Solved

Wireless netork card access?

Posted on 2004-04-25
3
223 Views
Last Modified: 2010-04-11
i want to make my own encryption algorithm, suppose i have made my own program to ecrypt and decrypt text , how can i implement it in my home wireless network.i dont know about it anything. how i access the wireless network card or traffic or packets to use my encrytion program to encrypt traffic? can you people tell about this?
0
Comment
Question by:babur_k
  • 2
3 Comments
 
LVL 2

Accepted Solution

by:
jonpaulr earned 80 total points
Comment Utility
Well you need an understanding of whats called the TCP/IP OSI model.

making it more difficult for malicious hackers to use one packet to read the entire stream of wireless data

Currently, the standard is called WEP for wireless "secure" (not really though) wireless negotiations.

Ideally, you would create an application (a program) which encodes each packet that is sent via the wireless (or wired) network, making it more difficult for malicious hackers to use one packet to read the entire stream of wireless data.

Get an understanding of the OSI model and your programming idea can be brought to reality.

Good luck,

Jon-Paul
0
 
LVL 2

Expert Comment

by:jonpaulr
Comment Utility
0
 

Author Comment

by:babur_k
Comment Utility
well i know about the tcp/ip stack , but i dont know how i access the packet in visual basic.net and how i implement my own algorithm at the packets leve. so that packets with my encryption algorithm will travel in my own network and when they have to go out and reach gateway my encrytion algorithm wrapper will remove and that packets come back into their normal form.but that encrytion algorithm will work in my network so that when i send data from one computer to other the other computer in my network will decode and interpret the packet as normal.
0

Featured Post

6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

Join & Write a Comment

Suggested Solutions

Moving your enterprise fax infrastructure from in-house fax machines and servers to the cloud makes sense — from both an efficiency and productivity standpoint. But does migrating to a cloud fax solution mean you will no longer be able to send or re…
Messaging apps are amazing tools with the power to do a lot of good, but the truth is the process of collaborating with coworkers requires relationships established through meaningful communication - the kind of communication that only happens face-…
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Internet Business Fax to Email Made Easy - With eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now