⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 index.docbook

📁 Linux/Unix下无限网卡配置和管理程序
💻 DOCBOOK
📖 第 1 页 / 共 2 页
字号:
There are some minor additional things to be said.</para><para>First, there is a featurenamed "Acoustic Scanning". If this option is enabled, the connection qualityis converted into an acoustic signal. A higher signal quality leads to ahigher frequency of the "beep" output and to a more rapid beeping. If you'veever seen the Star Trek(tm) series you will see some parallels to their"tricorders". :-)</para><para>A second feature is "silent logging". It just means that KWiFiManager will logthe name of the network you are connecting to every time your network changes.This option is most useful when searching for the special network name "ANY".In this mode, the card will log into any network it finds. The logfile'sposition is $HOME/.wireless-log</para><para>The third thing is just a note: In the file menu, there is an entry "Disableradio". This option is NOT IMPLEMENTED YET. But please don't blame me, theproblem is in the kernel drivers for Wi-Fi cards. The driver simply doesn'tsupport it.</para></sect2></sect1><sect1 id="panelapplet"><title>The panel applet</title><para>The panel applet is the second part of the KWiFiManager suite. It is a sharedlibrary tat can "dock" into KDE's panel ("Kicker"). It only displays thesignal quality as icon and as text (see 3.1.1.1 for details).</para><para>With it's light-weight size it is best suitable forcontinuous use. If you don't want the "huge" KWiFiManager main app on yourscreen all the time, just use the applet.</para><sect2 id="applet-launch"><title>Launching the applet</title><para>The panel applet can be added to your panel by right-clicking on the paneland selecting "Add, applet, KWiFiManager applet". Another way to start theapplet is to click on its desktop file, which can be found on your diskin the directory: $KDEDIR/share/apps/kicker/applets. That way it will notdock into the panel but free-float on your desktop.However, the first method is easier and should be preferred.</para><para>The panel applet can be minimally configured: it can optionally flash in yellow,orange and red colors when the signal quality level is very low. To enable ordisable this feature, right-click on the applet's "handle" left of the icon and select<guimenuitem>personal settings</guimenuitem>.</para></sect2><sect2 id="applet-tooltip"><title>Tooltip information</title><para>If you hover above the applet for a few seconds, you will be shown a tooltip with a fewadditional information, namely:<itemizedlist><listitem><para>your local IP address</para></listitem><listitem><para>the network name, if one is set</para></listitem></itemizedlist></para></sect2><sect2 id="main-from-applet"><title>Starting KWiFiManager main application from the panel applet</title><para>A single click on the applet launches (either with left-click or right-click, as you prefer) the KWiFiManager main application.</para></sect2></sect1><sect1 id="cc-module"><title>The Control Center module</title><para>The configuration module in the KDE Control Center is perhaps the most useful partof the KWiFiManager suite. Here you can actually changethe basic settings of your wireless LAN card. The modulecan manage up to four independent configurations for thecard, and it can even automatically set your card up wheneveryou log into KDE.Since establishing a network connection is a possible security hazard, any changesto the configuration can only be done by root.</para><sect2 id="conf-tab"><title>The Configuration Tabs</title><para>The upper part of the control center module consists of four tabs labelled<guilabel>Config 1</guilabel> thru <guilabel>Config 4</guilabel>. Each ofthese tabs can hold a configuration for your WLAN card.</para><para>The most important settings are always visible, the cryptography and powermanagement options are only shown when activated.The perhaps most important element in each configuration tab is the field<guilabel>Network name</guilabel>. Here you can specify which network youwould like to log into. You can either specify the name of your networkdirectly, or you can try a scan on all available networks by setting the networkname to <userinput>ANY</userinput>.</para><para>In addition to the network name, you have to specify the type of network to loginto. That's the purpose of the button group <guilabel>Operation mode</guilabel>.The option <guilabel>infrastructure</guilabel> means that the network consistsof designated base station, so-called "access points" or "residential gateways". This is themost common operation mode for company networks. The second option,<guilabel>peer-to-peer</guilabel> means that your network is just a direct connectionbetween computers, without access points.</para><para>On the right-hand side of the configuration tab, you can optionally set the connectionspeed for your connection. The setting <guilabel>auto</guilabel> should do formost uses, since the card will determine the appropriate speed itself. However, ifyou find that the speed changes every few seconds, for example when you have a weakconnection, you can set the speed manually.</para><para>Below these configuration items you will find a field named <guilabel>Execute script onconnect:</guilabel>. Here you can enter the name of a script to execute. It will beexecuted whenever you hit the <guilabel>Activate configuration</guilabel> button and, optionally,automatically when you start the Control Center module. The script will have root rights.This may lead to problems if you want to start an X application in the script and the X serverbelongs to someone else than root. You can make such scripts work correctly if you execute theX application via <userinput>kdesu -u USERNAME -c COMMAND"</userinput>.</para><para>The lower-left part of each configuration tab holds the cryptograhy settings. Thesesettings are only shown if you check the box <guilabel>Use cryptography?</guilabel>.If shown, you are presented with numerous options:<itemizedlist><listitem><para><guilabel>Key to use</guilabel>: you can define up to four secret keys foreach configuration, in this field you can set which one you actually want to use toencrypt network traffic</para></listitem><listitem><para><guilabel>Crypto mode</guilabel>: When encryption is activated, there aretwo ways to deal with incoming non-encrypted packets: discard or allow. When you setyour card for <guilabel>Open mode</guilabel>, the card will also listen to non-encryptedpackets. <guilabel>Restricted mode</guilabel> will only allow encrypted network packets,any other packets are discarded.