Monitoring and controlling wifi activity by device.

Is there a relatively simple way to set up monitoring and controls per device on a Time Capsule-based wireless network?  For example, I might want to limit wifi access late at night by my son's iPhone or my daughters e-reader.  Or I might want to disallow internet access during certain periods for certain devices, while still allowing full access to the disk for backups via Time Machine.  I would also like to see a how much and when individual devices are using the network.  Is there an application out there for that sort of thing?

There are some access controls for the TC available.
Just open the airport utility, manual setup, airport, access control, and used timed access.
But that is all that is available.
To get download usage etc is well beyond what the TC can manage.. you will need a wireless router with 3rd party firmware, gargoyle. It will do exactly what you want. That is the only firmware or even software on the market that puts the control into a relatively cheap router.
http://www.gargoyle-router.com/download.php
You can get a TP-Link router for about $70 but the Netgear WNDR3700 at around $120 is a much better router for the job. This has far superior controls cf the apple routers.

Similar Messages

  • Would like to monitor and control a labview application with a hand held device.

    Would like to monitor and control a labview application with a hand held device.
    Would like to use a palm or ipac on a local area network or communicate directly with the PC running windows.

    LabVIEW doesn't run on a hand held device. But, check out these documents:
    Is it Possible to Use Remote Front Panels to Control a LabVIEW VI Remotely Using my PDA?
    "What OS is recommended for LabVIEW to run on a PDA?"

  • Home Monitoring and Control with a third party also monitoring and controllin​g?

    I was wondering if anyone has tried to install Home Monitoring and Control with a third party monitoring, and or controlling the same devices. I know many systems offer multiple control points such as auxilary control touch screens. Has anyone made this work? I have Z wave devices on my home security system (lighting), and would also like to monitor them via Verizon. Possibly also adding some energy monitoring and control, that is not available via my security company. My security monitoring company provide support through Alarm.com, but has limited energy monitoring to thermostat control and such.
    The only interactive control with my security company is for alarm monitoring and control, with limited lighting control. All of my devices are GE in the wall mounted lighting controls, and I would prefer to pay Verizon the few extra dollars for the additional features VIA the web, rather than pay Verizon. There used to be an energy package, that included the main power panel load and I thing Thermostat, but I believe some of the bundles have been split up.
    There are other options out there now, but I have neen exploring. My GE Switches are from the Lowes Iris system. Much less expensive, and can replace existing wall switches, not like the power cord switches. Plus the store is four miles from my house.

    I started with Verizon home monitoring, but if you read through the threads the service is extremely unreliable, still to this day. I am stillusing it, although I am waiting for a refund on the services that I have used since it is so bad but I bought a MiCasaVerde Vera3 system.  You pay appoximately $300 for the unit and there is no monthly charge and you get all the features plus pretty much unlimited types of z wave devices to use on it. I would seriously consider using that before Verizon.

  • Database monitoring and control i

    Hi all,
    I am looking for various options to monitor and control the database.
    Could you provide your thoughts on this.

    You will get more, faster and better responses to your questions when you learn that your questions should contain as much information about your interests as you can provide.
    What you asked about database monitoring is pretty close to posting only question mark in you post. Like this : *?*
    When you are going to car mechanic to ask him for advice about your car, you will not just tell him : I am looking for thoughts on achiving higher HP for my car,tell me ,how to do that? .
    You will obviusly tell him at least what car you have, what model, what year was made and so on. You can apply almost the same logic when asking oracle questions here.
    For zilion reasons , providing at least information about database release you are using is a 'must do' when asking a question.
    Also, your first stop when looking for info about something that is so general as your question here suggests, should be http://tahiti.oracle.com/ , where you could eventually, as in this case , after few more clicks lead yourself to this, and after that enable yourself to ask more specific and concrete question.
    By the way, your forum activity statistics are saying that you are one of those posters which is appearing here with the moto 'ask question-respond never' , and this attitude can discourage many forum members to help you because they prefer two-way communication, which you obviusly don't.

  • I have 3dparty software wirelessly with a cryptographic authentication system without my consent (seems to be new technology developed by stanford) obtaining ownership of my iPhone 4s software and controlling it with remote device to jail break. Now what?

    I have 3rd party software wirelessly injected and used on my iphone with a cryptographic authentication system without my consent (seems to be new technology developed by stanford and apple security is not updated for this technology) obtaining ownership of my iPhone 4s software and controlling it with remote device to jail breaking my phone, adding and removing software, changing settings all from a remotely controled device from different location (I have a Mac address I'd of this device to know for sure). Almost undetectable. When I look at the legal section of my phone it shows a list of all the unauthorized 3rd party software "as is" copyright encrypted on the phone.  This is the most basic way to legally steal software of any kind.  Because of this legalality 3rd party ownership have total control of certain software correlated with hardware use including visualization technology, etc.  most people luckily will never have this happen to them so it's unlikely many readers have not a clue of what I'm saying currently.  Either way, without needing to obtain specific warranty of any kind "as is" copyright control makes system restores not a solution because the source code is not directly encrypted on the actual hardware device only a copy right notice must appear on the specific device 3rd party software validation making it extremely difficult for me to take control of the situation. Apple claims their iOS technology prevents this type copyright obstruction from being possible, however, according to my phone a new form of technology was used developed by Tom wu of Stanford university called the STANFORD SRP AUTHENTICATION TECHNOLOGY which uses Some form of cryptographic authentication system and uses quote "secure remote password" which seems to suceed in hacking iOS apple technology apple claims is not possible to jailbreak an unstolen phone or without the owners consent As well as loading the device with 3rd party copyright Notices to make all of this legalized. My phone shows atleast 30 pages worth of legalized 3rd party copyright permissions! Yesterday my apple care provider labeled me a jailbreaker and refused to look at my legal documented proof which completely blew my mind because it voides my apple care contract I spent 100 on. This employee did not take all factors into consideration and made quick assumptions as well as verbally speaking to me as I'm an automatic criminal. I left the store yesterday with no payed insurance help on a problem I had no control over and couldn't prevent, leaving with voided contracts. This is an apple users worst nightmare and I have spent days researching all of this like i am some kind of lawyer only to be able to use my phone the way it should and spent alot of money on.  I can legally backup any claim I have just wrote above currently and have a large source of data collected to prove apple is wrong in voiding insurance support on this issue. The problem lies in apple avoiding and not wanting to believe their software can legally be obtained ot "hacked". Yet still labeled a jailbreaker basically.. What should I do????? Been to local apple store 3 times and rebooted my phone as well sprint service restore 4 times and spoke with reps twiice on the phone. Spoke with my phone provider who said apple has full control over these matters so they can't help me.  My case is according to apple "still open"...Anyone else heard of this or of Stanford's office of technology licensing? Maybe I need to buy a blackberry again or just use a landline so I can stop being my own lawyer and focus on other productive areas in life instead of this horrible mess. I shouldn't have to prove to apple I not a jailbreaker they should have to prove I'm one before voiding support I desperately need!!

    Mullaly75 wrote:
    I assume u guys don't understand what open source software is
    Yes, I think most of us do understand what open source software is. It sounds as if you don't. Here's some information:
    Open-source software (OSS) is computer software that is available in source code form: the source code and certain other rights normally reserved forcopyright holders are provided under an open-source license that permits users to study, change, improve and at times also to distribute the software.
    Open source software is very often developed in a public, collaborative manner. Open-source software is the most prominent example of open-sourcedevelopment and often compared to (technically defined) user-generated content or (legally defined) open content movements.
    from http://en.wikipedia.org/wiki/Open_source_software
    Yes, Tom Wu of Stanford wrote a paper on something called Secure Remote Access Protocol. It's a form of Asymetric Key Exchange and has nothing to do with hacking anything. It's actually intended to protect data.

