Secured and Unsecured connection question

I was dealing with a customer when she asked me a question about her wrt54g wireless router. She said that when she goes into view available wireless networks it shows one network, Secured. And the same network name, unsecured. They are both her name (she has an obscure name so i doubt anyone in the area named their network the same).
My question is, how do you disable the unsecured network? I would assume it's a profile in the router (windows only has her secured network listed in the profiles).

The router can only generate one wireless network, so the "extra network" is not coming from the router.
On some systems, the wireless adapter software will show two entries for your own wireless network if "SSID Broadcast" is set to "disabled".  One entry is the wireless network without its SSID, and it will be shown correctly as either being encrypted or unencrypted.  The second entry is the same wireless network with its SSID, and it too will be shown correctly as either being encrypted or unencrypted.  This is not exactly what you described, but may be the cause for the confusion.
Another possibility is that the unencrypted network is somehow poping up from her list of "preferred networks", and that it got into that list before she encrypted the network.  In this case, either "Refresh" the list of available networks, or delete the listing for the unencrypted network from the list of "preferred networks".
Another possibility is this:  Someone else in her household has their wireless card set to "Ad-hoc" mode, and it is generating the unencrypted network.  (Yes, this does happen! )
Another possibility is this:  Someone in the neighborhood has copied her SSID.  In this case, change the SSID, disable SSID broadcast, and encrypt the network with a strong password.
If it is none of the above, then download and install the latest driver for the wireless card.
Message Edited by toomanydonuts on 04-17-200703:38 PM
Message Edited by toomanydonuts on 04-17-200703:39 PM
Message Edited by toomanydonuts on 04-17-200703:41 PM

Similar Messages

  • Secured and unsecured agent In GRID

    Dear ALL,
    Is their any query to find secured and unsecured agent from gird database?
    Thanks

    Hi,
    Beat me to it - but here is some sql to make it simple.
    select target_name,
    case
    when substr(emd_url, 1, 5) = 'https' then
    'TRUE'
    else
    'FALSE'
    end secure_upload
    from mgmt$target
    where target_type = 'oracle_emd'
    Cheers,
    Harry

  • SJSAS 8.2 secure and unsecure methods in one web service with ws-security

    Hi
    I'm trying to deploy a web-service (using SJSAS 8.2) using JAXRPC using message security (at the application level).
    I have one simple question:
    I have an EJB that exposes 2 methods as web-services, I specified in the sun-ejb-jar.xml that one of those methods is secure (and said nothing about the other) however when i run my test client I get a "WSS0202: No wsse:Security element in the message" error for both calls (instead of only for the secure call).
    Is this normal? Isn't it possible to have a normal (with no security headers) call to one method and another (with security headers and secure envelope) to another in the same webservice (from the same EJB)?.

    I wasn't clear?
    This is a big dev problem for a major Sun client.
    No one knows or wants to answer?

  • Bit of a strange question regarding security and internet connection

    This is a bit of an odd question so bear with me for a moment.
    I sold my old G4 to someone I didn't know yesterday. While he was looking at it to make sure it was working I allowed him to plug my ethernet cable in (connected to both a netgear router and a cable modem) and go online to install an application on the computer he was buying. It did't take long and I didn't actually see what he installed but after he left and I plugged back in to my mac pro, my internet connection started suffering. It started by being very slow and then timing out with servers. I reset the modem and even bypassed the router but the connection did not improve and eventually I could only get a self assigned IP address with no internet, although the modem appeared to be fine.
    Aside from finding my I.P. address at my location, is there anything else he could have compomised security wise, either in the name of harvesting some kind of info or just creating a problem in the cable network when I let him use my connection on the g4?
    I think that most likely I'm being a little paranoid but the timing of this is a bit strange. It literally went down hill just after he left.
    Today the cable company is reporting a wider internet outage than just me but I just though I'd throw it out there to see if there are any security wholes exploitable when someone uses your internet connection (I would think and hope that there are not).
    thanks a bunch

    Well, in the closing the stable door approach it is a good idea to do a complete erase and install when selling any computer. There's lots of references to this and even one about removing a certain file so when they start up they get the brand new Mac greeting window. If you do not erase the drive using the secure erase feature in Disk Utility then with an $80 investment plus an empty spare drive the purchaser can likely recover any files you had on the computer recently if they consider it worth the effort.
    I suspect the internet issue is not related to this, especially since your ISP commented about problems.

  • IPhone/Edge security and available space question

    2 questions here:
    1) Is it 'safe' to access sites like online banking or enter credit card information using the iphone/edge, or is it not really secure? As a side-question, is it more or less secure to do the same using iphone/wifi?
    2) I have about 45MB free on my iphone (according to itunes). Does this number include ALL space on the iphone (meaning if I fill that up, it won't have any room to cache data/download email, etc..) or does it have a portion of the drive partitioned off for its own uses? Should I be worrying about keeping some free space or will it do it on its own?

