Latest News And Info-Interesting Info

Purchasing a Wifi Printer

Many manufacturers make a wifi printer, so there will be many options out there. As with any important purchase, shop for the best prices, check reviews online, and ask the salesman for assistance. Most technology stores have knowledgeable sales staff ready and willing to help with the purchase. Look for a printer that boasts connection to 802.11 a/b/g/n or as many as possible. These do not sound very important, but keeping these in mind now allows for network switching and backward compatibility. Also look for printers that are capable of supporting network encryption and security, especially those which have their own security features. There is no such thing as too much security.

Also with any other purchase, make sure to keep quality in mind. It is useless to have a bad printer even though it is wireless. Look for a good printer with quality output and a decent amount of pages estimated per ink cartridge in standard print quality. A photo printer is a good option, as well as an all-in-one printer, allowing for scanning and photo printing. The wireless option is just one of many options, and it is important to check out all the different features and intricacies of the printer before actually making the purchase

Wifi Connection

How to Make a Printer Wifi
Even if the printer being used is a USB connected printer, which most printers were until recently, it can still be shared over a wifi connection.

The printer will still need a host machine to be connected to via USB, but all other connected machines may share it. Make sure all machines are connected to a wifi network. Connect the printer to the host machine via the included USB cable. This host machine will need to stay on for the printer to be accessible through the network. Install any necessary drivers and software to all machines and turn on the printer. Open the "Start" menu or the Apple equivalent and open the printer control panel, named different things depending on the operating system being used. Locate and right-click the icon or name of the desired printer and click the option that allows sharing. A pop-up window should come up with an option to confirm the action. In most Windows applications, users must click on a radio button. Enter a name for the printer in the necessary field. Click "OK" to save settings and enable wireless sharing. Using the name for the printer, other machines connected to the wifi connection should be able to print to the printer through the host device.

Converting a printer to wifi saves time and money where possible and recycles the currently used printer for a longer period of time. These instructions are most applicable for a Windows based operating system, but there is an Apple equivalent that follows similar instructions as computer operating systems are not as different as they seem.

Connecting a wifi printer to a network

The wifi printer has become increasingly popular for offices and for homes as society strives to reduce the cords and cables necessary for technological advancements and computer engineering. As more internet connections become wireless, the popularity will only continue to increase. This will also continue as more and more laptops are sold and replace desktop computers, allowing for more computer mobility like never before.

Connecting a wifi printer to a network will not only allow multiple computers to access the printer, but will allow printing to be done from anywhere in the home. This allows for two advantages: the reduction of necessary cords and cables and the need for only one printer in the home, reducing time used and money spent.

Using a wifi printer takes the hassle out of printing by removing the traditional cords typically used for connection between the printer and the computer. A single computer or multiple computers may connect to a wifi printer within wifi range. In the days where almost every electronic device has wifi built in, it is very likely that most computer users can benefit from having access to a wifi printer.The computer no longer has to be in the same basic vicinity as the printer.

Printing can be done from across the hall in another room, on a separate floor, or in just about every area of an office building to one printer. Most printer manufacturers have printers with wifi options. Some printers also come with bluetooth options as well, as many computers are coming bluetooth capable.This is exceptionally useful in a busy home or office, where there are multiple computers with multiple printing needs.

It is no longer necessary to purchase a printer for each machine when every machine in the building can operate off of the same printer. The most important thing in the entire equation is to make sure that all the necessary computers can locate the device. The network administrator must be sure that the wifi printer is properly installed to the network and that other devices can locate the printer without fail.

Internet Traffic Analysis With Mikrotik Torch

Internet is very slow when you feel used? The first question might be how does the speed of internet connection that I get to feel slow. The next step taken is to measure the speed of internet connection in our place with some of the tools available on the internet. Do not rush to blame the ISP if this incident happened, the first step is a self check on our network. It may seem a simple enough, but it is very important for analyzing the events that exist in our internet network.

How to do it? If we use the network gateway mikrotik then there are tools that have been provided to analyze traffic passing the Torch. Torch is a Real Time Traffic Monitor is used to analyze the flow of passing traffic on an interface (ethernet, wireless, vlan, etc.). On a linux system may be likened to tcpdump. By Using Torch, Menu Tools -> Torch can be analyzed any traffic that passed and how much.

