Jump to content

Leaderboard


Popular Content

Showing most liked content since 10/16/2017 in all areas

  1. 1 point
    mudmanc4

    WPA2 fatal flaw

    We discovered serious weaknesses in WPA2, a protocol that secures all modern protected Wi-Fi networks. An attacker within range of a victim can exploit these weaknesses using key reinstallation attacks (KRACKs). Concretely, attackers can use this novel attack technique to read information that was previously assumed to be safely encrypted. This can be abused to steal sensitive information such as credit card numbers, passwords, chat messages, emails, photos, and so on. The attack works against all modern protected Wi-Fi networks. Depending on the network configuration, it is also possible to inject and manipulate data. For example, an attacker might be able to inject ransomware or other malware into websites. The weaknesses are in the Wi-Fi standard itself, and not in individual products or implementations. Therefore, any correct implementation of WPA2 is likely affected. To prevent the attack, users must update affected products as soon as security updates become available. Note that if your device supports Wi-Fi, it is most likely affected. During our initial research, we discovered ourselves that Android, Linux, Apple, Windows, OpenBSD, MediaTek, Linksys, and others, are all affected by some variant of the attacks. For more information about specific products, consult the database of CERT/CC, or contact your vendor. The research behind the attack will be presented at the Computer and Communications Security (CCS) conference, and at the Black Hat Europe conference. Our detailed research paper can already be downloaded. Source
  2. 1 point
    mudmanc4

    differance to negative with hughes net

    Welcome to testmy.net forum @mudman59 , Looks as if the connections speeds are rather sporadic, chances are there are a lot of other customers in the area.
  3. 1 point
    CA3LE

    results

    Go to My Results .Then click 'Export' below the graph. let me know if this helps
  4. 1 point
    If I want to send a graph to my ISP as evidence of woeful performance, it will need a timescale along the bottom so I can can say for instance "here is a graph of performance tested every 30 mins over the past 24 hours. Then each data point can be tied close to a time of day. Without an X-axis scale its just a wavy line of speed.
  5. 1 point
    Hi - this is for your technical support group I do a lot of wifi performance testing on airplanes and use testmy.net from time to time. I've noticed a change recently with your manual version of testmy.net for UL and DL testing. When I am in systems with small latencies, it seems to work fine, but for satellite-based systems where the intrinsic latency is 600 -1000 ms on one particular vendor, your test always comes back with a DL speed of between 1.7 -> 2.2 Mbps. These links we are testing are typically 10 -> 50 Mbps and so I know something is wrong. In the past it worked fine, but lately it seems like it clamps everything to about 1.7 Mbps. Last year, testmy.net did not have this issue and reported speeds similar to other speed tests. The problem is that not only I am using this but end customers are as well and I think the results could be misleading. I run other tests on the planes like; fast.com, dslreports.com or our own tput tests and they come back with the expected data rates. I've also run our own tput tests using curl and file sizes up to 100 MBytes capturing packets with wireshark and am confident in the data rates we are seeing with the other tools. The data rates do vary over time due to link usage but each time I've tried testmy.net on the past 6 or so flights, its always giving me the same results. Could you please look into this for me and let me know why this is acting this way? Here's another set of tests from another flight: thanks very much 'mark
×
Speed Test Version 15.9
© 2017 TestMy Net LLC - TestMy.net - Terms & Privacy
© 2017 TestMy Net LLC - TestMy.net - Forum - Terms & Privacy