Monthly Archives: May 2011
May 13th 2011 @5:34pm ( how to detect a wireless intruder )
- Home
- » Internet
- » Wireless Internet & Network Hardware
- » Wireless Internet Routers
- » How to Detect a Wireless Intruder
- Cheap Wireless Broadband
Get High Speed Wireless Broadband Starting At $9/Mo For 24 Months.
- www.FloridaSecurityCompanies.com” class=”title”>Get 4 Quotes for Security
Compare Florida Home Security Quotes: Miami, Tampa, Orlando, more
www.FloridaSecurityCompanies.com” class=”baseurl url”>www.FloridaSecurityCompanies.com
- www.Groupon.com/Naples” class=”title”>Naples Coupons
1 ridiculously huge coupon a day. Like doing Naples at 90% off!
www.Groupon.com/Naples” class=”baseurl url”>www.Groupon.com/Naples
- www.PhoneStealth.com/CellPhoneSpy” class=”title”>Spy on All Cell Phones
Read Text Messages – Cell Phone Spy Undetectable! Great for Parents.
www.PhoneStealth.com/CellPhoneSpy” class=”baseurl url”>www.PhoneStealth.com/CellPhoneSpy
- www.PalisadeSystems.com” class=”title”>Prevent Data Loss
Palisade solutions help protect confidential information.
www.PalisadeSystems.com” clas
s=”baseurl url”>www.PalisadeSystems.com
Related Topics
How to Detect a Wireless Intruder
Modern wireless routers can
be vulnerable to intruders, either intentionally or accidentally. Many
wireless devices automatically seek out and connect to the strongest
signal, so it is possible that a neighbor may be connected to your
router without his realizing it. Intentional intrusions can range from
relatively benign “bandwidth borrowers” to more serious attacks aimed at
theft of identity or personal information. The best defense is strong
and frequently changed passwords on your router, wireless encryption and
monitoring of connected devices.
- Difficulty:
- Moderate
Instructions
things you’ll need:
- Admin password to your router (see manufacturer’s documentation)
- Browser software (e.g. Firefox, Internet Explorer)
-
MAC Address Method
-
1
Determine the Media Access
Controller address of every authorized wireless device on your network.
These devices include printers, laptops, desktops, hand-held devices and any other device which attaches to your network in a wireless mode.Each wireless card or embedded controller in these devices has a
unique address that identifies it to the network. No two legitimate
devices will ever have the same MAC address.Windows and MAC computers have this information in the control panel for your wireless network device. For other devices, check the manufacturer’s instructions for how to locate this address.
The address will be a 12-character field, with each character being a hexadecimal character (0-9 and A-F).
-
2
Log on to your router as an
administrator. Most routers can be addressed by typing 192.168.0.1 into
any browser. Supply the correct administrator user name and password.Check your documentation if you have never changed these from their default values.
-
3
Find the menu option for
attached wireless devices. This will vary depending on the router
manufacturer, so check the user manuals. -
4
Compare the MAC address for each
device listed by the router as being connected with the list of MAC
addresses for devices that you expect to be connected. Any MAC address
for an unexpected device may be an intruder. -
5
Configure your router to only
accept connections from known MAC addresses. Most routers offer this
feature. Check with your user documentation for instructions.
Other Warning Signs
-
1
Be alert for any suspicious activity on your network. Most often you will notice this by a slowdown of your network connection speed.
-
2
Check your router logs for a
record of devices connecting and disconnecting from your network. The
procedure to access these logs is different depending on the router
manufacturer, so check with the user documentation.These logs typically show connections by MAC address, so be aware of any unexpected addresses.
-
3
Install software on your network
to monitor intrusions. More sophisticated intruders may have the
capability to “spoof” MAC addresses, meaning they can set their own MAC
address to appear to be a device which legitimately connects to your
network.
