get the key. sanityCheck = SecItemCopyMatching((CFDictionaryRef)queryPublicKey, (CFTypeRef *)&publicKeyReference); if (sanityCheck != noErr) { publicKeyReference = NULL; } [queryPublicKey release]; } else { publicKeyReference = publicKeyRef; } return publicKeyReference; } (SecKeyRef)getPrivateKeyRef { OSStatus resultCode = noErr; SecKeyRef privateKeyReference = NULL; if(privateKeyRef == NULL) { NSMutableDictionary * queryPrivateKey = [[NSMutableDictionary alloc] init]; // Set the private key query dictionary. [queryPrivateKey setObject:(id)kSecClassKey forKey:(id)kSecClass]; [queryPrivateKey setObject:privateTag forKey:(id)kSecAttrApplicationTag]; [queryPrivateKey setObject:(id)kSecAttrKeyTypeRSA forKey:(id)kSecAttrKeyType]; [queryPrivateKey setObject:[NSNumber numberWithBool:YES] forKey:(id)kSecReturnRef]; // Get the key. resultCode = SecItemCopyMatching((CFDictionaryRef)queryPrivateKey, (CFTypeRef *)&privateKeyReference); NSLog(@"getPrivateKey: result code: %d", resultCode); if(resultCode != noErr) { privateKeyReference = NULL; } [queryPrivateKey release]; } else { privateKeyReference = privateKeyRef; } return privateKeyReference; }

    Read the article

  • How to completely remove a wireless network setup from vista?

    - by 3d1l
    To remove a wireless connection setup I basically go to (network and sharing center) then select (manage wireless network) and then from the list of wireless networks I right click on the one that I want to remove and select (remove network) from the drop down menu. Problem is that when I go to define the wireless network again the system said that the network connection already exist so it seems that even when the wireless network definition is not longer display in the connections list, Vista keeps the configuration somewhere. So How can I be sure that a particular wireless network has been completely removed?

    Read the article

  • Encrypt remote linux server

    - by Margaret Thorpe
    One of my customers has requested that their web server is encrypted to prevent offline attacks to highly sensitive data contained in a mysql database and also /var/log. I have full root access to the dedicated server at a popular host. I am considering 3 options - FDE - This would be ideal, but with only remote access (no console) I imagine this would be very complex. Xen - installing XEN and moving their server within a XEN virtual machine and encrypting the VM - which seems easier to do remotely. Parition - encrypt the non-static partitions where the sensitive data resides e.g. /var /home etc. What would be the simplist approach that satisfies the requirements?

    Read the article

  • Nesting TrueCrypt File Volumes

    - by Maxim Z.
    Is it possible to nest TrueCrypt file volumes? In other words, if I create a TrueCrypt volume as a file and store it inside another TrueCrypt file volume, will it work? (As for what I'm going to store there, I don't know; I'm just experimenting with TrueCrypt.)

    Read the article

  • Errors generating gpg keypair

    - by Evan Lynch
    I posted this originally on stackoverflow, but was told that it was offtopic and this would be the better place to post it, so I am reposting it here and deleting my original topic. I have a rather old PGP key, but I've long ago lost the private key for it, so I'm trying to generate a new key with GPG on Windows 7. While it technically generates the key, GPA crashes every time I generate the keypair. I've tried this four times now and just downloaded what appears to be the latest version of Gpg4Win and am still receiving this problem. A comment on my original post informed me that GPA crashes is not a very good description of the problem, but unfortunately I can't do much better than that: all it tells me is "gpa.exe has crashed and will close now", I don't get an error dump or anything. Is there anything I can do to fix this, or is this just a bug in the latest version of Gpg4Win? Here are the specs of GPG that I'm using: GPA 0.9.4. GnuPG 2.0.22. My operating system is Windows 7 64 Bit, and I have 5 GB of RAM. Also, I was told to try generating the keypair on the command line but can't find any documentation for how to do this in Windows 7. If anyone could link me to current documentation for this, that would be a good workaround for solving this problem.

    Read the article

  • Security of BitLocker with no PIN from WinPE?

    - by Scott Bussinger
    Say you have a computer with the system drive encrypted by BitLocker and you're not using a PIN so the computer will boot up unattended. What happens if an attacker boots the system up into the Windows Preinstallation Environment? Will they have access to the encrypted drive? Does it change if you have a TPM vs. using only a USB startup key? What I'm trying to determine is whether the TPM / USB startup key is usable without booting from the original operating system. In other words, if you're using a USB startup key and the machine is rebooted normally then the data would still be protected unless an attacker was able to log in. But what if the hacker just boots the server into a Windows Preinstallation Environment with the USB startup key plugged in? Would they then have access to the data? Or would that require the recovery key? Ideally the recovery key would be required when booted like this, but I haven't seen this documented anywhere.

    Read the article

  • How should I troubleshoot a problematic wireless connection on Linux?

    - by Gearoid Murphy
    I recently purchased a netgear 150 usb wireless dongle for use with my 11.10 Xubuntu amd64 system. Using the network-manager interface, I can see local wireless networks and enter the authentication details for my local wireless lan. Unfortunately, the connection does not seem to work, I keep getting notifications that my wireless has disconnected (but none indicating that I've connected). When I examine syslog, it seems to indicate that I've successfully associated with the wireless switch and that dhcp has successfully acquired an ip address but the log shows that the dhcp process keeps sending requests, eventually dropping the connection. 'ifconfig wlan0' never shows the dhcp address logged in syslog. I suspect that the problem lies with the usb dongle, my configuration or the wireless switch but I am not certain how to isolate the problem, can anyone provide some insight on how I should go about homing in on the cause of this problem or verifying the functionality of the individual components, thanks.

    Read the article

  • Is auto-logon on laptop with encrypted hard drive secure?

    - by Tobias Diez
    I have the complete hdd of my laptop encrypted (with the Windows built-in Bitlocker) and thus have to login two times upon booting (Bitlocker and user account). Since I'm the only person using the computer (and knowing the Bitlocker password), I was thinking about automatically login into the user account to make the boot process smoother and quicker. In which cases/scenarios is this a bad idea and the additional login gives a true additionally layer of security?

    Read the article

  • Creating encrypted database for work

    - by Baldur
    My boss posed this problem to me: Encrypted: We need an encrypted database for miscellanious passwords we use at work that are currently only in people's head. Easily accessable: Someone needs to be able to quickly access specific passwords, possibly at hectic moments. This requires any sort of public key management (keeping it on a USB key in a sealed envelope?) to be relatively easy. Access control: The system should have groups of passwords where only specific people have access to specific groups. Recoverability: We need to make sure passwords from one group aren't lost even if the only users with direct access quit or pass away—hence we need some way where (for example) any two members of senior management may override the system (see the treshold link below) and retrieve all the passwords with their key. The first thing that jumped into my mind was some form of threshold and asymmetric cryptography but I don't want to reinvent the wheel, are there any solutions for this? Any software should preferrably be free and open-source.

    Read the article

< Previous Page | 36 37 38 39 40 41 42 43 44 45 46 47  | Next Page >