Category Archives: Wireless Security

How To Get Wireless Internet On a Desktop

Connecting a desktop to the Internet without wires is a very easy process. It can be done in two ways.     1… A USB adapter / dongle can be bought that will connect a desktop to the Internet. 2… A dedicated wireless card can be inserted into the computers to enable Wi-Fi.   By far the easiest… Read More »

Linkstick Wireless USB 2.0 Adapter Overview

    If you own a Samsung device such as a Blue Ray player or Samsung TV then you may have heard of LinkStick.   A LinkStick allows Samsung electronics to connect wirelessly to the Internet or a computer.   For example if you owned a Samsung TV and want it to connect to the Internet, or a… Read More »

Our Picks for Top Wireless Printers For Home Use

Wireless printers come in handy for a variety of reasons not least of all since there are no wires required. A wireless printer can be set up anywhere there is Wi-Fi which makes for a very easy installation.   Also wireless printers can be used from a smartphone or tablet easily. Besides not having to run new CAT5… Read More »

Router Channel 14 The Banned Channel

  Each country in the world controls their own wireless spectrum with most following the same frequency standard.   Some countries however add something’s other countries don’t. When this happens manufactures that sell wireless devices like routers build firmware /software that can be changed from one country to the next.   Channel 14 is one of those things… Read More »

Router Channel Width

  Many routers are now coming with the ability to change the channel width and tweak the setting to get better performance.   What is channel width? Channel width can be thought of like a highway. A four lane highway can handle more cars than a two lane. Of course the bigger the highway means more of a… Read More »

How To Spy On a Cell Phone or Bug a Room

Cell phone spying tools and bugs have been around for awhile now , and used mainly by companies trying to get a edge on each other or private detectives working to get evidence of a cheating spouse.   There is no doubt the many uses of listening in on someone else conversations for any number of reasons. I… Read More »

How To Buy a Secure Wireless Keyboard

  Wireless keyboard hacking has become popular again since Kali has release Nethunter and other tools such as Keysweeper.   These hacks are nothing new and many keyboard manufactures have since 2011 began to encrypt wireless keyboard signals with AES algorithm.   The bad news is many cheap off the shelf keyboards do not encrypt the signal.  … Read More »

Our Picks for Top Penetration Testing Books 2015

Penetration Testing is a field that interest many people, being able to attack a network legally and find vulnerabilities in a network is fun to a select few.   Gaining the knowledge needed to be able to do a Penetration Audit is always a ongoing challenge, with reading and implementing new tactics and ideas.   There is a… Read More »