</para></listitem><listitem><para><guilabel>Crypto keys</guilabel>: This box lets you specify the secret keysto use for cryptography. The small box <guilabel>String?</guilabel> sets whether the keyyou enter to right is either a string like <userinput>MY_CRYPTO</userinput>, or, ifnot checked, a hex value like <userinput>0A2FEE91</userinput>. To protect your passwords,only asterisks will be shown when you enter a password.</para></listitem></itemizedlist>Be aware that the built-in cryptography support (named WEP for Wireless Equivalent Privacy) isnot very safe at all. See appendix for details.</para><para>The last configuration element that remains to be described is the power management.When checking the box <guilabel>Enable Power Management</guilabel> you will be presentedsome options that can help you save energy.The first two input fields named <guilabel>Sleep duration (ms)</guilabel> and<guilabel>Awaken time (ms)</guilabel> describe the periodicity of network scansfor your wireless LAN card. The card will turn the radio antenna off for the timeperiod in milliseconds specified in <guilabel>Sleep duration</guilabel>. Afterwardsit will be active for <guilabel>Awaken time</guilabel> and will in that time scanfor a network connection. If no network connection is found, it will go to sleep againand the cycle begins again.The box named <guilabel>Receive packets</guilabel> below lets you specify which packetsthe card should listen to when awaken. You can either select <guilabel>Unicast only</guilabel>(which will only let your card listen to packets sent specifically to your card),<guilabel>Multi/Broadcast only</guilabel> (will only listen to packets sent to multiple machinesand discard packets directed to your card) or <guilabel>Both</guilabel>. Most peopleshould select the default value <guilabel>Both</guilabel>.</para></sect2><sect2 id="auto-configuration"><title>Auto-configuration on Control Center Module startup</title><para>If you wish, you can make KWiFiManager initialize your wireless LAN card whenever you start the ControlCenter Module. To do so, check the box <guilabel>Load preset configuration on Control Center Module startup</guilabel>and select the number of the configuration you want to use in the listbox below. If youwant to set the card to these settings at once, push the button <guilabel>Activate configuration</guilabel>.</para></sect2><sect2 id="autodetect"><title>Autodetecting your device</title><para>KWiFiManager needs to know the interface name of your wireless LAN card to changeany settings. You can either enter the information (e.g. <userinput>eth1</userinput> or <userinput>wlan0</userinput>)manually in the input field right of <guilabel>Settings apply to interface:</guilabel>, or let KWiFiManager auto-detect the interface. To do so, push the button<guilabel>Autodetect interface</guilabel>. This will perform a scan on all interfaceslisted in <filename>/proc/net/dev</filename> to find your card. The result of the scanwill show up in the input field left of the button. If the field remains empty, no cardwas found.Please note that KWiFiManager uses the wireless extensions to detect cards. If youuse a card controlled by the wlan-ng package, KWiFiManager only shows correct resultsif your driver has a compatibility layer for the wireless extensions built-in.</para></sect2></sect1></chapter><chapter id="append"><title>Appendix</title><para>This chapter contains some extra information of items concerning wireless LAN that are not directly relatedto KWiFiManager.</para><sect1 id="macaddress"><title>Notes on the MAC address display in Ad-hoc mode</title><para>At first glance, the MAC address in the field <guilabel>Access Point</guilabel> seems to be wrong in Ad-hoc modebecause it changes the first two bytes of the MAC address to "02". But actually, this is a hardcoded featurein wireless LAN cards.</para><para>Usually a card is connected to a "real" access point. Then the correct MAC address is shown. If you change toAd-hoc (or "Peer-to-peer") mode, one of the computers must act as a server for the other computers. The firstcomputer that enters a network, will set itself as server. So, all other computers connecting to the same Ad-hocnetwork will see that first computer as network server. But since this computer is not a "real" server (that is,it is not a permanently available access point), clients should be aware that the network they are connectingto is not a permanent one. IEEE standards for MAC addresses have a place reserved for such occasions: MAC addressesthat are not globally valid have "02" as the first two bytes (these addresses are called "locally administered" addresses).You can compare this to the non-global IP addresses like 192.168.*.*.So, the implementors of wireless networking agreed to give these "virtual" network servers a MAC address that iswithin the "locally administered" scope. To keep this virtual MAC address unique, they used a little trick: theyonly changed the first two bytes of the MAC address of the wireless LAN card, and since the remaining ten bytes are still unique in the world,they have a unique address to use as network server.</para></sect1><sect1 id="wep"><title>Security considerations on WEP cryptography</title><para>WEP cryptography is not very secure at all. A recent paper from cryptography analysts called the encryptionalgorithm "kindergarten cryptography". Actually, software exists that exploits a huge security hole in theencryption standard. This software listens to the encrypted network traffic, analyses it, and after onlya few hours it reveals the password to enter the network in clear text. The more traffic on the network, theeasier it is to find out the password.</para><para>If you are truly concerned about your security, do NOT use WEP. If you are just setting up a two-computerhome network, well, then I guess WEP should do.</para><para>There are many alternatives to WEP encryption. You could only use SSH to communicate over the network. SSH isa program suite that encrypts data with its own algorithm, which is very secure.Another option is to use PPTP, the Point-to-Point-Tunneling protocol. However, even PPTP seems to be a bit leakyconcerning encryption security.And finally, you could set up an IPSec tunnel for your encrypted connections. As of yet, this encryption seemsto be very safe and flexible.</para></sect1></chapter><chapter id="credits"><title>License and contributors</title><para></para>&underFDL;&underGPL;<para>The program is written by Stefan Winter <email>mail@stefan-winter.de</email>.</para></chapter>&documentation.index;</book>

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -