For this program handy jammer your wireless card needs to work to be able to inject packets on the network. You need to learn your wifi card chipset, command dmesg in linux often show this information, or run lsusb if you are using a wireless usb dongle. With the information obtained, one can then search the internet to find out if the card is suitable for running Aircrack or any other WPA crack utility. If the wireless chipset can run a WPA cracking tool, it says it is able to inject packets on a live network and it will work with Wi-Fi jammers.
The signal jammers automatically hop between channels every second to determine all possible destinations, after the initial identification it starts the signal sending constant deauthentication packets to the access point jamming. This is a way to disconnect connected computers from the access point, cutting off their wireless access. wifi jammer does not perform a denial service attack, but a disconnection, the customer will be able to reconnect, but as long as the attack is ongoing, wifi jammer keeps telling the access point to disconnect the customer, with the same result as a Denial-of-service attack without consuming much bandwidth or resources. One advantage of getting a client to constantly reauthenticate to the access point is that it might be able to capture the WPA2 handshake and access to the network.
There is another application to jam WiFi access points found in the web split framework, WiFi gsm jammer has the advantage of being a very small script that should be run in any operating system if you can install Python. If an access point enabled MAC filtering, you would have to fake a customer's MAC address before accepting deauthentication packets. Aside from that, expensive corporate level wireless access points are able to continuously detect death requests and they will block you.