Many years ago I thought that Alex Trebek was the smartest man in the world. After all, he knew the answers to everything! Well, it turns out the answers are fed to him. I know, right? Who knew? Now I wonder who told him to shave his mustache. My point is, it only seemed like Alex Trebek knew everything. Likewise, it is only natural that each month, I tend to choose wireless networking questions for which I think there’s a good chance I know what to say.
But, I also receive questions that are real stumpers. Some are stumpers because they ask for the impossible, like “can you tell me the password to my neighbor’s Wi-Fi network?” No, I can’t, even if I knew it (which I don’t). Others are more like head-scratchers. I may have an inkling what the problem might be, but can’t really be sure. Enter the wisdom of the crowd. So this month, we take a look at a few questions that I kinda maybe perhaps have a thought or two about, but could really use your input on. Of course, you’re always welcome to share your two cents about anything you read here, but this month especially, we invite your ideas!
A: Let’s first unpack this scenario—you want to setup a single piece of hardware that will give nearby users wireless Internet access. But, you want to force them to see a splash page upon connecting (such as ads from sponsors), and you want to define limits on their upload and download speeds, presumably so that no single user can hog all the available bandwidth to the Internet.
As you have discovered, NoDogSplash meets all of your needs, but with one catch—it runs on OpenWRT, which is a less user-friendly router firmware than, say, DD-WRT (or Tomato). The OpenWRT learning curve is considerable compared to these others, and although it is quite powerful, it may not be the most inviting choice for a turnkey solution.
Unfortunately, it does not seem like anyone has posted a successful report of installing NoDogSplash on DD-WRT or Tomato. However, there are two alternative approaches to consider:
Like Jason says, most captive portal solutions require interacting with an external server, most typically a RADIUS server. But for a simple, quick-n-dirty hotspot with bandwidth control, but without user management, what other solutions come to mind? Click on my byline above to send us your feedback, or use the Comments tool below.
A: You have to admire Microsoft for keeping its “Unhelpful Error Message Department” busy, continually inventing new and ever more cryptic ways to tell you that what you want to do doesn’t work. The clue here is “certificate” because, chances are, your wireless network does not use a certificate. And the problem is likely with the client PC—in this case, your Sony Vaio, which may be misconfigured to look for a different kind of network than the one that you have.
It isn’t clear whether you are connecting to the wireless network using Windows’ built-in wireless management or the Intel PROset wireless connection utility pre-installed on the Vaio. If you are using the Windows connection utility, I would first try to switch to the PROset utility instead.
Failing that, two things to consider:
Has anyone else seen this cryptic “certificate” error and, if so, found another solution to (or explanation for) the problem? If so, use the Comments tool.
A: Perhaps we ganged up on Microsoft error messages too soon. A good number of Mac users have reported frustration and confusion with the infamous “Your wireless network has been compromised” error. What’s worse, in fact, than Microsoft’s empty rhetoric is that this message actually causes OSX to disable your wireless network for one minute. Gee, thanks Apple!
Of course, OS X thinks it is doing you a favor. After all, it has decided that your wireless network is being hacked by a nasty intruder, and so taking your machine offline is for your own good. The only problem is, chances are, that there is no intruder.
Little seems to be known about the exact cause of this error, and Apple has yet to address it despite reports dating back to at least 2004. Some users are affected frequently—as in repeatedly, every day—while others have never seen this error. Based both on my personal experience with this error and other user reports, it appears that the trigger involves the presence of a PC-based wireless client using WPA-TKIP.
For example, at a friend’s house I had setup a wireless network using WPA-TKIP, and configured both her MacBook and my PC to the appropriate settings. The MacBook would connect to the network, but as soon as my PC would connect, the Mac would throw the security error and shut down her connection.
As Al discovered himself, changing all parties involved—the router and the clients—to WPA-AES encryption solved the problem and everyone got along happily.
The question remains, though, is TKIP encryption tickling a bug in OS X? Have you seen this error on a Mac and found any other solution and/or explanation? Considering how widely used TKIP is (as the default WPA encryption scheme in most wireless routers), it seems odd that this bug would persist in OS X for so many years. If you have insight to share, click on my byline above to send us your feedback, or use the Comments tool below.
