Abstract:
An apparatus for wireless communication including an automated intrusion detection process is provided. The apparatus has a portable housing, which may have a length no greater than 1 meter, a width no greater than 1 meter, and a height of no greater than 1 meter. A processing unit (e.g., CPU) is within the housing. One or more wireless network interface devices are within the housing and are coupled to the processing unit. The apparatus has an Ethernet (or like) network interface device within the housing and coupled to the processing unit. A network connector is coupled to the Ethernet network device. One or more memories are coupled to the processing unit. A code is directed to perform a process for detection of a wireless activity within a selected local geographic region. According to a specific embodiment, the wireless activity is derived from at least one authorized device or at least an other device. A code is directed to receiving at least identity information associated with the wireless activity from the detection process in a classification process. A code is directed to labeling the identity information into at least one of a plurality of categories in the classification process. Depending upon the embodiment, other codes may exist to carry out the functionality described herein.
Abstract:
A method for protecting local area networks within a selected local geographic region (e.g. office, apartment, building, coffee shop, hot-spot etc.) from wireless attacks, using a wireless sniffer apparatus. The method includes placing one or more wireless sniffer apparatus spatially to provide substantial radio coverage over at least a portion of the selected local geographic region comprising one or more local area networks. Moreover the method includes coupling one or more of the wireless sniffer apparatus to one or more of the local area networks.
Abstract:
A method for monitoring a selected region of an airspace associated with local area networks of computing devices is provided. The method includes providing one or more segments of a legacy local area network to be protected in a selected geographic region. The legacy local area network is characterized by an unsecured airspace within the selected geographic region. The method includes determining a security policy associated with the one or more segments of the legacy local area network. The security policy at least characterizes a type of wireless activity in the unsecured airspace to be permitted, denied, or ignored. Additionally, the method includes connecting one or more sniffer devices into the legacy local area network. The one or more sniffer devices are spatially disposed within the selected geographic region to cause at least a portion of the unsecured airspace to be secured according to the security policy. Moreover, the method includes coupling a security appliance to the legacy local area network. The method also includes determining if at least one of the sniffer devices is coupled to each of the one or more segments of the legacy local area network to be protected and determining if the one or more sniffer devices substantially covers the portion of the unsecured airspace to be secured. The method additionally includes monitoring wireless activity in the airspace using the one or more sniffer devices, and automatically classifying, using a classification process, a portion of information associated with the monitoring of the wireless activity to at least determine if the wireless activity communicates to at least one of the one or more segments to be protected. Further, the method includes detecting a violation of the security policy based upon at least the classifying of the portion of the information from the monitoring of the wireless activity, and automatically processing an action associated with the violation in accordance to the security policy for the one or more segments in the legacy local area network to be protected.
Abstract:
A method for monitoring a selected region of an airspace associated with local area networks of computing devices is provided. The method includes providing one or more segments of a legacy local area network to be protected in a selected geographic region. The legacy local area network is characterized by an unsecured airspace within the selected geographic region. The method includes determining a security policy associated with the one or more segments of the legacy local area network. The security policy at least characterizes a type of wireless activity in the unsecured airspace to be permitted, denied, or ignored. Additionally, the method includes connecting one or more sniffer devices into the legacy local area network. The one or more sniffer devices are spatially disposed within the selected geographic region to cause at least a portion of the unsecured airspace to be secured according to the security policy.
Abstract:
An improved piston for a pouch dispenser is disclosed. The dispenser is adapted to contain a pouch of flowable material, and has a lid to keep the pouch within the dispenser and a piston which is adapted to move toward the lid and press against a first end of the pouch, and push the flowable material out of the pouch through a hole in the second end of the pouch. The piston has a peripheral lip extending towards the second end of the pouch. The peripheral lip extends for a length sufficient to cause the film from which the pouch is made to pleat in a direction transverse from which the pouch is made to pleat in a direction transverse to the longitudinal axis of the dispenser when the material in the pouch is squeezed from the pouch by the pressing action of the piston. The lid and piston are adapted to allow the peripheral lip to nest with the lid and to prevent the pleats from hindering essentially all of the material from being squeezed out of the pouch.
Abstract:
An apparatus for wireless communication including an automated intrusion detection process is provided. The apparatus includes a processing unit. It includes a wireless network interface device and an Ethernet (or like) wired network interface device that are coupled to the processing unit. One or more memories are coupled to the processing unit. A code is directed to perform a process for detection of wireless activity within a selected local geographic region. According to a specific embodiment, the wireless activity is derived from a wireless access point device that is operational about the selected local geographic region. A code is directed to performing connectivity test using one or more marker packets to determine connectivity status of the wireless access point device to network to be protected from intrusion. Depending upon the embodiment, other codes may exist to carry out the functionality described herein.
Abstract:
A board wargaming hobbyist's tool constructed of .22-.25″ thick plexiglass, consisting of two 1″×¾″ beveled flanges glued on a 1-½″ square base. Either a self-adhesive felt or high-density foam piece is affixed to the bottom to provide scratch protection and to add color to the piece (not part of functionality). When used with a hobby knife it allows up to 10 cardboard counters (square game pieces) to be stacked with ragged corners protruding through the bevels, so that they can be trimmed off quickly and consistently. This greatly decreases preparation time of game pieces.
Abstract:
According to an embodiment of the present invention, the wireless activity in a geographic area containing LAN connection ports is monitored using one or more sensor devices, called sniffers. By analyzing said wireless activity, one or more APs that are operating in said geographic area are identified. The active APs so identified are classified into three categories, namely “authorized” APs (those that are allowed by network administrator), “unauthorized” APs (those that are not allowed by the network administrator, but are still connected to the LAN of interest) and “external” APs (those that are not allowed by network administrator but are not connected to the LAN of interest, for example APs connected to the neighbor's LAN) by conducting one or more tests. The sniffers continue to monitor the selected geographic area to detect any wireless station attempting to connect to or communicating with the one or more identified unauthorized APs. Upon identifying unauthorized AP and/or intruding wireless station an indication is transferred to the prevention process.
Abstract:
A dispenser of flowable materials from a pouch is disclosed. The pouch has an ear (55) at each of the ends of a transverse seal (53) located at one end of the pouch (57). The dispenser comprises i) a cylindrical container (33) having sides and an open top having a rim, the container being adapted to contain the pouch, and ii) a lid (35) attachable to the rim such that the lid is adapted to trap the ears of the pouch between the lid and the rim and to keep said end of the pouch taut between the ears when the lid is attached to the rim. The lid is also being adapted to allow a spout (41) to pierce the pouch at the taut portion.
Abstract:
A method of joining two sections of metallic pipe (1), each of which has a thermoplastic polymer lining (3), to form corrosion resistant joints is disclosed. The method comprises inserting a sleeve (10) into each section of two pipes (1) that are to be joined so as to form a fluid tight seal between the liner (3) and the sleeve (10). The end of each section of pipe is then bevelled, and the two sections are welded together so as to form a corrosion resistant weld between each section of pipe and each sleeve and between each of the sleeves. The method is particularly useful in the lining of metallic pipe in the field e.g. in pipelines, without having to form flange joints.