  • How to create remote monitor and control webpages using cFP2220

    Hi all,
    I'm fresh user using compact field point. I would like to make cfp2220 as a web server, so other PCs can using IE to monitor and control through web browser.
    Moreover, does the webpages support security? and how to setup?
    Thanks,
    Regards,
    Robert

    Hi Robert,
    You can use LabVIEW Web Services to set up a system like you describe, and there is also information available on how to secure your Web services.
    I hope this is helpful.
    Regards,
    Stephen S.
    National Instruments
    Applications Engineering

  • Monitoring and controlling of Diesel Power Plant Using Labview

    Respected Sir,
    Our Project name is monitoring and controlling of Diesel Power Plant Using Labview7.1.Here we are monitoring and controlling important Diesel engine Parameters and elecrical parameters.Expecting more ideas andsupport from NI

    it s very difficult to manage each and every generators manually in a diesel power plant.we have done an inplant training in a diesel power plant from where we got idea of automating the plant.in tat plant they are using SCADA software.To reduce the complicity of hardare an unnecessary comp languages v r planning to do the same purpose in LabVIEW software as our final year project.As this s our own idea v r not more familiar with the application areas of LabVIEW in a Diesel Power Plant.Plz suggest more advantages of LabView over SCADA in tis field and also welcome innovative ideas from NI to make project simple and more useful

  • TS1398 After I lock my iphone, WiFi Deactive? and my WiFi active after I unlock my phone.

    After I lock my iphone, WiFi Deactive and my WiFi active after I unlock my phone again. After I updated iOS 6 to iOS 6.0.1 the problem happen. How Can I fix the problem?

    There is nothing to fix. The iPhone does this by design. If not connected to power, a short period of time after the iPhone locks, wifi goes to sleep. It has been this way from the very beginning.

  • Monitoring and controlling Internet sharing to individual users

    I am trying to set up a system where I can have my broadband cable go into my mac, and share the connection wirelessly. However I want to also be able to access that mac say by terminal, and create usernames and passwords via a single command preferably, and also set an expiry date where by a network usage log is stored and the account is then deleted, so I can see what network usage has gone on while the account was active, and the dates the account was open for that report. To go one step further, I would also like the system to monitor traffic and if it went over a certain amount for a give day, it would automatically stop sharing the internet with that user for that day. Is there anyway to get OSX to do this? do I need osx server ? Is there third party that will allow this. Nb. Windows is NOT an option...
    Thanks.

    The details of this depends on what kind of router you have, but generally the most secure setup is to only allow specific MAC addresses to use your router.  This can be a pain until you have added all of your devices - and if you have occasional users like friends who drop by it's annoying to have to go into the router and add them.  Still, it's the only sure-fire way to keep everyone else out.  In my router, it's under advanced wireless settings, and the function is called Setup Access List.
    Bill

  • Monitor and control CVI

    Hi,
    is it possible for labwindow 5.5 to create a panel or commandline that can monitor the login system of CVI when view it remotely?
    for example, if i only allow the 1st person who login my page to control my front panel, for the 2nd person and others were only allowed to view the front panel without the permission to control the front panel.
    so can labwindow create this kindof commandline?
    thanks alot =)

    Hello Kenshi,
    Currently there is not way to prevent more than one user to have remote control over your application. LabVIEW allows one client to have control of the application, while other clients can view changes made by the client in control. On the other hand, remote front panel control was implemented in CVI to allow multiple clients to change front panel values at the same time.
    Wendy L
    LabWindows/CVI Developer Newsletter - ni.com/cvinews

  • Monitoring and controlling the Tag values of Logix 5000 using Labview while using RSLogix 5000 to program the PLC

    Hi
      I want to know how to change the input bits or tags of a PLC which is programmed using RSlogix 5000. But I need to use Labview to monitor the input bits ( like in Digitial Input bits) and then be able to change the BITS while the PLC runs and the PLC should be able to detect the change in input bits and act accordingly. The programming is done using ladder logic and its done in RSLogix 5000 and dumped into PLC using RSLogix.
    Thanks in advance

    msu,
    Once you have the OPC server up and running the best way to communicate with is is through the Datalogging and Supervisory Control module for LabVIEW.  The DSC module allows you to bind shared variables to items on your OPC server.  Then you could just read from or write to these shared variables to access the data on this OPC server.  If you don't want to get this module you could also just use datasocket to read/write from an OPC server.  The URL you would use in data socket would look something like "opc://localhost/{your opc item's address}".
    -Justin D

  • Remote Panel server monitoring and control by multiple users

    Hi . . . ..
                  I just did what is in below attached image. . . . Now I have to control as well as monitor the VI file which is in server PC. But If I supposed to use below steps(please refer image), the clients can be control the VI seperately. But the status of each client cannot be monitored by server PC. I used another way that is "Non-reentrant" option... But its provide controlling by queue manner. . . . .
    My question is, is there any possible to control the server VI at a time by all clients. . . .?
    Please guide me for this... I am very much thankful about this. .. .. ..
    Attachments:
    image.png ‏23 KB

    iPhoto has no Cross Platform ability whatever. It's designed with one user on one Mac in mind. It's not the app you want for your set up. Sorry but that's the way it is.

