scholarly journals Linux en router inalámbricos Linksys [Linux in wireless router Linksys]

Author(s):  
Harol Heder García Quiceno ◽  
Vícter Alejandro García Zapata

Resumen El crecimiento de firmware en Linux, ha llegado a desarrollar varias herramientas que permitan adaptar equipos inalámbricos a las necesidades de sus compradores. Así mismo la facilidad de acceder a la documentación y soporte que se prestan en Internet con referente a estos sistemas es suficiente, para las personas que tengan poco conocimiento y deseen implementar estas herramientas. Por lo anterior se inicia con la actividad de consultar en la región, sobre implementaciones de sistemas embebidos en Linux para router inalámbricos, pero los resultados fueron negativos, Eso da paso a que surja una investigación en Internet de sistemas embebidos para Linux y por ende innovar con la instalación del DD-WRT y algunos servicios de red en un dispositivo Linksys WRT54GL. Con los pasos anteriores, de este artículo, se espera que sea el inicio para que otras personas hagan uso de estas herramientas, que no solo están en el área de las comunicaciones, sino incursionando en los hogares, y que buscan beneficios de tipo: económico, colaborativo, y una adecuada utilización recursos. Palabras ClaveLinksys, router, Linux, Firmware, Wireless, Wifi   AbstractThe growth of firmware in Linux, has come to develop several tools that enable wireless devices to adapt to the needs of their buyers. Also the ease of access to documentation and support that are provided on the internet with regards to these systems is sufficient for people who have some knowledge and want to deploy these tools.‪It starts with the previous consultation activity in the region, embedded systems implementations on Linux wireless router, but the results were negative, That leads to the emergence of a research on the Internet for Linux embedded systems and innovate with the installation of DD-WRT and some network services on a device Linksys WRT54GL.With the previous steps in this article, expected for that is the beginning for others to use these tools, which are not only in the area of communications, but making inroads into our homes, and who seek such benefits: economic, collaborative, and appropriate resource utilization It’s a text with a longitude between 60 and 300 words, that it guides the reader to identify the basic content and its relevance, because it presents in a clear and brief way the reach of the article, the main discoveries and the conclusions. Keywords Linksys, router, Linux, Firmware, Wireless, Wifi

Author(s):  
Muh. Syarif Hidayatullah ◽  
Kusnawi Kusnawi

[Id] Perangkat wireless yang sering digunakan adalah TL-WR841ND, tipe tersebut memiliki fitur konfigurasi yang lengkap serta harga yang terjangkau. Permasalahan yang sering terjadi pada perangkat access point TL-WR841ND adalah firmware original TL-WR841ND kurang stabil dan sering stuck sehingga harus direstart ulang dengan mencabut kabel power kemudian dipasang kembali, Koneksi internet pasti terputus sehingga hal ini sangat mengganggu saat user sedang mengakses internet. Salah satu alternative solusi adalah mengupgrade firmware original access point atau wireless router menjadi firmware yang bersifat opensource yang embedded pada access point atau wireless router yaitu Openwrt. Penelitian ini akan membantu mengetahui apakah memasang OpenWRT pada perangkat wireless TLWR841ND ini akan membuat QoS jaringan wireless menjadi lebih baik, sama, atau lebih buruk dari default firmware sehingga nantinya hasil dari penelitian ini diharapkan akan berguna bagi para pengguna OpenWRT atau yang akan menggunakan OpenWRT Kata kunci: Wireless, QoS, Firmware, Openwrt, Default, TL-WR841ND [En] Wireless device that is often used is the TLWR841ND, the type of features the complete configuration and an affordable price. Problems often occur on the access point TL-WR841ND is the original firmware TL-WR841ND less stable and often stuck so it should be restarted by unplugging the power cable and then reassembled, definitely interrupted internet connection so it is very disturbing when a user is accessing the Internet. One alternative solution is the original firmware upgrade access point or wireless router into open source firmware that is embedded in the access point or wireless router that is OpenWRT.This study will help determine whether to install OpenWRT on wireless devices TL-WR841ND will make QoS wireless networks become better, same, or worse than the default firmware so that later the results of this study are expected to be useful for those users OpenWRT or who will use OpenWRT Keywords: Wireless, QoS, Firmware, OpenWRT, Default, TL-WR841ND


2017 ◽  
Author(s):  
JOSEPH YIU

The increasing need for security in microcontrollers Security has long been a significant challenge in microcontroller applications(MCUs). Traditionally, many microcontroller systems did not have strong security measures against remote attacks as most of them are not connected to the Internet, and many microcontrollers are deemed to be cheap and simple. With the growth of IoT (Internet of Things), security in low cost microcontrollers moved toward the spotlight and the security requirements of these IoT devices are now just as critical as high-end systems due to:


2014 ◽  
Vol 7 (2) ◽  
pp. 195-203 ◽  
Author(s):  
Richard A. Formato

Variable Z0(VZ0) antenna technology is a new design or optimization methodology applicable to any antenna on any platform designed or optimized with any procedure. It should be particularly useful for wireless devices populating the Internet of Things. VZ0expands the design or decision space by adding another degree of freedom invariably leading to better antennas. A simple design example illustrates its effectiveness.


