background preloader

Τεχνολογία - Technology

Facebook Twitter

Robots

Why passwords have never been weaker—and crackers have never been stronger. In late 2010, Sean Brooks received three e-mails over a span of 30 hours warning that his accounts on LinkedIn, Battle.net, and other popular websites were at risk.

Why passwords have never been weaker—and crackers have never been stronger

He was tempted to dismiss them as hoaxes—until he noticed they included specifics that weren't typical of mass-produced phishing scams. The e-mails said that his login credentials for various Gawker websites had been exposed by hackers who rooted the sites' servers, then bragged about it online; if Brooks used the same e-mail and password for other accounts, they would be compromised too. The warnings Brooks and millions of other people received that December weren't fabrications. Within hours of anonymous hackers penetrating Gawker servers and exposing cryptographically protected passwords for 1.3 million of its users, botnets were cracking the passwords and using them to commandeer Twitter accounts and send spam. Newer hardware and modern techniques have also helped to contribute to the rise in password cracking. ΓΕΝΙΚΟ ΕΠΙΤΕΛΕΙΟ ΕΘΝΙΚΗΣ ΑΜΥΝΑΣ. Google Search 3T. Hacking Basics.

This tutorial is for information purposes only, and I do not endorse any of the activities discussed within this guide. I nor anyone hosting this guide can be held responsible for anything you do after reading this. What you do with your day lies on your shoulders. Here with I am creating an Index.. 1. Learn How to Hack Learning how to hack is simple. 2.Cracking commercial quantum cryptography secure communicating boxes with their internals exposed, Alice and Bob . 3.Top 10 Password Crackers Anyone in the security field would be well advised to go over the list and investigate tools they are unfamiliar with. 4.How to Hack a WiFi Network. you already know that if you want to lock down your Wi-Fi network, you should opt for WPA encryption because WEP is easy to crack. 5.Common Hacking Methods.

A cardinal rule of computer security is that once an attacker has acquired physical access to a machine, it is generally trivial for that attacker to fully compromise the system. BitLocker Drive Encryption. Availability[edit] BitLocker is available in the Enterprise and Ultimate editions of Windows Vista and Windows 7.

BitLocker Drive Encryption

It is also available in the Pro and Enterprise editions of Windows 8.[4] Users of other versions of Windows that do not include BitLocker can use a third-party encryption program to satisfy the need for full disk encryption (see comparison of disk encryption software). In the RTM release of Windows Vista, only the operating system volume could be encrypted using the GUI; encrypting other volumes required using WMI-based scripts included in Windows Vista in the %Windir%\System32 folder.[5] An example of how to use the WMI interface is in the script manage-bde.wsf that can be used to set up and manage BitLocker from the command line.

With Windows Vista Service Pack 1 and Windows Server 2008, volumes other than the operating system volume can be encrypted using the graphical Control Panel applet as well.[6] Overview[edit]

3D-Printing

Five digital trends that will transform the way you run your business. Here are five fascinating trends that are about to turn the way we do business on its head.

Five digital trends that will transform the way you run your business

Technology enthusiast Kevin Kelly compared technology to a biological organism: a complex, evolving organism, that moves so fast it's often hard for us humans to keep up. There are plenty of fascinating movements in the digital space happening at any given moment. Today, we're looking a little closer at some of the trends in technology that will have an enormous effect on the way business works. 1.

The internet of everything The term “the internet of things” has been floating around the world since 1999, when technologist Kevin Ashton suggested that soon computers would be capable of generating and collecting data without human supervision. Over 50 per cent of internet connections are things: there are about 15bn “things” on the web, with 50bn plus intermittent connections. Key technologies here include embedded sensors, and image recognition. There are plenty of other examples. The 2 Easy Ways to Make Your PC Run Like New.