Having identified and analyzed the causes of the problem for subsequent follow-up. Step-by-step analysis as follows:
1. Login Menu Tools -> Torch.
2. Select Interface, in this instance a WLAN (Hotspot Assumption).
3. Select Interface, In this example an ethernet (Network with Cable Assumption.

Setup Mikrotik as Gateway Server

Setup Mikrotik as Gateway Server
MikroTik RouterOS ™, a Linux operating system base is designated as a network router. Designed to provide convenience for its users. Administration can be done through a Windows application (WinBox). Besides the installation can be done on a Standard PC computer. PC that will be used as a router mikrotik did not require substantial resources for the use of standards, for example, only as a gateway. For the purposes of a large load (complex networks, complex routing, etc.) are advised to consider an adequate selection of PC resources.

Facilities on mikrotik are as follows:

* Protokoll routing RIP, OSPF, BGP.
* Statefull firewall
* HotSpot for Plug-and-Play access
* Winbox GUI remote admin

Wireless Weaknesses in Physical Layer

WiFi uses radio waves at frequencies that are public property freely used by
all people with certain restrictions restrictions. Every wifi has a certain coverage area depends
power and antenna used. Not easy to narrow down the area to be reached on the wifi.
This causes a variety of activities made possible place among other activities:
- Interception or tapping
It is very easy to do, and already familiar to hackers. Various tools to
easily obtained on the internet. Various cryptographic techniques can be dismantled by tools such tools.
- Injection
At the time of transmission by radio, made possible due to various weaknesses in the injection
wifi workings where there is no validation process who are connected or who
then disconnect.
- Jamming
Jamming is very possible to occur, either intentionally or unintentionally, because of ignorance
wireless users. Setting the frequency channel usage is mandatory in order
jamming can be minimized. Jamming occurs because the frequency used is quite narrow
so that channel reuse difficult in a dense area wireless networks. S
- Locating Mobile Nodes
With a variety of software, each one capable of performing wireless site survey and get
position information of the location of every Wifi and diverse configurations respectively. This can be done
with simple equipment such as PDAs or laptops with the support of GPS as a position marker.
- Access Control
In building a wireless network design needs in order to separate the node or host
trustworthy and untrustworthy hosts. So it requires a good access control
- Hijacking
The attack MITM (Man In The Middle) that can occur due to various weaknesses in wireless
protocol allowing the hijacking or takeover of communication
is going on and doing theft or modification of information.

Several techniques are used on the Wireless Security LAN

Below are some events and activities undertaken to mengamanan wireless networks:
Hiding the SSID
Many administrators hid Services Set Id (SSID) wireless network with the intention
that they only know the SSID can be connected to their network. This is not correct,
because the SSID is not completely masked. At a certain moment or
especially when the client will connect (associate) or when it will decide itself (deauthentication)
of a wireless network, then the client will still send the SSID in plain text
(Although the use of encryption), so if we intend to tap, can be easily
find information. Some tools that can be used to get the ssid
dihidden among others, kismet (kisMAC), ssid_jack (airjack), aircrack,
void11 ​​and much more.
Wireless security with WEP key only
WEP is a security standard & first encryption used on wireless, WEP has
many weaknesses, among others:
● A key problem is weak, the RC4 algorithm used can be solved.
● WEP uses static keys
● Problem initialization vector (IV) WEP
● Problem message integrity Cyclic Redundancy Check (CRC32)
WEP consists of two levels, namely 64 bit key, and 128 bits. Actually, the secret key in the lock
WEP 64 bit only 40 bit, 24bit is an Initialization Vector (IV). Similarly, the key
128-bit WEP 104bit secret key consists of. Seranganserangan
the weaknesses of WEP are:
1. The attack on the weaknesses of the initialization vector (IV), often called the FMS attack. FMS stands for
The third name the inventor of the IV weaknesses Fluhrer, Mantin, and Shamir. This attack
done by collecting a weak sebanyakbanyaknya IV.
The more IV
obtained weak, the sooner discovered the key that is used
(Www.drizzle.com/ ~ aboba/IEEE/rc4_ksaproc.pdf)
2. Obtain a unique IV data obtained through the packet to be processed for the
cracking the WEP key more quickly. This method is called chopping attack, the first time
found by h1kari. This technique only requires a unique IV, thereby reducing
IV needs of the weak in WEP cracking.
3. Both of the above attacks require considerable time and packet, to shorten the time,
hackers usually do traffic injection. Traffic Injection is often done
by collecting the ARP packet and then sends back to the access point. It is
vector resulted in an initial collection easier and faster. Unlike the attack
The first and second, to attack traffic injection, required specification of tools and applications
that start rarely encountered in tokotoko,
ranging from chipsets, firmware version, and versions
drivers, and not infrequently have to do the patching of drivers and applications.
MAC Filtering
Almost every wireless access point or router MAC filtering is facilitated by the security. It is
actually not much help in securing wireless communications, because the MAC address
very easy dispoofing or even altered. Tools ifconfig in OS Linux / Unix or a variety of tools such as
network utility, regedit, SMAC, machange on windows OS easily be used for spoofing
or change the MAC address.
I still often find wifi in the office and even the ISP (which is usually used by
warnetwarnet)
which only use MAC filtering protection. By using the application
wardriving like kismet / aircrack kisMAC or tools, we can obtain the MAC address of each client information
which is connected to an Access Point. After getting this information, we can
connected to the Access point to change the MAC in accordance with this client. In wireless networks,
MAC address duplication does not result in conflict. It only takes a different IP to client
the earlier.
Captive Portals
Captive Portal infrastructure originally designed for the purposes of community that enables all
people can connect (open network). Captive portal is actually a router or gateway machine
which does not protect or allow the traffic to the user registration / authentication.