-
1
- Intrusion PreventionWatchGuard.com/Intrusion+Prevention
Intrusion Prevention Appliances. Compare Brands By Price/Performance
- www.Niksun.com” class=”title”>Intrusion Detection (IDS)www.Niksun.com” class=”baseurl url”>www.Niksun.com
Signature & Anomaly-based Intrusion Detection! Fewer false positives.
- www.FrontPointSecurity.com” class=”title”>5-Star Rated Home Alarmswww.FrontPointSecurity.com” class=”baseurl url”>www.FrontPointSecurity.com
Our customers love us! Find out why Safer, smarter, simpler security.
- Wireless Vulnerabilitiesvulnerability.scan.qualys.com
Is your wireless network secure? free Network Vulnerability Scan.
References
Copyright © 1999-2011 Demand Media, Inc.
Use of this web site constitutes acceptance of the eHow Terms of Use and Privacy Policy. en-US
May 13th 2011 @5:28pm ( dave andrews e how to trace a ip address to find a physical address)
http://www.ehow.com/video_4983427_trace-ip-address-physical-address.html
May 13th 2011 @5:18pm ( youspoof.info / detecting a spoof) )
may 13th 2011 @5:16pm ( youspoof.info / types of spoofing)
voice mail is not “pass protected” a Spoofer can access your Voice mail
and even change the greeting incoming callers hear.
May 13th 2011 ( you spoof.info webisite….)
to accounts using caller ID to verify the users identity are an easy
targets for Spoofers. Make sure all your accounts are security pass
code protected.
May 13th 2011 @3:26pm ( contact sheriff/police on information of voice changing solftware..)
So i tried to call the sheriff/police station form my magic jack… the funny thing is that it did not go though for the regular number…it did however go though on an additional number that information gave me .
so this is how it went ….
i called in and spoke with the woman who answers the phone… she didn’t say her name or that the line was recorded or give a badge number.. but when I questioned it .. because every other time i have called i usually have a person who answers the phone say who they are … where i am calling… ( ie department ) and that the phone line was recorded.. and what their badge number is.
i tried to explain what i was calling about and requested officer linquist( who i had just talked with… and she suggested instead i speak with someone form the “it” department so she put me though to officer rodriquez ( it was a woman and i was wondering if it was the same woman who sent me a reply email when i had questions concerning my driver’s license being swiped at a guard gate.
ms. Rodriquez then put me in touch with sonda moore at the help desk and i was given a number for don or john kilpatric. ( 793-9117) who is in charge of computer forensic department where no one answered so i called back and got in touch with deputy finney the communnication supervisor… ( 252-9300 extension 3300)
As of this moment i still have a lot of questions concerning how to prevent/stop anyone from using a computer software program and being able to change their voice on the phone… and as of today… i am wondering why some phone numbers are having problems going through… i also called the Naples bay resort the phone number listed on the website will not work on my magic jack number. HUMMMMMMM
May 13th 2011 @ 3:03pm ( tried to call for additional patrol but magic jack wouldn’t call the sheriff telephone. strange right? )
so as a precaution… and deterrent to make sure that there will be no one able to break into my home… i tried to call the police/sheriff department to request an additional drive by and told them that if anyone was in my home to please arrest them as they will not only be trespassing but also breaking and entering… telephone number of: 239- 774-4434…. i dialed the telephone number it has two busy tones and then hangs up by itself… very strange.. You would think that having any criminal activity.. or needing a phone for an emergency… that the one phone number you should always be able to access… is the POLICE or FIRE Or SHERIFF and any emergency numbers.. along with dispatch for them… and offices for them…. especially in the middle of a work day.. of a work week… This phone situation ….i don’t even know what to say about it… but i wanted to document it in my blog so that i will have record of me not only trying to protect myself.. my home and my possessions but the interference in pursuing that goal… when i called the number that the information form magic jack gave me i received a telephone number of 239-597-1607 and was able to speak with officer Linquest..badge number# 3141. ( he had actually been to my home before…. so i left hm a message and told him i will follow through with a written request through their website he said he will also leave an email message and that i should also try to call again before babysitting. and request again… i know when i met a police officer at the Mobil gas station he was also extremely helpful in helping me put in a request for additional patrols.