    1. Safe is a relative term. If someone is snooping they may intercept your transmission. Same thing with WiFi. When you connect to banking sites, you are establishing secure connections, and some have better security than others. But even with a hard connection, someone can have a sniffer hooked up to a port somewhere down the line and intercept your transmission. Bottom line - I connect to these sites and dont worry about it too much.
    2. 45MB??? Where did all your space go??? There is a space allotted for the system, but as an old-schooler I have never "used up" all my storage - it tends to cause problems. I am pretty sure the system will alert you if you fill up beyond capacity or if you will hinder its operation. It a pretty smart phone. I would not fill it to capacity though. Its just an old habit I have.

  • Jampack and keyboard connection questions

    2 questions:
    1. I have just bought GB Jampack (the one with lots of extra loops), but can't seem to notice any difference. How do I know that the disc has downloaded OK? Can't remember how many loops were there in the first place!
    2. I'm trying to connect an Roland SK-50 Soundcanvas keyboard. Do I need some sort of interface or drivers before it will work?
    Very basic questions, I know, but hey, that's what this discussion group is for isn't it?!
    Regards
    Mark

    How do I know that the disc has downloaded OK?
    If you bought the JamPack DVD you didn't download anything. Did you run the installer on the JamPack DVD?
    To see just loops from your JamPack disc, open the Loop Browser and click on the top bar where it likely says "Loops" with a double arrow, and select "JamPack 1". Then only loops from the JamPack will show in the loop browser.
    Re: the Keyboard
    What kind of conection doesd it have? All I could find was " complete with direct Mac or PC connection" and "Connections: MIDI In, MIDI Out, MIDI Thru, Line In (LR), Line Out (LR), Computer port, and 1/8" stereo headphones jack."
    "Computer Port" isn't very specific. Is it a USB connection? You might need to find a driver for it. Does the Manual say anything about installing software to make it work?
    --HangTime [Will Compute for Food] B-)>

  • ViewObjectImpl and db connection question

    I will be populating the ViewObjectImpl's RowSet from a web service.
    For simplicity, I create the ViewObjectImpl from an SQL query. There is no Entity Object involved.
    My question is if I remove the SQL statement from the View.xml file, will the ViewObjectImpl try to connect to the database and throw an error?
    Thank you.
    Richard Catlin

    In the best case you setup your application server to make a connection pool, and let the app-server do the connecting. You just grab a DataSource from your app-servers environment... Besides, I wouldn't want to have a db connection in my JSP's. I would let a bean handle that, and write the output of the bean to the page....

  • Read-only connection and other connection questions

    Apologies if this is a FAQ (and if it is please point me to them if this is the case) but I've just made the transistion from Toad to SQL Developer and struggling to find the equivelent of a couple of very useful features.
    1 ) Read-Only connection: In Toad it is possible to set a connection to read-only via a checkbox. This meant for most of the time you would browse the live DB but when required you could uncheck the box and perform updates i.e. no seperate user required.
    2) Colour Coded Connections: In Toad is is possible to assign a colour to your connection and all windows you opened for that connection would inherit the colour. Typically Red for Live, Green for Dev etc.
    3) Hide tabs for non active connections: When you have multiple connections open you only saw tabs for the current connection. All others were hidden until their connect was selected.
    I've had a look around SQL Dev and cant see these options but may have missed them. Are there similiar options in SQL Developer?

    There are feature requests for points 1 and 2 but AFAIK they are not yet implemented.
    I dont remember any feature request for point 3, but maybe i've missed it.

  • New Apple TV and wireless Connection Question?

    My son lives in Russia and works for the State Dept. He want an Apple TV. The problem is that he is not tech savvy. Does the Apple TV need to connect wired or wireless to the router or just to the laptop to stream. He has a wireless connection for the laptop but if he has to go through set up and connect it to a router, I will never be able to walk him through it from 10,000 miles away. I have the old Apple tv and have it connected to the router with a wired connection. But I guess my IMAC synchs with the old Apple TV to send programs whether it is hardwired to a router or not. I hope this makes sense.

    New AppleTv will connect via ethernet or wi-fi as before.
    You could more than likely just connect it directly to the laptop with ethernet to stream locally stored content,but you'd need to set up some kind of internet sharing for it to access any internet or itunes store features.
    AppleTV could also be set to work with an ad hoc wireless network from laptop but again internet connection would have to be shared over this, and it might be a bit fiddly too if router setup is going to be fiddly.
    Simplest would be to connect both to router with ethernet. Have you considered mains powerline ethernet adapters if running cables is impractical?

