Back to : Blog

Sase Sham, Inc.
216 WoodHampton Dr
White Plains, NY 10603-1920

Blog Management


Recent Comments

    There are no comments.


Wireless AutoSwitch XPV
Add to Cart

Wireless AutoOff

Add to Cart

View Cart

Featured Blogs

Wireless AutoSwitch XPV 1.5.7 Released

Here are the recent updates this year: VERSION : 1.5.7 DATE : 30 Jul 2019 CHANGES : Added support for new Intel cards VERSION : DATE...

Wireless AutoSwitch XPV Released!

We just released XPV version   This version speeds up the detection of USB devices added after the service starts.  Detection ...

Wireless AutoSwitch XPV 1.5.6 Released!

We just released Wireless AutoSwitch XPV version 1.5.6.  This version updates the code to recognize the new DisplayLink driver for USB Dockin...

Wireless AutoSwicth XPV released!

We just released Wireless AutoSwitch XPV version  This version fixes an issue when using some USB docking stations and adds the Start Di...

New Features in XPV

We have just released Wireless AutoSwitch XPV  Here are the additions: 1.  Previously one needed to be an admin to run the "Wire...

Recent Blogs

Sase Sham's avatar

Corporate Security regarding WiFi and Laptops

Corporate espionage is a far more serious and wide spread problem than at any point in the past and with the huge storage potential of even the tiniest of media it is now vital that corporations lock down their data security with the right combination of policy, IT support and threat awareness. Both laptops and wi-fi are major points of attack which require IT policies that address these potential vulnerabilities before problems happen and fault analysis after problems to make sure any issues are correctly fixed and prevented from ever happening again.

There are a number of methods to improve laptop security, the most obvious of which is a robust password policy and to educate employees about what is a strong password and concepts of password use. This means having a minimum password length and complexity that is enforced, along with changing the passwords after a set period of time to limit the vulnerability window of any undiscovered loss of security information. Teaching workers not to reuse a password and not to use the same password for multiple tasks as this is often used to escalate the seriousness of an attack, gaining access to a peripheral system before moving into more insensitive core systems. Ensure that laptops have a strong BIOS password and that the security provided by the manufacturer is strong. As with mobile phones there are now more sophisticated technologies available for dealing with lost laptops such as GPS tracking and remote wipe.

Engrave or tag the laptop in a way that displays the company name and contact details so that any lost laptop has a far greater chance of being returned to your business if it is left on a train or at a conference for example.

Choose an operating system that provides data security and make sure it remains regularly patched to close vulnerabilities as soon as they are discovered. This can be greatly enhanced with the addition of full disk encryption which will make lost data far less of a liability as if it is properly protected it will not be possible to discover what the data says.

Wi-fi signals can often be picked up far away from where the network or laptop is placed, allowing people outside a company to snoop on transmissions and potentially intercept passwords and sensitive data if the network is not properly locked down. They can also connect to laptops with the wireless card turned on and gain access to the corporate network. Good wi-fi security requires an encrypted protocol be used along with passwords and preferably an allowed list of devices with assigned IPs to add an extra layer of security. Make sure the security is up to date as even some encrypted protocols have now fallen to decryption attacks based on the processing power of a graphics card repurposed for number crunching. Most companies ignore the risk of the wireless cards on laptops so it is also important to turn off wireless cards when they are not in use.

In an increasingly security conscious world this is becoming a vital part of any IT provision for large organisations, especially those with commercially sensitive data or databases of customer details which would be a major breach of trust to lose and result in extremely bad press for that company. Every aspect of the corporate IT infrastructure from desktops to servers to laptops and mobile phones must be carefully considered for its security implications as more of these devices become ever more interconnected to make data as available as possible within the company to its employees.

Sase Sham's avatar

Free apps you should check out

In a previous blog I talked about free software.  I want to take a moment to highlight some of the free software I use and love.  Both of my websites and are run on DotNetNuke which is absolutely great.  Of course I have bought modules and skins for my sites but the core platform is free.

I have already mentioned Notepad++; I use this as my primary note taking and typing platform, and occasionally I will edit a script with it.  It is very versatile and I have replaced the default notepad with Notepad++.

I do a lot of repetitive typing (typing the same thing over and over again) like answering a quote request or sending out licenses after a purchase and for this I use AutoHotKey to speed things up.  I simply type 3-4 letters, hit the space bar and an entire phrase or paragraph is typed out in a second.  It saves me a lot of time.

Sase Sham's avatar

Auto Switch between Wireless and LAN on Linux

If you want to disable wireless if cable is plugged in on Linux then here is a possible solution:

Sase Sham's avatar

Why not give it away for free?

We have all heard the statement that nothing in life is free.  But there are some things that are free, like love and the air you breathe.  But most others things are not free even when it looks like it is free.

Read the rest of entry »

Sase Sham's avatar

The Birth of Wireless AutoSwitch

Well for my first blog I must talk about my product, Wireless AutoSwitch. I wrote this little utility back in 2006 because I couldn't find anything that did what I wanted as simple and precise as I wanted and as a standalone function.  I did a lot of searching and found some scripts, suggestions, and software that had this as one of its feature, but nothing that was simple and inexpensive. Why was I searching for a utility to automatically disable the wireless cards?  Well one day in 2006 I was at a client site and they were starting to roll out wireless access points and we were setting up laptops to connect to the internal wireless access points.  This client placed the wireless network on the same subnet as the LAN.  So they soon started running out of IP Addresses because the docked laptops had a LAN and a wireless connection at the same time and both with its own IP Address.  So we needed something to turn off the wireless when the laptop was docked and connected to the local ar ...

Read the rest of entry »

Sase Sham's avatar


Hello and welcome to our webiste and our Blog.  Here I will comment on Wireless AutoSwitch, our company, and pretty much anything I feel needs to be said.

Let me know if there is anything specific you want me to talk about.

Download - Latest Versions - Try Free for 30 Days
Wireless AutoSwitch XPVSoftwareWorks on Windows 10 , Windows 7, Windows 8.1, Vista and XP.
Wireless AutoOffSoftwareLatest version of AutoOff (Win7, Win8, Win10, Vista and XP)