Computer hardware and recorded computer software for monitoring security of public and private wireless networks; computer hardware and recorded computer software for identifying wireless network attacks; computer hardware and recorded computer software for detecting rogue wireless access points; computer hardware and recorded computer software for detecting a duplicated wireless network; computer hardware and recorded computer software for protecting travelers on-the-go, homes, offices, sites, airports, hotels, conferences, restaurants, vehicles, wireless phones, computers, media players, Internet of Things (IoT) devices, wireless cameras, wireless wearables, and other wireless devices from wireless network attacks; computer hardware and recorded computer software for protecting a specific wireless device from a wireless network attack irrespective of the wireless network to which the specific wireless device is connected; computer hardware and recorded computer software for protecting all devices connected to a specific wireless network from a wireless network attack; computer hardware and recorded computer software for automatically disconnecting one or more wireless devices from a wireless network when an attack on the wireless network is identified
Electrical and Scientific ApparatusProviding temporary use of online non-downloadable software for monitoring security of public and private wireless networks; providing temporary use of online non-downloadable software for identifying wireless network attacks; providing temporary use of online non-downloadable software for detecting rogue wireless access points; providing temporary use of online non-downloadable software for detecting a duplicated wireless network; providing temporary use of online non-downloadable software for protecting travelers on-the-go, homes, offices, sites, airports, hotels, conferences, restaurants, vehicles, wireless phones, computers, media players, Internet of Things (IoT) devices, wireless cameras, wireless wearables, and other wireless devices from wireless network attacks; providing temporary use of online non-downloadable software for protecting a specific wireless device from a wireless network attack irrespective of the wireless network to which the specific wireless device is connected; providing temporary use of online non-downloadable software for protecting all devices connected to a specific wireless network from a wireless network attack; providing temporary use of online non-downloadable software for automatically disconnecting one or more wireless devices from a wireless network when an attack on the wireless network is identified
Computer and Scientific