  • PowerBook and iTunes Connect question

    Hi,
    I am a newby to the world of App development. I have an App Developer account and have built an App--but cannot run the App Loader from iTunes Connect. I am using a PowerBook with OS 10.5.8.
    Is there some other step I am missing? I was told that as long as the OS was better than 10.4 that I should be able to develope on an Apple computer... If I cannot upload on this computer, my employer will most likely upload our App on the Android market instead.
    Any thoughts? Ideas?

    Hello,
    from what I understand you need an Intel based Mac to produce applications for iOS devices. This means anything from Xcode 4.0 upward on Snow Leopard. (Mac OS X 10.6)
    You may get a better responce in the developers froum here:
    https://discussions.apple.com/community/developer_forums
    Best of luck

  • I am using iPad1. Running v4.3 and when connecting to wifi iPad keyboard does not work. Keyboard works for everything else including typing this question out. Why would it not work when typingin password for wifi connection?

    I am using iPad1. Running v4.3 and when connecting to wifi iPad keyboard does not work. Keyboard works for everything else including typing this question out. Why would it not work when typingin password for wifi connection?

    Kowhai wrote:
    Lots of WIFI needs a username and password to get access. I guess you're lucky and yours is set up unsecured.
    Normal secured WiFi requires only a password to get access. The password is used to encrypt traffic between your device and the WiFi access point. If whatever you are using requires a username as well then it is not simply normal secured WiFi. It might be a subscription WiFi service like GOGO, ATT, etc., or a service with authentication, i.e., college campus, etc. To help you out we need to know what you are using and what connection dialog you are being presented with. You don't have exactly the same problem as the original poster. He is having a problem entering a password into the password dialog that iOS presents when one tries to connect to a normal secured WiFi network. Could you clarify exactly which WiFi service you are using.

  • Questions on Authentication, Security, and APEX_PUBLIC_USER

    Hello,
    I’m evaluating APEX and my DBA’s have some questions about authentication and database connections. I have audit tables in my schema (created using Oracle Designer) and I’ve noticed that APEX_PUBLIC_USER is the user recorded in my created_by and modified_by columns. I’ve read several posts about this expected behavior and its solution - (UPPER(NVL(V('APP_USER'),USER)). See:
    Re: User in journal
    Re: DB connection by apex_public_user or by registered schema name?
    How can I store the user name, not APEX_PUBLIC_USER
    I’m ok making the changes in my triggers, but my question is what is the consequence from the DBA’s perspective? If there are 100 users in my application and the DBA’s look at current database connections it will show 100 APEX_PUBLIC_USERs correct? What about any internal Oracle auditing? This is really my first true venture into web style programming. Maybe this is expected behavior.
    I also noticed that there are 157 PUBLIC grants to objects in the FLOWS_030000 schema. This means that any DB account has access to these objects by default. Is this a security risk? I would have expected the objects to be granted directly to APEX_PUBLIC_USER. My company is heavily audited in both in an internal and a Sarbanes-Oxley (Sox) sense. This may not be a concern to everyone, but it may be a concern to us. How do other people explain/justify this?
    Are we expected to not make DB accounts and only create users inside of APEX? I know APEX supports the DB authentication, but I haven’t seen any definitive “best practice” recommendations on this. I have looked at all the documentation here:
    http://download-west.oracle.com/docs/cd/B32472_01/doc/nav/portal_booklist.htm
    Is there more documentation with a better explanation than this?
    Can anyone explain how APEX_PUBLIC_USER has no direct privilege on tables in my schema, yet it is the user recorded for DML changes?
    I know this is alot of questions; we're just trying to get a better understanding of APEX before we make the commitment to begin using it.
    Thanks for the help.
    Message was edited by:
    jabolen

    This FLOWS_xxxxxx schema has enough privilege to do DML in my schema (probably why FLOWS_xxxxxx is locked). Is that about right?
    Sort of. It has privilege to dynamically execute your DML (and other code) using your schema, so it is your schema that parses the code. (search: sys.dbms_sys_sql)
    ...enterprise-level identity management solutions...Is one example of that creating DB accounts? I assume others are SSO, LDAP, etc. Where can I read about the pro’s and con’s of these choices?
    Good topic for another thread: Best tools for managing user populations (tens, hundreds, thousands, internal company vs. internet/public, etc.) One key factor is who's going to do the work and how does that fit with your business, e.g., user forgets password -> user calls help desk (24/7?) -> help desk accesses admin account and resets password...Will help desk admin use EM, Application Express admin app, SQL*Plus, OID admin, ...?
    About authorization and roles, be aware that roles are useful in an Application Express environment only if you have a database user account for each application user (presumably named the same as the account the application user uses to authenticate, regardless of how the username/password lookup is performed, i.e., using the database account's password, LDAP, or something else) and your authorization code has enough privileges to check the current user's default roles, again the roles assigned to the database user account that corresponds to the application user name. This precludes the use of dynamically enabled roles. It also requires your application parsing schema to be able to access global views like dba_tab_privs. So, IMO, it's not the most streamlined approach unless you already have (or don't mind maintaining) a database user account for every named application user, a provision that may be unnecessary to support your authentication (vs.authorization) requirements.
    About ref cursors, there wouldn't be any privileges problems - your application's parsing schema must have the privilege to execute whatever definer's rights packages are to be called and these packages, as you said, would do the DML.. As to other issues involving the use of ref cursors, we'd need to know more about your approach and how you want to define reports. I suggest you build a small prototype app and try it out.
    Scott