  • Monitoring and controlling internet access for router

    Im kinda confused about what im doing but i have neighbors next door that are bumming off of my internet and i want to be able to deny the access of their computers.  i tried changing the password but it seems that it didnt help, i dont know why or how they got around it but if someone could tell me how i could block their computers from accessing my router it would be greatly appreciated. thanks.

    The details of this depends on what kind of router you have, but generally the most secure setup is to only allow specific MAC addresses to use your router.  This can be a pain until you have added all of your devices - and if you have occasional users like friends who drop by it's annoying to have to go into the router and add them.  Still, it's the only sure-fire way to keep everyone else out.  In my router, it's under advanced wireless settings, and the function is called Setup Access List.
    Bill

  • Monitoring and Controling Incoming Requests for Chat with a Customer Service Agent

    I've reviewed the suggested threads, but I do not see one that captures the essence of my query.
    Bascially, I want to set up a generic Chat ID called "Customer Service".
    Users would open a chat to this ID and ask their question.
    On the backend a monitoring module would look for CHAT available CS Agents, and route the call to the first available.
    IF no one is available the user would recieve a reply that there is X minutes wait and give them the option of waiting or getting a chat back when someone comes available.
    Has anything like this been developed?

    I haven't seen something exactly like that, but it sounds pretty close to IManExpert:
    http://research.microsoft.com/en-us/projects/imanexpert/ 
    That's worth checking out I'd say.
    Please remember, if you see a post that helped you please click "Vote As Helpful" and if it answered your question please click "Mark As Answer".
    SWC Unified Communications

  • Script to tail/monitor and email upon activity...

    Hello all,
    First time poster, medium time user.
    I'm looking to create a script that "watches" /var/log/authlog, and emails a user upon any failed or successful login, for 2 specific account. I've exhausted several options, including simply adding a script to /etc/profile for these accounts' logins, but that won't trap unsuccessful logins. Also, I've tried the following: http://search.cpan.org/~mgrabnar/File-Tail-0.99.3/Tail.pm --- but that won't fly in our environment (management decsion).
    Can somebody please help with some ideas?
    Thanks!
    -Bob

    I think your best bet is to write a routine that can parse the dates in the logfile that you're looking through so that you only look at entries after a specified point in time (or will look x mins back through the log), and so you don't double report on extant instances in the log.
    The perl module Date::EzDate could be of use in the prevention of the reinvention of the wheel on the date parsing :)
    pb

Maybe you are looking for

  • To find and open Crystal Reports using SI_Name & SI_PARENT_FOLDER

    Hi, I have been given the below properties and link, which uses Crystal Reports (I guess its using java integration) http://<portal server>/projectsportal/jsp/collaboration/deliverables/pdf_report.jsp?entity=1&Entity_Type=P&Key_Indicators=Y&LV_FROM_F

  • PDF Problem or is it me !!!!

    In the past I would copy text from a multi-column pdf...(using Preview) • Go to Menu>Tools>Text Tool • all I had to do is option-drag as I select words and/or columns • Then it is then copied to the Clipboard • the Paste command then puts it into you

  • Changing Payment Block

    Hi - Transaction MRBR is executed with Manual Payment Block selected  resulting in a list of  blocked invoices to be released.  When I drilled down into the finance side of one of the documents and changed the payment block to some other value, this

  • No audio playback QT 7.0.4

    I really need help from you wizards... I've just upgraded QT to 7.0.4 and have lost all mp3 audio playback. I was on QT 6.5.2 running under OSX 10.3.9 (refuse to upgrade to Tiger cos of compatibility issues). It also does not playback audio on some v

  • Print to LPD/LPR

    Hi, I'm resurecting something I gave up on 2 years ago - namely how to print using Java. I gather that this is still a weak area, but that it can print OK to LPR printers. I've seen some example code and looked through the API docs but it isn't clear