I really appreciate all the police and sheriff department have tried to do on my behalf to prevent anyone from entering my home when i am not here.( which is considered breaking and entering… . and from harming not only my life but also protecting my possessions from any further damage…. I also want to thank the neighbors who keep an eye on my place when i leave to make sure that no one breaks in when i go out to work .
May 12th 2011 ( howto protect yourself from fraud due to a person’s altered voice on the phone)
HELP!!!! how do you protect yourself from fraud due to a person’s altered voice on the phone ?
May 12th 2011 @12:05am ( a “how to” site on changing your voice during a call )ru coi
- Home
- » Computers
- » Computer Input Devices
- » Computer Microphones
- » How to Change Your Voice During a Call
How to Change Your Voice During a Call
updated: November 16, 2010
Being able to change one’s
voice is an interesting concept that can be applied in many ways to
personal phone calls, such as playing tricks on friends or sounding much
older or younger than you normally would. With a microphone,
voice-changing software and VoIP (Voice Over Internet Protocol) software for the computer, it’s simple to change one’s voice so that the person on the other line hears a voice that’s not your own.
- Difficulty:
- Moderately Easy
Instructions
-
Voice-changing Software
-
1
Download voice-changing software to your computer (see Resources).
-
2
Install the voice-changing software to your computer by following the onscreen steps provided with the installation program.
-
3
Run the voice-changing software by double-clicking on the newly created shortcut icon on the desktop.
-
4
Configure the program to work
with your microphone by selecting the “In” option to your built-in or
external microphone. In most cases it will already be selected. -
5
Read the instructions or help
file that came with the program. All voice-changing programs are
different but have the same basic controls and, by reading this, you
will familiarize yourself with the program.
Calling Someone
-
1
Download and install VoIP software if you do not already have this software (see Resources).
-
2
Use the VoIP software to call someone by entering the recipient’s user name or phone number, depending on the program.
-
3
Speak into the microphone.
Depending on the voice-changing program you may or may not hear your own
voice, but the person you’re calling will hear the changed voice on the
receiving end. -
4
Change options with the
voice-changing software to your liking by either moving the pitch up or
down or using preset effects. There often will be an option to hear
yourself talk so you can change your voice in real time and hear what it
sounds like.
-
1
- www.voiceshot.com”“>www.voiceshot.com””=””>www.voiceshot.com” class=”title”>IVRwww.voiceshot.com”“>www.voiceshot.com””=””>www.voiceshot.com” class=”baseurl url”>www.voiceshot.com
Automate IVR phone calls with XML. Inbound & outbound. Try it now free
- www.SkillSoft.com”“>www.skillsoft.com””=””>www.SkillSoft.com” class=”title”>Computer Online Trainingwww.SkillSoft.com”“>www.skillsoft.com””=””>www.SkillSoft.com” class=”baseurl url”>www.SkillSoft.com
Training available online anytime. Read “Getting Started” whitepaper.
- www.visionsfreelancedesign.com”“>www.visionsfreelancedesign.com””=””>www.visionsfreelancedesign.com” class=”title”>Freelance Graphic Designwww.visionsfreelancedesign.com”“>www.visionsfreelancedesign.com””=””>www.visionsfreelancedesign.com” class=”baseurl url”>www.visionsfreelancedesign.com
Professional, Affordable & Custom Creatively Designing Your Visions.
- Top 10 Predictive DialersBusiness-Software.com/DialerSoft
2011 Top Predictive Dialer Software Free Buyer’s Guide – Download Now.
Resources
Copyright © 1999-2011 Demand Media, Inc.
Use of this web site constitutes acceptance of the eHow Terms of Use and Privacy Policy. en-US