  • I have an existing new belkin modem router which works fine with quite a few wired and wireless products in my house. My question is if i buy a time capsule can i put it in another room and wirelessly connect it to the belkin modem router, I would then ju

    I have an existing new belkin modem router which works fine with quiet a few wired and wireless products in my house. My question is if i buy a time capsule can i put it in another room and wirelessly connect it to the belkin modem router, I would then just like my macbook pro and (imac future purchase) to wirelessly back up to it???????????

    Your will need to perform a Factory Default Reset on the TIme Capsule to clear out the current network settings and then reconfigure it to "join" your wireless network using the AirPort Utility setup application.
    To perform the Factory Default Reset on the Time Capsule....
    Pull the power cord from the back of the device
    Wait a few moments
    Hold in the reset button on the back of the Time Capsule and keep holding it an additional 8-10 seconds while you simultaneously plug the power cord back in to the Time Capsule
    Release the reset button after the hold period and allow 25-30 seconds for the Time Capsule to restart to a slow, blinking amber light
    On your Mac.....
    Open Macintosh HD > Applications > Utilities > AirPort Utility
    Click Continue
    Follow the guided setup and choose the "join" option when it appears duriing the setup
    You will need to know the exact type of wireless security that the Belkin router is using to enter this information during the setup of the Belkin. Otherwise, the Time Capsule cannot join the network, and you will receive an error message after the configuration process.

  • Secure-Unsecure Connection

    After setting up my router with my desktop, I noticed on the laptop that there are 2 connection options available under my router name. One says Secured Network and the other says Unsecured Netork.
    How do I delete or remove the Unsecured Network so that it isn't accessed?
    Is this something I should be concerned with?  I don't want unauthorized people using ny network.
    -Jeff

    Following Windows Help, I accessed my Network Connections but the router/wireless network (icon) is not there so I could not continue to delete the unsecured connection
    What exactly is SSID? I have already renamed my router and changed the factory password and the guest password. My router is set for 1 guest, the upstairs laptop (I thought that's what "guest" referred to)
    Is the "guest" the Unsecure Connection?
    Thanks

  • I have a 3rd generation iPod Touch and just did the update to IOS 5. Now I can't connect to my Netgear wifi router. My iPhone connects fine along with all of my other laptops etc. I have the router set with WPA-PSK [TKIP] security and an access list.

    I have a 3rd generation iPod Touch and just did the update to IOS 5. Now I can't connect to my Netgear wifi router. My iPhone connects fine along with all of my other laptops etc. I have the router set with WPA-PSK [TKIP] security and an access list. I've confirmed the mac address is included on that list and that the password is correct. Under choses netwrok I select the network and it just goes into a spin. I have tried removing the password and the access list settings and it still will not complete the connection to the router thus no internet access. The routers firmware is also up to date. This thing worked fine before this update and I've already tried to restore from backup. Any ideas or is the wifi nic bad in this thing with the new apple firmware update? Any fix?

    Thanks Bob, I don't know why but it all of a sudden worked a few days later. It's a mystery but at least problem solved.

Maybe you are looking for

  • ~~~how can i view a pdf file in a servlet?~~

    hi.. i just need to view the .pdf files in a servlet page.all the pdf files are stored in my web module(i am using the glassfish server).can anybody tell me how to do it? thanks a lot....

  • PO (purchase order) order through app store school education

    Hi, does anyone know or have had experience with purchasing an app or two through the app store using a PO (purchase order)? I work for a school and my department is very adamant about running these POs (never knew what these were until I started wor

  • Lightbox Slideshow adjust spacing between thumbnails

    Hi This is actually a two part question - 1. I want to give a collage look to my slideshow, without any spacing between thumbnails. How can I remove all the space between thumbnails. 2. For all the thumbnails I want -"Fit the frame proportionally" an

  • Problem with putting applications onto ipodtouch

    my ipodtouch is synced with my dad's computer and so i cant put applications from my computer onto it. i am not allowed to delete the applications that he has already put on the ipod so i cant just sync it to my computer.

  • Please help i need a programm i think it�s easy

    Hello and thank you that you clicked on this message. Well i need the source code of a programm which print out the words of a number (for instance :"five" not "5") The programm should ask me for a number (f.i.:"8") and should print out: "eight" plea