Solved

Wireless netork card access?

Posted on 2004-04-25
3
250 Views
Last Modified: 2010-04-11
i want to make my own encryption algorithm, suppose i have made my own program to ecrypt and decrypt text , how can i implement it in my home wireless network.i dont know about it anything. how i access the wireless network card or traffic or packets to use my encrytion program to encrypt traffic? can you people tell about this?
0
Comment
Question by:babur_k
  • 2
3 Comments
 
LVL 2

Accepted Solution

by:
jonpaulr earned 80 total points
ID: 10914867
Well you need an understanding of whats called the TCP/IP OSI model.

making it more difficult for malicious hackers to use one packet to read the entire stream of wireless data

Currently, the standard is called WEP for wireless "secure" (not really though) wireless negotiations.

Ideally, you would create an application (a program) which encodes each packet that is sent via the wireless (or wired) network, making it more difficult for malicious hackers to use one packet to read the entire stream of wireless data.

Get an understanding of the OSI model and your programming idea can be brought to reality.

Good luck,

Jon-Paul
0
 
LVL 2

Expert Comment

by:jonpaulr
ID: 10914870
0
 

Author Comment

by:babur_k
ID: 10920485
well i know about the tcp/ip stack , but i dont know how i access the packet in visual basic.net and how i implement my own algorithm at the packets leve. so that packets with my encryption algorithm will travel in my own network and when they have to go out and reach gateway my encrytion algorithm wrapper will remove and that packets come back into their normal form.but that encrytion algorithm will work in my network so that when i send data from one computer to other the other computer in my network will decode and interpret the packet as normal.
0

Featured Post

VMware Disaster Recovery and Data Protection

In this expert guide, you’ll learn about the components of a Modern Data Center. You will use cases for the value-added capabilities of Veeam®, including combining backup and replication for VMware disaster recovery and using replication for data center migration.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
using BGP Attributes 2 89
Clarification on Network "Usage" for ESXi host. 13 69
Cisco AP to get ip from DHCP 10 77
Port group in esxi 6 79
Messaging apps are amazing tools with the power to do a lot of good, but the truth is the process of collaborating with coworkers requires relationships established through meaningful communication - the kind of communication that only happens face-…
Don’t let your business fall victim to the coming apocalypse – use our Survival Guide for the Fax Apocalypse to identify the risks and signs of zombie fax activities at your business.
Internet Business Fax to Email Made Easy - With  eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question