Reaping Benefits with Wi-Fi

Wireless Connection is now increasingly be needed. Various devices share of fans scrambling technology without cable connection. The principle is: practical, but still Digdaya.

One wireless technology that is now loved the Wi-Fi (wireless fidelity)-connections that could divide the high-speed Internet access without the mediation of the cable.

This wireless connection has just brought a projector manufacturer InFocus complementary capabilities newest products. With the addition of M1-DA port and M1-D on the projector that can be connected with Wi-Fi adapter called Infocus LiteShow, the projector can be connected with various devices wirelessly.

Deliver presentations from a computer, laptop, PDA, or any other handheld tools that enabled Wi-Fi becomes easier. Users do not have to bother with cable ropes as Wi-Fi coverage radius of 100 meters.

Wi-Fi is a technology that emits a radio signal with an Internet connection up to a certain radius. If this tiny device attached to the modem with a wide banded connections, all computers and devices that have Wi-Fi receiver in the vicinity would be splashed Internet access.

No matter the modem was in the office next door, room door, or the house across the street. Also, no matter whether the owner of the modem that allows its Internet access enjoyed by others without permission. This is a sophisticated method based on the idea of ​​intelligent wild.

Behold: the technology standard 802.11b, aka Wi-Fi using the 2.4 GHz spectrum is capable of transmitting signals as strong as 11 megabits per second (Mbps). Not to mention the presence of two new standards, 802.11a and 802.11g, the more inviting admiration.

802.11a technology, which uses the 5 GHz spectrum, enabling transmission of up to 54 Mbps. While 802.11g, which only uses 2.4 GHz spectrum, capable of transferring data up to two-fold, 22 Mbps.

Therefore, in coffeehouses, restaurants, or airport lounges, you do not have to look for a phone connection just to get Internet access on your laptop.

With this technology, you do not need to be busy heaved a deep cord. Including when to use a projector for presentations, Wi-Fi can be a very kind-hearted gods.

Network Computer with Wifi (Wireless Fidelity) / WLAN

Imagine if we were asked to perform computer network design in the office, campus or building a separate room with each other, and each room is already in use with furniture that can not be contested. Of course we will be thinking how to perform the complicated wiring installation in the room. However, it is not too complicated if we do the design using a wireless or WiFi network instead of cable. Certainly the use of Wifi networks contain consequences, including on each client computer must also be installed wifi devices. But all does not matter if it's an option. This paper will discuss the simple design of computer-based wifi network instead of wiring systems.