A: Although my expertise in RF is limited, I am inclined to agree with the sentiment in Ron’s first paragraph. These so-called “Wi-Fi boosters” are basically amplifiers that make the transmitted signal “louder” (if you think about it in radio terms). But unlike a radio, the client is not a passive receiver—it, too, sends signal back to the wireless transmitter. The client is limited by the power output of its own transmissions. In other words, the Wi-Fi booster may let your client “hear” the wireless router from a further distance than it would otherwise, but the client itself might not be strong enough to send anything back—leaving you in the same boat as if you couldn’t see the wireless network at all. Or more specifically, dangling an SSID that you can see, but not associate with.
Also remember that when you amplify signal you also amplify noise. Many users have reported that, when cranked to max output, these Wi-Fi boosters can actually hinder performance of nearby clients, whose own receivers essentially “drown” in the noise. To minimize this problem, one may need to compromise by setting the Wi-Fi booster to a mid-range power level—say, 100 to 200 milliwatts. Of course, this will also reduce its maximum range, and so what’s the point?
The point, according to those who have evaluated these boosters, is to better fill in your existing wireless range. In other words, if you expect the booster to give you a strong signal much further away than you could before, this may not pan out. But, if you would like to give a boost within the range you already experience—and maybe catch some of the “dark corners” that are otherwise too weak—a signal booster set to a mid-range power output could very well do the trick.
An entirely different way of using a Wi-Fi booster would be for creating a long-range fixed wireless link. In this case, you don’t care so much about clients near the receiver, so you can pump up the power output. Plus, you would want to use a pair of boosters, one at each end of the link, so you don’t wind up with the asymmetrical power problem described above. Finally, you would also want to replace the “paltry” 2dbi antenna with a more powerful directional antenna. You’ll always get the longest range using directional antennas precisely aimed at one another, but of course this will not provide much or any signal outside their straight-line path.
Article courtesy of Wi-Fi Planet.
Ethics and Artificial Intelligence: Driving Greater Equality
FEATURE | By James Maguire,
December 16, 2020
AI vs. Machine Learning vs. Deep Learning
FEATURE | By Cynthia Harvey,
December 11, 2020
Huawei’s AI Update: Things Are Moving Faster Than We Think
FEATURE | By Rob Enderle,
December 04, 2020
Keeping Machine Learning Algorithms Honest in the ‘Ethics-First’ Era
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 18, 2020
Key Trends in Chatbots and RPA
FEATURE | By Guest Author,
November 10, 2020
FEATURE | By Samuel Greengard,
November 05, 2020
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 02, 2020
How Intel’s Work With Autonomous Cars Could Redefine General Purpose AI
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 29, 2020
Dell Technologies World: Weaving Together Human And Machine Interaction For AI And Robotics
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 23, 2020
The Super Moderator, or How IBM Project Debater Could Save Social Media
FEATURE | By Rob Enderle,
October 16, 2020
FEATURE | By Cynthia Harvey,
October 07, 2020
ARTIFICIAL INTELLIGENCE | By Guest Author,
October 05, 2020
CIOs Discuss the Promise of AI and Data Science
FEATURE | By Guest Author,
September 25, 2020
Microsoft Is Building An AI Product That Could Predict The Future
FEATURE | By Rob Enderle,
September 25, 2020
Top 10 Machine Learning Companies 2021
FEATURE | By Cynthia Harvey,
September 22, 2020
NVIDIA and ARM: Massively Changing The AI Landscape
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
September 18, 2020
Continuous Intelligence: Expert Discussion [Video and Podcast]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 14, 2020
Artificial Intelligence: Governance and Ethics [Video]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 13, 2020
IBM Watson At The US Open: Showcasing The Power Of A Mature Enterprise-Class AI
FEATURE | By Rob Enderle,
September 11, 2020
Artificial Intelligence: Perception vs. Reality
FEATURE | By James Maguire,
September 09, 2020
Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.
Advertise with TechnologyAdvice on Datamation and our other data and technology-focused platforms.
Advertise with Us
Property of TechnologyAdvice.
© 2025 TechnologyAdvice. All Rights Reserved
Advertiser Disclosure: Some of the products that appear on this
site are from companies from which TechnologyAdvice receives
compensation. This compensation may impact how and where products
appear on this site including, for example, the order in which
they appear. TechnologyAdvice does not include all companies
or all types of products available in the marketplace.