Author(s):  
Сергей Маликов

В статье рассматривается понятие интернета вещей, очерчиваются области его применения, характеризуются основные его уязвимости: слабые пароли, использование небезопасных сетевых сервисов, уязвимый веб-интерфейс, ненадежный облачный интерфейс, ненадежный мобильный интерфейс, незащищенные патчи и обновления и др. Мақалада заттардың интернеті туралы түсінік қарастырылған, оның қолданылу аясы сипатталған, оның негізгі осалдығы сипатталады: әлсіз парольдер, қауіпті желілік қызметтерді пайдалану, осал веб-интерфейс, сенімсіз бұлт интерфейсі, сенімсіз мобильді интерфейс, қорғалмаған патчтар мен жаңартулар және т. б. The article discusses the concept of the Internet of Things, outlines its areas of application, characterizes its main vulnerabilities: weak passwords, the use of insecure network services, vulnerable web interface, unreliable cloud interface, unreliable mobile interface, unprotected patches and updates, etc.


Author(s):  
Daria J. Kuss ◽  
Mark Griffiths

As the Internet offers a new venue for gambling, the risks for engaging in pathological behaviors are potentially increased. In light of this, a systematic literature review was conducted in order to shed further light on the relationship between gambling on the Internet and possible addiction by assessing Internet gambling in general and addictive gambling on the Internet specifically. Based on previous research, it is argued that a combination of individual, situational, and structural characteristics determine whether and to what extent individuals engage in Internet gambling. The results suggest that there are more problem gamblers on the Internet than in land-based venues. A reason for this may be the structural characteristics of the Internet inherent to this technology, namely availability, ease of access, anonymity, and convenience. In conclusion, however, the Internet cannot be claimed to be addictive per sé, but rather to facilitate the engagement in addictive behaviors, including gambling.


Author(s):  
Thomas M. Chen ◽  
Greg W. Tally

Internet users are currently plagued by an assortment of malicious software (malware). The Internet provides not only connectivity for network services such as e-mail and Web browsing, but also an environment for the spread of malware between computers. Users can be affected even if their computers are not vulnerable to malware. For example, fast-spreading worms can cause widespread congestion that will bring down network services. Worms and viruses are both common types of self-replicating malware but differ in their method of replication (Grimes, 2001; Harley, Slade, & Gattiker, 2001; Szor, 2005). A computer virus depends on hijacking control of another (host) program to attach a copy of its virus code to more files or programs. When the newly infected program is executed, the virus code is also executed. In contrast, a worm is a standalone program that does not depend on other programs (Nazario, 2004). It replicates by searching for vulnerable targets through the network, and attempts to transfer a copy of itself. Worms are dependent on the network environment to spread. Over the years, the Internet has become a fertile environment for worms to thrive. The constant exposure of computer users to worm threats from the Internet is a major concern. Another concern is the possible rate of infection. Because worms are automated programs, they can spread without any human action. The fastest time needed to infect a majority of Internet users is a matter of speculation, but some worry that a new worm outbreak could spread through the Internet much faster than defenses could detect and block it. The most reliable defenses are based on attack signatures. If a new worm does not have an existing signature, it could have some time to spread unhindered and complete its damage before a signature can be devised for it. Perhaps a greater concern about worms is their role as vehicles for delivery of other malware in their payload. Once a worm has compromised a host victim, it can execute any payload. Historical examples of worms have included: • Trojan horses: Software with a hidden malicious function, for example, to steal confidential data or open a backdoor; • Droppers: Designed to facilitate downloading of other malware; • Bots: Software to listen covertly for and execute remote commands, for example, to send spam or carry out a distributed denial of service (DDoS) attack. These types of malware are not able to spread by themselves, and therefore take advantage of the self-replication characteristic of worms to spread. This article presents a review of the historical development of worms, and an overview of worm anatomy from a functional perspective.


Author(s):  
M. Raisinghani

A new form of technology is changing the way commerce is being done globally. This article provides an overall description of mobile commerce and examines ways in which the Internet will be changing. It explains the requirements for operating mobile commerce and the numerous ways of providing this wireless Internet business. While the Internet is already a valuable form of business that has already changed the way the world is doing business, it is about to change again. Telecommunications, the Internet, and mobile computing are merging their technologies to form a new business called mobile commerce or the wireless Internet. This is being driven by consumer demand for wireless devices and the desire to be connected to information and data available through the Internet. There are many new opportunities that have only begun to be explored, and for many this will become a large revenue source for those who capitalize upon this new form of technology. However, like other capital ventures, these new opportunities have their drawbacks, which may limit growth of the mobile commerce market if not dealt with. Mobile e-commerce technology is changing our world of business just as the Internet alone has changed business today.


Author(s):  
Savvas Papagiannidis ◽  
Michael Bourlakis

Advances in technology, in particular the Internet and mobile/wireless devices, have significantly affected business operations. As technology changes, communicating and interacting with customers could not be left untouched; the dot.com era saw many new forms of marketing emerge on the electronic landscape. In this article, we discuss the possible marketing implications of the convergence of electronic media focusing on the delivery of advertising messages. We acknowledge the profound impact of information technology on marketing channels (Leek, Turnbull, & Naude, 2003) and use examples of various technologies to present changes that occurred in existing channels to illustrate the future potential of emerging channels. For each of the above, we provide examples of applications that can potentially be integrated to deliver advertising convergence.


Sign in / Sign up

Export Citation Format

Share Document