Wireless devices can work in several modes, among others:

1. AP mode (access point), this mode is often called multipoint. one wireless device can be accessed by many wireless devices.
2 Mode client, a client of the AP mode
3. Bridge mode, used for point to point two wireless devices. Usually used to reach wireless devices attached to long distances. In this mode if the network is very complex will result in an increased traffick broadcast.

On this occasion we will discuss the AP and client mode for the implementation of a computer with a wireless network (WLAN). Scheme are:

<-----> <-------> Internet Router Wireless Access Point Wireless <-------> PC Client With Client

Let us begin to mask the technical steps to setup a Wireless Access Point. In this example use Wireless AP / Client with Senao brand. For other brands pretty much the same process.

1. Prepare equipment including Wireless Radio, make sure all the complete adapter, crossover cable and others.
2. Configuring a PC with an IP address on the 192.168.1.0/24 network, do not use ip 192 .168.0.1 because this ip default Senao.
3.Browse http://192.168.1.1 via web browser, enter the username: admin, password blank.

Schedule Task di Mikrotik

Schedule task in mikrotik script actually just runs the process automatically performed and scheduled at certain times. The script itself is also a command that is in mikrotik. The following examples assume we will break the internet connection at the office is closed (eg 16:00 Hours) and will connect again when the office is open (eg 08.00). This is done to avoid misuse of the Internet connection when away from the office administrator in a way that tida less noticeable.

There are many ways exactly can be done for the case above, among others:
1. Turn off the router by unplugging the power supply, less smooth way and look adminnya stingy: D.
2. Shutdown with shutdown script, this way requires every morning turn on the router.
3. Jalakan script to Disable Internet interface and Mengenable kembali.Cara will not be discussed first, because it does not have the discussion again.
The second way the steps are as follows:
- From the menu System -> Scripts, then emerged Windows Script List
- Click the + sign, emerging new windows script
- Fill in the name of the script eg shut, fill in the source / system shutdon. Click Apply and then Ok
- To perform the test, select the script shut and then click Run Script
- Turn the router .- It is time now to do the scheduling to execute this script.
- From the main menu click system -> the scheduler, will appear the windows scheduler
- Click the + sign, fill in the name eg shut, Start date Jun/30/2007 example, fill time 16:00:00 dikehendaki.Interval or any other time is the time interval
the script will run. For example will run every hour 16.00, mean 24-hour intervals. Fill 24:00:00:00
- Fill the event on the desired script name in this case is the script shut.Klik Ok. Just waiting for the script will run at the Third ditentukan.Cara
- Eg ethernet connected to the internet is ether1
- System -> script -> Click + -> name = die source = / disable the ethernet interface ether1 -> Click Ok
- Click the + again -> name = live sorce = / interface ethernet enable ether1 -> Click OK.
- Select masing2 script then Run Script, if you want to do the testing.
- Time to make the schedule
- Sytem -> Scheduler -> Click the + sign, name = die, eg date jun/30/2007 16:00:00 hours, every 24-hour intervals fill 24:00:00:00 or in accordance with the desired, filled Event On script to die.
- Schedule For the same pace of life, just diebedakan On event filled life and time, eg 24 08:00:00 jam.Selamat interval also try hopefully not confused.

Network Computer with Wifi (Wireless Fidelity) / WLAN

Imagine if we were asked to perform computer network design in the office, campus or building a separate room with each other, and each room is already in use with furniture that can not be contested. Of course we will be thinking how to perform the complicated wiring installation in the room. However, it is not too complicated if we do the design using a wireless or WiFi network instead of cable. Certainly the use of Wifi networks contain consequences, including on each client computer must also be installed wifi devices. But all does not matter if it's an option. This paper will discuss the simple design of computer-based wifi network instead of wiring systems.



Wireless devices can work in several modes, among others:

1. AP mode (access point), this mode is often called multipoint. one wireless device can be accessed by many wireless devices.
2 Mode client, a client of the AP mode
3. Bridge mode, used for point to point two wireless devices. Usually used to reach wireless devices attached to long distances. In this mode if the network is very complex will result in an increased traffick broadcast.

On this occasion we will discuss the AP and client mode for the implementation of a computer with a wireless network (WLAN). Scheme are:

<-----> <-------> Internet Router Wireless Access Point Wireless <-------> PC Client With Client

Let us begin to mask the technical steps to setup a Wireless Access Point. In this example use Wireless AP / Client with Senao brand. For other brands pretty much the same process.

