Solved

Wireless netork card access?

Posted on 2004-04-25
3
235 Views
Last Modified: 2010-04-11
i want to make my own encryption algorithm, suppose i have made my own program to ecrypt and decrypt text , how can i implement it in my home wireless network.i dont know about it anything. how i access the wireless network card or traffic or packets to use my encrytion program to encrypt traffic? can you people tell about this?
0
Comment
Question by:babur_k
  • 2
3 Comments
 
LVL 2

Accepted Solution

by:
jonpaulr earned 80 total points
ID: 10914867
Well you need an understanding of whats called the TCP/IP OSI model.

making it more difficult for malicious hackers to use one packet to read the entire stream of wireless data

Currently, the standard is called WEP for wireless "secure" (not really though) wireless negotiations.

Ideally, you would create an application (a program) which encodes each packet that is sent via the wireless (or wired) network, making it more difficult for malicious hackers to use one packet to read the entire stream of wireless data.

Get an understanding of the OSI model and your programming idea can be brought to reality.

Good luck,

Jon-Paul
0
 
LVL 2

Expert Comment

by:jonpaulr
ID: 10914870
0
 

Author Comment

by:babur_k
ID: 10920485
well i know about the tcp/ip stack , but i dont know how i access the packet in visual basic.net and how i implement my own algorithm at the packets leve. so that packets with my encryption algorithm will travel in my own network and when they have to go out and reach gateway my encrytion algorithm wrapper will remove and that packets come back into their normal form.but that encrytion algorithm will work in my network so that when i send data from one computer to other the other computer in my network will decode and interpret the packet as normal.
0

Featured Post

Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
What's the problem with my DSL? 4 55
Network Switches Keep Failing 8 65
Adding switches as opposed to running cables 4 88
No RSTP between switches 3 45
For many of us, the  holiday season kindles the natural urge to give back to our friends, family members and communities. While it's easy for friends to notice the impact of such deeds, understanding the contributions of businesses and enterprises i…
Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
Internet Business Fax to Email Made Easy - With eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

932 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now