Your Ad Here

Saturday, October 3, 2009

WiFi Hopper 1.2.2008.021700


WiFi Hopper 1.2.2008.021700 | 4,89 MB
WiFi Hopper is a WLAN utility that combines the features of a Network Discovery and Site Survey tool with a Connection Manager.

Sporting a comprehensive arsenal of network details, filters, RSSI graphing and built-in GPS support, WiFi Hopper is invaluable for identification and advanced characterization of neighboring wireless devices.

Additionally, WiFi Hopper can connect to unsecured, WEP, WPA-PSK and WPA2-PSK networks directly from within the application. With editable network profiles and dedicated Connection Manager execution mode, WiFi Hopper can be used as a significantly more transparent replacement for Windows and manufacturer-provided wireless clients.

WiFi Hopper encompasses a feature set aimed for a wide variety of audiences including Wireless Network Administrators, Security Professionals, Programmers, QA Engineers and Power Users.

Following is a quick tour to the main components of WiFi Hopper. Be sure to check out the Features page for a complete picture of the extensive feature set!

Network Discovery and Site Survey

WiFi Hopper can display details like SSID, network mode, encryption type, RSSI, frequency and channel amongst numerous others for a complete picture of the environment.

It's easy to filter out classes of networks by using the network filters. Additionally, a GPS device can be used for reviewing the approximate locations of the detected access points.

With a combination of other features like signal graphing, WiFi Hopper can also be used for additional tasks like detecting channel congestion.

More Transparent Connection Manager

Compared to the Windows provided and manufacturer supplied connection managers, WiFi Hopper is significantly more transparent.

With its network profile support, WiFi Hopper can remember your networks so that it can automatically connect to them as they become available.

Finally, WiFi Hopper also supports a 'Network Hopping' mode in which it automatically connects to open networks in the area.

Security, Auditing and Testing

WiFi Hopper can be used to track unsecured wireless networks that may be compromising network security. Additionally, WiFi Hopper makes it easy to look to unauthorized access points involved in an attack or simply causing interference.

For programmers and QA engineers, WiFi Hopper is the ideal, Windows-NDIS based, testing tool. With WiFi Hoppers connectivity features, functionality of WLAN drivers and hardware can be independently verified.


Rapidshare.com
Mirror
Megaupload.com

No comments:

Post a Comment

Your Ad Here

Disclaimer

This site does not infringe any Copyrights. It only lists through Freedom of Information Act what is listed on Search Engines.All files are found using legitimate search engine techniques. This site does not and will not condone hacking into sites to create the links it list. We will and do assume that all links found on the search engines we use are obtained in a legal manner and the webmasters are aware of the links listed on the search engines. If you find a URL that belongs to you, and you did not realize that it was "open to the public", please email on to notify the blogmaster of your request to remove it. This is not an invitation for webblog haters to spam with requests to remove content they feel that is objectionable and or unacceptable. Proof of URL ownership is required. None of the files shown here are hosted by this server. I do not upload any file , links are provided by users of this site and other websites. If you do not have enough rights to download them please don't download.

User Agreement

The creator of THIS PAGE or the ISP(s) hosting any content on this site take NO responsibility for the way you use the information provided on this site. These Ebooks here are for educational purposes only and SHOULD BE VIEWED ONLY. If you download any files to view them, you are agreeing to delete them within a 24 hour period. If you are affiliated with any government, or ANTI-Piracy group or any other related group or were formally a worker of one you CANNOT enter this web site, cannot access any of its files and you cannot view any of the HTML files. All the objects on this site are PRIVATE property and are meant for previewing only. If you enter this site without following these agreements you are not agreeing to these terms and you are violating code 431.322.12 of the Internet Privacy Act signed by Bill Clinton in 1995 and that means that you CANNOT threaten our ISP(s) or any person(s) or company storing these files, cannot prosecute any person(s) affiliated with this page which includes family, friends or individuals who run or enter this web site. IF YOU DO NOT AGREE TO THESE TERMS THEN LEAVE.