1. Prepare equipment including Wireless Radio, make sure all the complete adapter, crossover cable and others.
2. Configuring a PC with an IP address on the 192.168.1.0/24 network, do not use ip 192 .168.0.1 because this ip default Senao.
3.Browse http://192.168.1.1 via web browser, enter the username: admin, password blank.

Reaping Benefits with Wi-Fi

Wireless Connection is now increasingly be needed. Various devices share of fans scrambling technology without cable connection. The principle is: practical, but still Digdaya.

One wireless technology that is now loved the Wi-Fi (wireless fidelity)-connections that could divide the high-speed Internet access without the mediation of the cable.

This wireless connection has just brought a projector manufacturer InFocus complementary capabilities newest products. With the addition of M1-DA port and M1-D on the projector that can be connected with Wi-Fi adapter called Infocus LiteShow, the projector can be connected with various devices wirelessly.

Deliver presentations from a computer, laptop, PDA, or any other handheld tools that enabled Wi-Fi becomes easier. Users do not have to bother with cable ropes as Wi-Fi coverage radius of 100 meters.

Wi-Fi is a technology that emits a radio signal with an Internet connection up to a certain radius. If this tiny device attached to the modem with a wide banded connections, all computers and devices that have Wi-Fi receiver in the vicinity would be splashed Internet access.

No matter the modem was in the office next door, room door, or the house across the street. Also, no matter whether the owner of the modem that allows its Internet access enjoyed by others without permission. This is a sophisticated method based on the idea of ​​intelligent wild.

Behold: the technology standard 802.11b, aka Wi-Fi using the 2.4 GHz spectrum is capable of transmitting signals as strong as 11 megabits per second (Mbps). Not to mention the presence of two new standards, 802.11a and 802.11g, the more inviting admiration.

802.11a technology, which uses the 5 GHz spectrum, enabling transmission of up to 54 Mbps. While 802.11g, which only uses 2.4 GHz spectrum, capable of transferring data up to two-fold, 22 Mbps.

Therefore, in coffeehouses, restaurants, or airport lounges, you do not have to look for a phone connection just to get Internet access on your laptop.

With this technology, you do not need to be busy heaved a deep cord. Including when to use a projector for presentations, Wi-Fi can be a very kind-hearted gods.

Internet Benefit

The benefits of the internet that how can we get from these technological advances. The benefits of today's Internet seem increasingly play an important and very wide-ranging. When in about 10 years ago, the benefits of the Internet is more widely used by offices and business circles, is now arguably the Internet becomes mandatory for various community groups and the majority of young people terutama.Juga Internet access is now much easier in the can with a lot of bertebarannya cafe, many schools provide facilities and provide lessons about the internet world. Technological sophistication also smartphones, gadgets and internet access from rumahpun now be obtained easily and with relatively low cost. Internet as if such a door, that when we passed it, would stretch all sorts of things from around the world. Not limited to limitations of the eye could see, the internet offers to us to be able to travel the world without having to move from place to sit in front of the monitor screen. As if the Internet world without boundaries of space and distance. Through the internet we can get a lot of the latest information about various things. Met via the Internet with people from different parts of the world, sharing, talking, exchanging ideas, exchanging knowledge and will certainly benefit a lot more we can get the internet.The benefits are felt more and more internet for the users who can not escape from this internet world. Such as the internet marketing, blogger, bloggers, and online stores also now increasingly haveplace in the eyes of consumers who are looking for specific items. Consumers do not have to bother anymore to obtain an item. Can simply find additional information about the desired items at once or even ordering, paying and completing all transactions, and then just waiting for the goods delivered correspond to come we ask for the address.Can it be trusted, or is not afraid of the risk to be lied to when ordering goods over the internet? Of course, all possibilities can happen, let alone in the virtual world (read: internet), in the real world that also looks real goods, the seller and buyer can still occur even if these risks. Like most everything else in the world, the Internet also have two sidesdifferent. Black and white, good and bad, benefit and harm, positive and negative. Then exactly what benefits the internet that we can take, especially for young people. We start from the negative impact first.