|License:||Free to try|
|Op. System:||Windoows All|
|File size:||2.3 MB|
|Publisher:||Code Red Systems|
Publisher description for AirStop Wireless
AirStop Wireless enforce a Single SSID configuration on laptops and tablet PCs and disables the wireless adapter when outside of range. The resulting "Sticky Wirelessâ"¢" security policy prevents "data leakage" by ensuring the computer is only able to connect to a pre-defined wireless network. This configuration prevents any unwelcome or mistaken link to an unauthorized network when in the home or office. AirStop Wireless prevents WiFi connections to outside networks, letting you create a "permit only my wireless network" setup. Frequently, a laptop owner at home will find that an Internet connection was mistakenly made - automatically - to a neighbor's WiFi. Unmonitored outside access leaves the laptop fully exposed to a long list of threats and is obviously undesirable to anyone concerned with data and laptop security. In an office setting, the same situation is far more severe than simply a mistaken (or unauthorized) connection to the local caf. If the laptop is simultaneously connected to the office network using a LAN cable, the person has created an unintentional "bridge" that can undermine the entire network's security of the office. AirStop Wireless prevents WiFi autoconnect. In extreme situations, the unsuspecting laptop owner may be connecting to a "honeypot" network. Here, hackers will try to position a strong WiFi signal near the office they specifically want to access. Once an illegal bridge is set up, they will attempt to acquire confidential data by breaching the private information systems normally protected by a firewall.