Content deleted Content added
Citation bot (talk | contribs) Add: website. | Use this bot. Report bugs. | Suggested by Whoop whoop pull up | #UCB_webform 101/101 |
No edit summary |
||
Line 1:
{{Short description|USB wireless receiver}}
[[File:Logitech_unifying_receiver.jpg|thumb|right|Logitech Unifying
[[File:Logitech_Unifying_Receiver_USB.jpg|thumb|right|Logitech Unifying
The '''Logitech Unifying
| title=MouseJack device discovery and research tools
| url=https://github.com/BastilleResearch/mousejack#flash-a-logitech-unifying-dongle
Line 18:
| url-status=dead}}</ref> Peripherals remain paired, and can then be used on systems not supporting the software. Logitech receivers compatible with the Unifying protocol can be identified by the orange Unifying logo, which distinguishes them from Logitech Nano receivers of similar appearance, which pair in a similar manner but only with a single device, without using the Unifying protocol.
Logitech Unifying
==Compatibility and use==
Line 32:
Pairing software is available from Logitech for Microsoft Windows and Mac OS X. Wireless devices using the Unifying Receiver are supported since [[Linux]] 3.2.<ref>{{cite web
| title=HID: Add full support for Logitech Unifying
| author=Nestor Lopez Casado
| date=2011-09-15
Line 55:
=== MouseJacking and keyjacking ===
[[Mousejacking|MouseJacking]], first reported by Bastille Networks, Inc.,<ref name=vulerabilities/> is the sending of malicious radio signals (packets) wirelessly to an unsuspecting user through Logitech Unifying wireless technology. The exploit takes advantage of a user's vulnerable Logitech Unifying
* Keystroke injection by either spoofing a paired mouse or keyboard
|